2009 International Conference on Availability, Reliability and Security 2009
DOI: 10.1109/ares.2009.119
|View full text |Cite
|
Sign up to set email alerts
|

Enhancement of Forensic Computing Investigations through Memory Forensic Techniques

Abstract: The use of memory forensic techniques has the potential to enhance computer forensic investigations. The analysis of digital evidence is facing several key challenges; an increase in electronic devices, network connections and bandwidth, the use of anti-forensic technologies and the development of network centric applications and technologies has lead to less potential evidence stored on static media and increased amounts of data stored off-system. Memory forensic techniques have the potential to overcome thes… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
7
0

Year Published

2010
2010
2015
2015

Publication Types

Select...
3
3
2

Relationship

2
6

Authors

Journals

citations
Cited by 15 publications
(7 citation statements)
references
References 15 publications
0
7
0
Order By: Relevance
“…A theoretical discussion of RAM forensics tools, techniques and guidelines can be found in [4], [16] and [2]. The authors provide a comprehensive discussion of the way physical memory works in Windows and Linux operating systems as well as the types of data that can be extracted from physical memory.…”
Section: Literature Reviewmentioning
confidence: 99%
“…A theoretical discussion of RAM forensics tools, techniques and guidelines can be found in [4], [16] and [2]. The authors provide a comprehensive discussion of the way physical memory works in Windows and Linux operating systems as well as the types of data that can be extracted from physical memory.…”
Section: Literature Reviewmentioning
confidence: 99%
“…In addition, techniques to protect the privacy of users and confidentiality of user data, such as encryption and password protection, have also indirectly provided counter forensics means to technologically aware criminals. Therefore, conventional forensic methods are no longer adequate and more research efforts have been placed in live memory forensic analysis of computer systems (Carrier and Grand, 2004;Adelstein, 2006;Petroni et al, 2006;Schatz, 2007;Kiley et al, 2008;Simon and Slay, 2009) in recent years to complement or enhance the former methods.…”
Section: Introductionmentioning
confidence: 99%
“…Because memory contains a large number of computer operation information, such as running process, loading module and link library, user name and password, email address and web site, each process open files, etc [9][10][11][12][13][14][15][16][17][18][19]. Memory forensics is particularly important, because the system of physical memory contains lots of useful information, such as running process, when created, by whom created and the process have what special activities, the status of the system network, the user information, etc.…”
Section: Introductionmentioning
confidence: 99%