2013 Ieee Conference on Information and Communication Technologies 2013
DOI: 10.1109/cict.2013.6558230
|View full text |Cite
|
Sign up to set email alerts
|

Extraction of memory forensic artifacts from windows 7 RAM image

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 23 publications
(6 citation statements)
references
References 1 publication
0
6
0
Order By: Relevance
“…(i) While we focus our backend implementation on Linux, NFM's applicability is not limited to a particular OS. Structure-offset extraction and VMI have been shown to work for Mac and Windows as well [5,8,34,44]. Also, their versions are few as compared to Linux, and change slowly.…”
Section: Exploiting Vm Statementioning
confidence: 99%
“…(i) While we focus our backend implementation on Linux, NFM's applicability is not limited to a particular OS. Structure-offset extraction and VMI have been shown to work for Mac and Windows as well [5,8,34,44]. Also, their versions are few as compared to Linux, and change slowly.…”
Section: Exploiting Vm Statementioning
confidence: 99%
“…The second method is offline acquisition, which has the opposite advantages and disadvantages, but is more universal in a real environment. At present, there are tools [7,13,14] for offline acquisition, such as the dd and windd commands in Linux and Windows, respectively.…”
Section: Related Workmentioning
confidence: 99%
“…For this process the RAM has to be imaged to prepare a dump [11]. Then this dump has to be analyzed for recovery of evidence.…”
Section: Recovering and Analyzing Data From Volatile Memory: Tools And mentioning
confidence: 99%