2007
DOI: 10.1016/j.diin.2007.03.002
|View full text |Cite
|
Sign up to set email alerts
|

User data persistence in physical memory

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2008
2008
2020
2020

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 24 publications
(11 citation statements)
references
References 1 publication
0
11
0
Order By: Relevance
“…Research on the age of freed user process data in physical memory has shown that large segments of pages are unlikely to survive more than 5 min, even on a lightly loaded system (Solomona et al, 2007). However, smaller segments and single pages may be found up to 2 h after initial memory commit.…”
Section: Related Workmentioning
confidence: 99%
“…Research on the age of freed user process data in physical memory has shown that large segments of pages are unlikely to survive more than 5 min, even on a lightly loaded system (Solomona et al, 2007). However, smaller segments and single pages may be found up to 2 h after initial memory commit.…”
Section: Related Workmentioning
confidence: 99%
“…Files were also accessed at both blocklevel and file-level to estimate the granularity of the data being moved. (Solomon, Huebner, Bem, & Szeżynska, 2007) has used a similar approach to study persistence of data in memory. They made controlled changes to the system and took snapshots of the memory to analyze how the allocation changes with system changes that emulate a users usual behavior on the system.…”
Section: Analyzing the Movement Of Datamentioning
confidence: 99%
“…Carrier and Grand [38] describe a hardware based memory acquisition procedure while Schatz [180] presents a software based volatile memory capture using BodySnatcher. Schuster [183,185] examines the presence of processes and threads in Windows memory dumps and examines memory allocation strategies in Windows Operating systems, Solomon et al [195] analyze user data persistence in physical memory and Mee et al [130] have examined the Windows registry as a forensic artifact. Schuster [184] describes the Microsoft Vista event log format and studies its forensic capabilities and Murphey [145] presents a methodology for automated event log forensics combining multiple logs.…”
Section: Forensic Acquisition Toolsmentioning
confidence: 99%