2008
DOI: 10.1080/15567280802047135
|View full text |Cite
|
Sign up to set email alerts
|

Virtualization and Digital Forensics: A Research and Education Agenda

Abstract: The application of virtualization software and techniques in information technology research and education has provided a foundational environment to advance the state-of-the-art in research and education in many related areas. Commercial and open source virtualization products are being used by researchers and educators to create a wide variety of virtual environments. These virtual environments facilitate systems design and development and product development as well as the testing and modeling of production… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0
1

Year Published

2009
2009
2019
2019

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 26 publications
(14 citation statements)
references
References 9 publications
0
13
0
1
Order By: Relevance
“…Recent advances in the field 1 Such as whether the injection of packets occurred between the sender and the monitoring point-in which case someone other than the sender was doing the injecting; how the analysts determined that the packets were being "stealthily injected" rather than merely "injected" and what that means; and whether the sender's software inserted the packets without her knowledge, as might happen if the sender's system was compromised, for example by a Trojan horse.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…Recent advances in the field 1 Such as whether the injection of packets occurred between the sender and the monitoring point-in which case someone other than the sender was doing the injecting; how the analysts determined that the packets were being "stealthily injected" rather than merely "injected" and what that means; and whether the sender's software inserted the packets without her knowledge, as might happen if the sender's system was compromised, for example by a Trojan horse.…”
Section: Discussionmentioning
confidence: 99%
“…A lay jury may be impressed by a statement like "the use of the stealthy injection of packets clearly indicates the sender was trying to evade the detection mechanisms" but in fact, technologically, the statement embodies a number of assumptions that must be validated before such a claim can be made 1 . The technical sophistication of the audience is critical here.…”
Section: Conveying the Interpretationmentioning
confidence: 99%
“…Dorn and coworkers [25] recently examined the digital forensic impact of virtual machines on their hosts. This work falls in the important area of "analysis of virtual environments" [51], which includes forensic data acquisition, virtual platform forensics and virtual introspection.…”
Section: Non-standard Computing Environmentsmentioning
confidence: 99%
“…Most research efforts have focused on leveraging virtualization in digital forensic analytic environments [8,19,49] or in educational environments [51] rather than conducting digital forensics of virtual environments. Dorn and coworkers [25] recently examined the digital forensic impact of virtual machines on their hosts.…”
Section: Non-standard Computing Environmentsmentioning
confidence: 99%
“…The objective of Lab Exercise 2 is to increase students understanding of the process associated with incident response and addresses a key research area identified in the virtualization in digital forensics research agenda [14]. The target audiences for the examples are extremely varied.…”
Section: Lab Exercise 2 -Digital Forensics Investigationmentioning
confidence: 99%