2014 IEEE International Conference on Computational Intelligence and Computing Research 2014
DOI: 10.1109/iccic.2014.7238452
|View full text |Cite
|
Sign up to set email alerts
|

Volatile Internet evidence extraction from Windows systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0
1

Year Published

2016
2016
2021
2021

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(6 citation statements)
references
References 6 publications
0
5
0
1
Order By: Relevance
“…First, we contribute to the field of memory artefact identification by providing regular expression patterns that can be used to identify different types of memory artefacts generated by various applications, namely, Chrome, Tor, Filezilla, Skype, Wickr, Libre Writer and Microsoft's Notepad. MemTri, also confirms the regular expressions patterns designed by [27,10] to locate browser memory artefacts generated by visiting websites and performing Google search engine queries. Furthermore, we developed our regular expression patterns in such a way that will enable us to successfully capture other kinds of browser artefacts such as those generated when a file is downloaded.…”
Section: Summary Of Contributionsmentioning
confidence: 76%
See 2 more Smart Citations
“…First, we contribute to the field of memory artefact identification by providing regular expression patterns that can be used to identify different types of memory artefacts generated by various applications, namely, Chrome, Tor, Filezilla, Skype, Wickr, Libre Writer and Microsoft's Notepad. MemTri, also confirms the regular expressions patterns designed by [27,10] to locate browser memory artefacts generated by visiting websites and performing Google search engine queries. Furthermore, we developed our regular expression patterns in such a way that will enable us to successfully capture other kinds of browser artefacts such as those generated when a file is downloaded.…”
Section: Summary Of Contributionsmentioning
confidence: 76%
“…This approach was mainly inspired by [10,27,28] which showed that intuitive evidence artefacts can be retrieved by simply searching for ASCII/Unicode data patterns generated by specific applications. The first step in the operation of the ESE is to identify the running processes within the memory image that match the target applications mentioned earlier.…”
Section: System Model and Preliminariesmentioning
confidence: 99%
See 1 more Smart Citation
“…Live forensics dapat dilakukan ketika sistem belum mati atau down, karena hampir kesuluruhan penggunaan sistem tersimpan pada RAM, pagefile, hibernation file dan crash dump file [5] [6]. Tujuan pentingnya analisis data pada RAM, yaitu dapat mengetahui letak data tersebut dan isi data tersebut.…”
Section: Landasan Teoriunclassified
“…Live forensics can be performed if the system on the computer does not die because almost all of the system usage is stored in RAM, Page files, hibernation files and dump crash files [16] [17]. Information that can be found on RAM such as running processes, information about executable files, Registry Key, information about network activity, drivers used, user logins, passwords and cryptographic keys, hidden processes and data, malware, temporary data, portable applications Application Which is not installed on the computer itself but only runs), DLL and many other important information [18].…”
mentioning
confidence: 99%