کد مقاله | کد نشریه | سال انتشار | مقاله انگلیسی | نسخه تمام متن |
---|---|---|---|---|
457870 | 696071 | 2011 | 20 صفحه PDF | دانلود رایگان |
Traditional, persistent data-oriented approaches in computer forensics face some limitations regarding a number of technological developments, e.g., rapidly increasing storage capabilities of hard drives, memory-resident malicious software applications, or the growing use of encryption routines, that make an in-time investigation more and more difficult. In order to cope with these issues, security professionals have started to examine alternative data sources and emphasize the value of volatile system information in RAM more recently. In this paper, we give an overview of the prevailing techniques and methods to collect and analyze a computer's memory. We describe the characteristics, benefits, and drawbacks of the individual solutions and outline opportunities for future research in this evolving field of IT security.
► Describes the state-of-the-art in Windows memory forensics.
► Evaluates memory acquisition approaches for the Windows operating system.
► Illustrates best practices to analyze a forensic image of main memory.
► Gives an overview of research possibilities in the field of memory forensics.
Journal: Digital Investigation - Volume 8, Issue 1, July 2011, Pages 3–22