A Comprehensive Literature Review on Volatile Memory Forensics

被引:0
|
作者
Hamid, Ishrag [1 ]
Rahman, M. M. Hafizur [1 ]
机构
[1] King Faisal Univ, Coll Comp Sci & Informat Technol, Dept Comp Networks & Commun, Al Hasa 31982, Saudi Arabia
关键词
memory forensics; forensic tools; forensic techniques; cybersecurity; volatile memory; technological advancements; digital investigations; DIGITAL FORENSICS; CHALLENGES; ACQUISITION;
D O I
10.3390/electronics13153026
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Through a systematic literature review, which is considered the most comprehensive way to analyze the field of memory forensics, this paper investigates its development through past and current methodologies, as well as future trends. This paper systematically starts with an introduction to the key issues and a notable agenda of the research questions. Appropriate inclusion and exclusion criteria were then developed, and a deliberate search strategy was adopted to identify primary research studies aligned with the research question. The paper goes into specific details of six different memory categories, notably volatile memory, interpreting their advantages and the tactics used to retrieve the data. A detailed comparison with existing reviews and other relevant papers is made, forming a broader and wider picture of the research. The discussion summarizes the main findings, particularly the rise of more complex and advanced cyber threats and the necessity of more effective forensic methods for their investigation. This review pinpoints the possibilities for future study with the purpose of staying ahead in the evolving technological landscape. This overview is undoubtedly an essential resource for professionals and researchers working in digital forensics. It allows them to stay competent and provides enough insight into the current trends while marking the future direction in digital forensics methodology.
引用
收藏
页数:24
相关论文
共 50 条
  • [21] Digital forensics and strong AI: A structured literature review
    Faehndrich, Johannes
    Honekamp, Wilfried
    Povalej, Roman
    Rittelmeier, Heiko
    Berner, Silvio
    Labudde, Dirk
    FORENSIC SCIENCE INTERNATIONAL-DIGITAL INVESTIGATION, 2023, 46
  • [22] Image forgery detection: comprehensive review of digital forensics approaches
    Singh, Satyendra
    Kumar, Rajesh
    JOURNAL OF COMPUTATIONAL SOCIAL SCIENCE, 2024, 7 (01): : 877 - 915
  • [23] Disk Memory Forensics Analysis of Memory Forensics Frameworks Flow
    Prem, T.
    Selwin, V. Paul
    Mohan, Ashok Kumar
    2017 INNOVATIONS IN POWER AND ADVANCED COMPUTING TECHNOLOGIES (I-PACT), 2017,
  • [24] Pilomatrixoma: A Comprehensive Review of the Literature
    Jones, Christopher D.
    Ho, Weiguang
    Robertson, Bernard F.
    Gunn, Eilidh
    Morley, Stephen
    AMERICAN JOURNAL OF DERMATOPATHOLOGY, 2018, 40 (09) : 631 - 641
  • [25] Comprehensive literature review of monkeypox
    Hatmal, Ma'mon M.
    Al-Hatamleh, Mohammad A., I
    Olaimat, Amin N.
    Ahmad, Suhana
    Hasan, Hanan
    Suhaimi, Nurfatihah Azlyna Ahmad
    Albakri, Khaled A.
    Alzyoud, Anas Abedalbaset
    Kadir, Ramlah
    Mohamud, Rohimah
    EMERGING MICROBES & INFECTIONS, 2022, 11 (01) : 2600 - 2631
  • [26] Guiding: a comprehensive literature review
    Gali, Nuria
    Camprubi, Raquel
    SCANDINAVIAN JOURNAL OF HOSPITALITY AND TOURISM, 2020, 20 (04) : 317 - 334
  • [27] A Comprehensive Review of Deep-Learning-Based Methods for Image Forensics
    Camacho, Ivan Castillo
    Wang, Kai
    JOURNAL OF IMAGING, 2021, 7 (04)
  • [28] A Comprehensive Review on Adaptability of Network Forensics Frameworks for Mobile Cloud Computing
    Khan, Suleman
    Shiraz, Muhammad
    Wahab, Ainuddin Wahid Abdul
    Gani, Abdullah
    Han, Qi
    Rahman, Zulkanain Bin Abdul
    SCIENTIFIC WORLD JOURNAL, 2014,
  • [29] Hypervisor Memory Forensics
    Graziano, Mariano
    Lanzi, Andrea
    Balzarotti, Davide
    RESEARCH IN ATTACKS, INTRUSIONS, AND DEFENSES, 2013, 8145 : 21 - 40
  • [30] Windows memory forensics
    Ruff, Nicolas
    JOURNAL IN COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2008, 4 (02): : 83 - 100