IDENTIFYING VOLATILE DATA FROM MULTIPLE MEMORY DUMPS IN LIVE FORENSICS

被引:0
|
作者
Law, Frank [1 ]
Chan, Patrick [1 ]
Yiu, Siu-Ming [1 ]
Tang, Benjamin [1 ]
Lai, Pierre [1 ]
Chow, Kam-Pui [1 ]
Ieong, Ricci [1 ]
Kwan, Michael [1 ]
Hon, Wing-Kai [2 ]
Hui, Lucas [1 ]
机构
[1] Univ Hong Kong, Hong Kong, Hong Kong, Peoples R China
[2] Natl Tsing Hua Univ, Hsinchu, Taiwan
来源
关键词
Live forensics; volatile data; memory analysis;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
One of the core components of live forensics is to collect and analyze volatile memory data. Since the dynamic analysis of memory is not possible, most live forensic approaches focus on analyzing a single snapshot of a memory dump. Analyzing a single memory dump raises questions about evidence reliability; consequently, a natural extension is to study data from multiple memory dumps. Also important is the need to differentiate static data from dynamic data in the memory dumps; this enables investigators to link evidence based on memory structures and to determine if the evidence is found in a consistent area or a dynamic memory buffer, providing greater confidence in the reliability of the evidence. This paper proposes an indexing data structure for analyzing pages from multiple memory dumps in order to identify static and dynamic pages.
引用
收藏
页码:185 / +
页数:3
相关论文
共 50 条
  • [1] Memory Forensics for QQ from a Live System
    Gao, Yuhang
    Cao, Tianjie
    JOURNAL OF COMPUTERS, 2010, 5 (04) : 541 - 548
  • [2] Advances in volatile memory forensics
    Schatz, Bradley
    Cohen, Michael
    DIGITAL INVESTIGATION, 2017, 20 : 1 - 1
  • [3] Live memory forensics of mobile phones
    Thing, Vrizlynn L. L.
    Ng, Kian-Yong
    Chang, Ee-Chien
    DIGITAL INVESTIGATION, 2010, 7 : S74 - S82
  • [4] Volatile memory forensics of privacy aware browsers
    Mistry, Nilay R.
    Gajjar, Krupa
    Junare, S. O.
    INTERNATIONAL JOURNAL OF INFORMATION AND COMPUTER SECURITY, 2022, 18 (3-4) : 313 - 326
  • [5] A Comprehensive Literature Review on Volatile Memory Forensics
    Hamid, Ishrag
    Rahman, M. M. Hafizur
    ELECTRONICS, 2024, 13 (15)
  • [6] Live Memory Forensics Investigations: A Comparative Analysis
    Syamsuddin, Irfan
    Syamsuar, Dedy
    JOURNAL OF ADVANCES IN INFORMATION TECHNOLOGY, 2023, 14 (05) : 950 - 959
  • [7] Email Spoofing Detection Using Volatile Memory Forensics
    Iyer, R. Padmavathi
    Atrey, Pradeep K.
    Varshney, Gaurav
    Misra, Manoj
    2017 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2017, : 619 - 625
  • [8] Windows volatile memory forensics based on correlation analysis
    Zhao, K. (zhaokuo@jlu.edu.cn), 1600, Academy Publisher (09):
  • [9] Process based volatile memory forensics for ransomware detection
    Arfeen, Asad
    Khan, Muhammad Asim
    Zafar, Obad
    Ahsan, Usama
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2022, 34 (04):
  • [10] Research on the Architecture Model of Volatile Data Forensics
    Hu, Liang
    Zhang, XiaoLu
    Wang, Feng
    Wang, WenBo
    Zhao, Kuo
    2012 INTERNATIONAL WORKSHOP ON INFORMATION AND ELECTRONICS ENGINEERING, 2012, 29 : 4254 - 4258