A Comprehensive Literature Review on Volatile Memory Forensics

被引:0
|
作者
Hamid, Ishrag [1 ]
Rahman, M. M. Hafizur [1 ]
机构
[1] King Faisal Univ, Coll Comp Sci & Informat Technol, Dept Comp Networks & Commun, Al Hasa 31982, Saudi Arabia
关键词
memory forensics; forensic tools; forensic techniques; cybersecurity; volatile memory; technological advancements; digital investigations; DIGITAL FORENSICS; CHALLENGES; ACQUISITION;
D O I
10.3390/electronics13153026
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Through a systematic literature review, which is considered the most comprehensive way to analyze the field of memory forensics, this paper investigates its development through past and current methodologies, as well as future trends. This paper systematically starts with an introduction to the key issues and a notable agenda of the research questions. Appropriate inclusion and exclusion criteria were then developed, and a deliberate search strategy was adopted to identify primary research studies aligned with the research question. The paper goes into specific details of six different memory categories, notably volatile memory, interpreting their advantages and the tactics used to retrieve the data. A detailed comparison with existing reviews and other relevant papers is made, forming a broader and wider picture of the research. The discussion summarizes the main findings, particularly the rise of more complex and advanced cyber threats and the necessity of more effective forensic methods for their investigation. This review pinpoints the possibilities for future study with the purpose of staying ahead in the evolving technological landscape. This overview is undoubtedly an essential resource for professionals and researchers working in digital forensics. It allows them to stay competent and provides enough insight into the current trends while marking the future direction in digital forensics methodology.
引用
收藏
页数:24
相关论文
共 50 条
  • [1] Advances in volatile memory forensics
    Schatz, Bradley
    Cohen, Michael
    DIGITAL INVESTIGATION, 2017, 20 : 1 - 1
  • [2] Cybersecurity and Cyber Forensics for Smart Cities: A Comprehensive Literature Review and Survey
    Kim, Kyounggon
    Alshenaifi, Istabraq Mohammed
    Ramachandran, Sundaresan
    Kim, Jisu
    Zia, Tanveer
    Almorjan, Abdulrazaq
    SENSORS, 2023, 23 (07)
  • [3] Volatile memory forensics of privacy aware browsers
    Mistry, Nilay R.
    Gajjar, Krupa
    Junare, S. O.
    INTERNATIONAL JOURNAL OF INFORMATION AND COMPUTER SECURITY, 2022, 18 (3-4) : 313 - 326
  • [4] A comprehensive literature review of chronic pain and memory
    Mazza, Stephanie
    Frot, Maud
    Rey, Amandine E.
    PROGRESS IN NEURO-PSYCHOPHARMACOLOGY & BIOLOGICAL PSYCHIATRY, 2018, 87 : 183 - 192
  • [5] Email Spoofing Detection Using Volatile Memory Forensics
    Iyer, R. Padmavathi
    Atrey, Pradeep K.
    Varshney, Gaurav
    Misra, Manoj
    2017 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2017, : 619 - 625
  • [6] Windows volatile memory forensics based on correlation analysis
    Zhao, K. (zhaokuo@jlu.edu.cn), 1600, Academy Publisher (09):
  • [7] Process based volatile memory forensics for ransomware detection
    Arfeen, Asad
    Khan, Muhammad Asim
    Zafar, Obad
    Ahsan, Usama
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2022, 34 (04):
  • [8] Memory Forensics Tools: Comparing Processing Time and Left Artifacts on Volatile Memory
    Kamal, Khaleque Md Aashiq
    Alfadel, Mahmoud
    Muniat, Munawara Saiyara
    2016 INTERNATIONAL WORKSHOP ON COMPUTATIONAL INTELLIGENCE (IWCI), 2016, : 84 - 90
  • [9] Gaslight: A comprehensive fuzzing architecture for memory forensics frameworks
    Case, Andrew
    Das, Arghya Kusum
    Park, Seung-Jong
    Ramanujam, J.
    Richard, Golden G., III
    DIGITAL INVESTIGATION, 2017, 22 : S86 - S93
  • [10] Volatile memory forensics of privacy-aware operating systems
    Mistry, Nilay R. (nilaymistry30@gmail.com), 1600, Inderscience Publishers (13):