RAM data significance in Digital Forensics

被引:0
|
作者
Hausknecht, K. [1 ]
Foit, D. [1 ]
Buric, J. [1 ]
机构
[1] INsig2 Dooo, Zagreb, Croatia
关键词
RAM; Live data forensics; Imaging; Volatility; Batch scripts; Windows processes; Network connections; Passwords; Windows registry; Extraction; Malware;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In present modern times when operating systems require larger amounts of RAM or Random Access Memory, we usually come across computers with 4 GB RAM, but given the price drops, it is quite usual to come across computers with 64 GB of RAM as well. By imaging this part of computer memory and by performing forensics analysis of the data located in RAM, it can be easily concluded that performing RAM imagining and analysis should be one of the essential steps in any forensic investigation. This paper will give a short introduction to digital forensics and the role of live data forensics. Furthermore, the mail goal will be to show and explain the importance of forensics of live machines and artefacts which can be found as well as methods and tools which are used for extracting and analyzing data from RAM. In addition, it will be shown that sometimes in forensic investigations, data contained in RAM can contain enough evidence to solve the whole case and actually be everything a digital forensics investigator really need.
引用
收藏
页码:1372 / 1375
页数:4
相关论文
共 50 条
  • [31] Anti-Forensics with Steganographic Data Embedding in Digital Images
    Sun, Hung-Min
    Weng, Chi-Yao
    Lee, Chin-Feng
    Yang, Cheng-Hsing
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2011, 29 (07) : 1392 - 1403
  • [32] Big Data Computing for Digital Forensics on Industrial Control Systems
    Rrushi, Julian
    Nelson, Philip A.
    2015 IEEE 16TH INTERNATIONAL CONFERENCE ON INFORMATION REUSE AND INTEGRATION, 2015, : 593 - 598
  • [33] Privacy Impacts of Data Encryption on the Efficiency of Digital Forensics Technology
    Balogun, Adedayo M.
    Zhu, Shao Ying
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2013, 4 (05) : 36 - 40
  • [34] Data for Digital Forensics: Why a Discussion on "How Realistic is Synthetic Data" is Dispensable
    Goebel, Thomas
    Baier, Harald
    Breitinger, Frank
    DIGITAL THREATS: RESEARCH AND PRACTICE, 2023, 4 (03):
  • [35] Specifying digital forensics: A forensics policy approach
    Taylor, Carol
    Endicott-Popovsky, Barbara
    Frincke, Deborah A.
    DIGITAL INVESTIGATION, 2007, 4 : S101 - S104
  • [36] Digital Forensics: An Introduction
    Mennell, Julie
    MEASUREMENT & CONTROL, 2010, 43 (08): : 237 - 237
  • [37] Triage in digital forensics
    Casey, Eoghan
    DIGITAL INVESTIGATION, 2013, 10 (02) : 85 - 86
  • [38] A Digital Forensics Primer
    Manes, Gavin W.
    Downing, Elizabeth
    Watson, Lance
    INNOVATIONS AND ADVANCES IN COMPUTER SCIENCES AND ENGINEERING, 2010, : 369 - +
  • [39] Sustainability in Digital Forensics
    Friedl, Sabrina
    Zajewski, Charlotte
    Pernul, Guenther
    19TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY, ARES 2024, 2024,
  • [40] Digital and Multimedia Forensics
    Smith, Jeff
    JOURNAL OF THE AUDIO ENGINEERING SOCIETY, 2015, 63 (09): : 750 - 751