A study on memory dump analysis based on digital forensic tools

被引:0
|
作者
Jungtaek Seo
Seokjun Lee
Taeshik Shon
机构
[1] The Attached Institute of ETRI,
[2] Ajou University,undefined
来源
Peer-to-Peer Networking and Applications | 2015年 / 8卷
关键词
Memory; Memory dump; Dump; Linux; Ram; Embedded; Forensic;
D O I
暂无
中图分类号
学科分类号
摘要
The application of IT in all industrial facilities has led to the use of special-purpose systems in diverse areas. As such, special-purpose systems have increasingly become the target or path of hacking attacks. From a digital forensics viewpoint, these systems can be used to gather evidence from all the relevant digital devices such as whole systems or storage units at the scene of a crime. Notably, In case of special-purpose embedded system, unlike a conventional computing system, is almost always ‘powered on’ like server, the accumulated data can remain in the volatile memory. This paper focuses on analyzing ways of gathering physical memory data for application in an embedded system and of developing a test system to analyze the physical memory for verification.
引用
收藏
页码:694 / 703
页数:9
相关论文
共 50 条
  • [11] A Comparative Analysis of Digital Forensic Investigation Tools on Facebook Messenger Applications
    Sunardi
    Herman
    Ardiningtias S.R.
    Journal of Cyber Security and Mobility, 2022, 11 (05): : 655 - 672
  • [12] An abstract model for digital forensic analysis tools - A foundation for systematic error mitigation analysis
    Hargreaves, Christopher
    Nelson, Alex
    Casey, Eoghan
    FORENSIC SCIENCE INTERNATIONAL-DIGITAL INVESTIGATION, 2024, 48
  • [13] Impact of Using Unreliable Digital Forensic Tools
    Dimpe, Precilla M.
    Kogeda, Okuthe P.
    WORLD CONGRESS ON ENGINEERING AND COMPUTER SCIENCE, WCECS 2017, VOL I, 2017, : 118 - 125
  • [14] Practical Tools for Digital Image Forensic Authentication
    Zeng, Jinhua
    Lu, Wei
    Yang, Rui
    Qiu, Xiulian
    ADVANCED MULTIMEDIA AND UBIQUITOUS ENGINEERING: FUTURETECH & MUE, 2016, 393 : 453 - 459
  • [15] Robust Correctness Testing for Digital Forensic Tools
    Pan, Lei
    Batten, Lynn M.
    FORENSICS IN TELECOMMUNICATIONS, INFORMATION AND MULTIMEDIA, 2009, 8 : 54 - 64
  • [16] Robust performance testing for digital forensic tools
    Pan, Lei
    Batten, Lynn M.
    DIGITAL INVESTIGATION, 2009, 6 (1-2) : 71 - 81
  • [17] A holistic digital forensic analysis of Discord - Storage, memory, and network perspectives
    Gupta, Khushi
    Lanka, Phani
    Varol, Cihan
    JOURNAL OF FORENSIC SCIENCES, 2024, 69 (04) : 1320 - 1333
  • [18] Analysis of secure data deletion and recovery with common digital forensic tools and procedures
    Zulj, Slaven
    Delija, Damir
    Sirovatka, Goran
    2020 43RD INTERNATIONAL CONVENTION ON INFORMATION, COMMUNICATION AND ELECTRONIC TECHNOLOGY (MIPRO 2020), 2020, : 1607 - 1610
  • [19] A Survey on Mobile Digital Forensic: Taxonomy, Tools, and Challenges
    Patel, Bhavini
    Mann, Palvinder Singh
    SECURITY AND PRIVACY, 2025, 8 (02):
  • [20] Can computer forensic tools be trusted in digital investigations?
    Bhat, Wasim Ahmad
    AlZahrani, Ali
    Wani, Mohamad Ahtisham
    SCIENCE & JUSTICE, 2021, 61 (02) : 198 - 203