A study on memory dump analysis based on digital forensic tools

被引:0
|
作者
Jungtaek Seo
Seokjun Lee
Taeshik Shon
机构
[1] The Attached Institute of ETRI,
[2] Ajou University,undefined
来源
Peer-to-Peer Networking and Applications | 2015年 / 8卷
关键词
Memory; Memory dump; Dump; Linux; Ram; Embedded; Forensic;
D O I
暂无
中图分类号
学科分类号
摘要
The application of IT in all industrial facilities has led to the use of special-purpose systems in diverse areas. As such, special-purpose systems have increasingly become the target or path of hacking attacks. From a digital forensics viewpoint, these systems can be used to gather evidence from all the relevant digital devices such as whole systems or storage units at the scene of a crime. Notably, In case of special-purpose embedded system, unlike a conventional computing system, is almost always ‘powered on’ like server, the accumulated data can remain in the volatile memory. This paper focuses on analyzing ways of gathering physical memory data for application in an embedded system and of developing a test system to analyze the physical memory for verification.
引用
收藏
页码:694 / 703
页数:9
相关论文
共 50 条
  • [21] Legal issues pertaining to the development of digital forensic tools
    Adams, Charles W.
    SADFE 2008: THIRD INTERNATIONAL WORKSHOP ON SYSTEMATIC APPROACHES TO DIGITAL FORENSIC ENGINEERING, PROCEEDINGS, 2008, : 123 - 132
  • [22] DATA RECOVERY FUNCTION TESTING FOR DIGITAL FORENSIC TOOLS
    Guo, Yinghua
    Slay, Jill
    ADVANCES IN DIGITAL FORENSICS VI, 2010, 337 : 297 - +
  • [23] Hacktivism Trends, Digital Forensic Tools and Challenges: A Survey
    Wazid, Mohammad
    Katal, Avita
    Goudar, R. H.
    Rao, Sreenivas
    2013 IEEE CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES (ICT 2013), 2013, : 138 - 144
  • [24] Dump and Analysis of Android Volatile Memory on Wechat
    Zhou, Fan
    Yang, Yitao
    Ding, Zhaokun
    Sun, Guozi
    2015 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2015, : 7151 - 7156
  • [25] Forensic analysis of video steganography tools
    Sloan, Thomas
    Hernandez-Castro, Julio
    PEERJ COMPUTER SCIENCE, 2015, 2015 (05)
  • [26] An overview and analysis of PDA forensic tools
    Jansen, W.
    Ayers, R.
    DIGITAL INVESTIGATION, 2005, 2 (02) : 120 - 132
  • [27] A Function Oriented Methodology to Validate and Verify Forensic Copy Function of Digital Forensic Tools
    Guo, Yinghua
    Slay, Jill
    FIFTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY: ARES 2010, PROCEEDINGS, 2010, : 665 - 670
  • [28] Hidden Process Offline Forensic Based on Memory Analysis in Windows
    CUI Jingsong
    ZHANG Heng
    QI Jing
    PENG Rong
    ZHANG Manli
    Wuhan University Journal of Natural Sciences, 2017, 22 (04) : 346 - 354
  • [29] Qualitative and Quantitative Analysis of Cloud Based Digital Forensic Tool
    Mohite, Monali P.
    Deshmukh, Jyoti Y.
    Gulve, Pallavi R.
    PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS AND CONTROL (ISCO'16), 2016,
  • [30] Comparative Study of Mobile Forensic Tools
    Agrawal, Animesh Kumar
    Khatri, Pallavi
    Sinha, Sumitra Ranjan
    ADVANCES IN DATA AND INFORMATION SCIENCES, VOL 1, 2018, 38 : 39 - 47