메뉴 건너뛰기




Volumn 5, Issue SUPPL., 2008, Pages

Forensic memory analysis: Files mapped in memory

Author keywords

Digital forensics; Memory mapped files; Microsoft Windows XP SP2; Volatile evidence

Indexed keywords

COMPUTER APPLICATIONS; DIGITAL COMPUTERS;

EID: 48749118027     PISSN: 17422876     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.diin.2008.05.014     Document Type: Article
Times cited : (30)

References (8)
  • 3
    • 34447559706 scopus 로고    scopus 로고
    • The VAD tree: a process-eye view of physical memory
    • Dolan-Gavitt B. The VAD tree: a process-eye view of physical memory. Digital Investigation 4S (2007) S62-S64
    • (2007) Digital Investigation , vol.4 S
    • Dolan-Gavitt, B.1
  • 4
    • 27644554446 scopus 로고    scopus 로고
    • Third Printing, Pearson Education [chapter 8.15]
    • Farmer D., and Venema W. Forensic discovery. Third Printing (2005), Pearson Education [chapter 8.15]
    • (2005) Forensic discovery
    • Farmer, D.1    Venema, W.2
  • 5
    • 34447513980 scopus 로고    scopus 로고
    • Carving contiguous and fragmented files with fast object validation
    • Garfinkel S.L. Carving contiguous and fragmented files with fast object validation. Digital Investigation 4S (2007) S1-S12
    • (2007) Digital Investigation , vol.4 S
    • Garfinkel, S.L.1
  • 6
    • 33847398384 scopus 로고    scopus 로고
    • Using every part of the buffalo in Windows memory analysis
    • Kornblum J.D. Using every part of the buffalo in Windows memory analysis. Digital Investigation 4 (2007) 24-29
    • (2007) Digital Investigation , vol.4 , pp. 24-29
    • Kornblum, J.D.1
  • 7
    • 33745993901 scopus 로고    scopus 로고
    • Searching for processes and threads in Microsoft Windows memory dumps
    • Schuster A. Searching for processes and threads in Microsoft Windows memory dumps. Digital Investigation 3S (2006) S10-S16
    • (2006) Digital Investigation , vol.3 S
    • Schuster, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.