메뉴 건너뛰기




Volumn 42, Issue 3, 2008, Pages 14-20

A proposal for an integrated memory acquisition mechanism

Author keywords

Memory acquisition; Memory analysis; Memory capture; Operating systems

Indexed keywords

FORENSIC ANALYSIS; INCIDENT RESPONSE; MEMORY ANALYSIS; OPERATING SYSTEMS; ROOTKITS; SPECIALIZED HARDWARE; VOLATILE MEMORY;

EID: 57849133518     PISSN: 01635980     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1368506.1368510     Document Type: Conference Paper
Times cited : (17)

References (42)
  • 3
    • 34447541122 scopus 로고    scopus 로고
    • Low down and dirty: Anti-forensic rootkits
    • Security-Assessment.com
    • Bilby, Darren. Low down and dirty: Anti-forensic rootkits. In Proceedings of Ruxcon 2006. Security-Assessment.com, 2006.
    • (2006) Proceedings of Ruxcon 2006
    • Bilby, D.1
  • 6
    • 3042731401 scopus 로고    scopus 로고
    • A Hardware-Based Memory Acquisition Procedure for Digital Investigations
    • Carrier, B.D. And Grand, J., A Hardware-Based Memory Acquisition Procedure for Digital Investigations, Digital Investigation, 1(1):50-60, 2004. http://www.grandideastudio.com/files/security/tribble/tribble-memory- acquisition.pdf.
    • (2004) Digital Investigation , vol.1 , Issue.1 , pp. 50-60
    • Carrier, B.D.1    Grand, J.2
  • 8
  • 11
    • 77952274595 scopus 로고    scopus 로고
    • Downloaded January 24
    • Feldman, Mark, RealMem Memory Mode, http://www.nondot.org/sabre/os/files/ ProtectedMode/realmem.txt. Downloaded January 24, 2008.
    • (2008) RealMem Memory Mode
    • Feldman, M.1
  • 12
    • 36448986657 scopus 로고    scopus 로고
    • When Malware Meets Rootkits
    • Florio, Elia, When Malware Meets Rootkits, Virus Bulletin, 2005. http://www.virusbtn.com/virusbulletin/archive/2005/12/vb20 0512-malware-meets- rootkits.dkb
    • (2005) Virus Bulletin
    • Florio, E.1
  • 13
    • 77952281280 scopus 로고    scopus 로고
    • Free Software Foundation. 6.9 edition
    • Free Software Foundation. GNU core utilities, 6.9 edition, 2007. http://www.gnu.org/software/coreutils/
    • (2007) GNU Core Utilities
  • 15
    • 74049091060 scopus 로고    scopus 로고
    • GMER, Stealth MBR rootkit, 2008. http://www2.gmer.net/mbr/
    • (2008) Stealth MBR Rootkit
  • 17
    • 68749096140 scopus 로고    scopus 로고
    • GMG Systems Incorporated. KnTTools with KnTList, 2007. http://www.gmgsystemsinc.com/knttools/.
    • (2007) KnTTools with KnTList
  • 18
    • 77952265750 scopus 로고    scopus 로고
    • GNU
    • GNU. NetCat, 2008. http://netcat.sourceforge.net/
    • (2008) NetCat
  • 21
    • 77952246616 scopus 로고    scopus 로고
    • Holy Father
    • Holy Father. Hacker Defender, 2005. http://www.megasecurity.org/trojans/ h/hackerdefender/Hackerdefender1.00r.html
    • (2005) Hacker Defender
  • 22
    • 77952285149 scopus 로고    scopus 로고
    • Microsoft Corporation, May
    • Howard, Michael, Address Space Layout Randomization in Windows Vista. Microsoft Corporation, May 2006, http://blogs.msdn.com/michael-howard/archive/ 2006/05/26/address-space-layout-randomization-in-windows-vista.aspx
    • (2006) Address Space Layout Randomization in Windows Vista
    • Howard, M.1
  • 24
    • 33847398384 scopus 로고    scopus 로고
    • Using Every Part of the Buffalo in Windows Memory Analysis
    • Kornblum, Jesse D., Using Every Part of the Buffalo in Windows Memory Analysis. Digital Investigation, 4(1):24-29, 2007. http://dx.doi.org/10.1016/j. diin.2006.12.002
    • (2007) Digital Investigation , vol.4 , Issue.1 , pp. 24-29
    • Kornblum, J.D.1
  • 25
    • 77952273512 scopus 로고    scopus 로고
    • Microsoft Corporation, Device\PhysicalMemory Object, 2007. http://technet2.microsoft.com/windowsserver/en/library/e0f862a3-cf16-4a48-bea5- f2004d12ce351033.mspx
    • (2007) Device\PhysicalMemory Object
  • 26
    • 59249097647 scopus 로고    scopus 로고
    • Inside the Windows Vista Kernel: Part 3
    • April
    • Microsoft, Inside the Windows Vista Kernel: Part 3, Microsoft TechNet Magazine, April 2007. http://www.microsoft.com/technet/technetmag/issues/2007/ 04/VistaKernel/
    • (2007) Microsoft TechNet Magazine
  • 29
    • 33751342034 scopus 로고    scopus 로고
    • FATKit: A framework for the extraction and analysis of digital forensic data from volatile system memory
    • Petroni, J.N.L., Walters, A., Fraser, T., and Arbaugh, W.A., FATKit: A framework for the extraction and analysis of digital forensic data from volatile system memory, Digital Investigation, 3 (2006), pp.197-210.
    • (2006) Digital Investigation , vol.3 , pp. 197-210
    • Petroni, J.N.L.1    Walters, A.2    Fraser, T.3    Arbaugh, W.A.4
  • 34
    • 77952284901 scopus 로고    scopus 로고
    • Personal weblog
    • Schuster, Andreas. Reconstructing a Binary (1). Personal weblog, 2006. http://computer.forensikblog.de/en/2006/04/reconstructing-a-binary.html
    • (2006) Reconstructing a Binary (1)
    • Schuster, A.1
  • 35
    • 33745993901 scopus 로고    scopus 로고
    • Searching for processes and threads in microsoft windows memory dumps
    • August
    • Schuster, Andreas. Searching for processes and threads in microsoft windows memory dumps. Digital Investigation, 3(S):10-16, August 2006. http://dfrws.org/2006/proceedings/2-Schuster.pdf.
    • (2006) Digital Investigation , vol.3 , Issue.S , pp. 10-16
    • Schuster, A.1
  • 37
    • 77952283779 scopus 로고    scopus 로고
    • & C.H.A.O.S.
    • Silberman, Peter & C.H.A.O.S., futo, 2007. http://www.uninformed.org/ ?v=3&a=7&t=sumry
    • (2007) Futo
    • Silberman, P.1
  • 41
    • 84888374488 scopus 로고    scopus 로고
    • Volatile Systems. Volatility Framework, 2007. http://www.volatilesystems. com/VolatileWeb/volatility.gsp
    • (2007) Volatility Framework


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.