메뉴 건너뛰기




Volumn 1, Issue 3, 2009, Pages 42-61

Volatile memory collection and analysis for windows mission-critical computer systems

Author keywords

Blurriness; Live forensic analysis; Page file collection; Ram collection; Volatile memory analysis; Volatile memory integrity

Indexed keywords

DIGITAL STORAGE; WINDOWS OPERATING SYSTEM;

EID: 67649925950     PISSN: 19416210     EISSN: 19416229     Source Type: Journal    
DOI: 10.4018/jdcf.2009070103     Document Type: Article
Times cited : (6)

References (22)
  • 2
    • 65249161004 scopus 로고    scopus 로고
    • Hit by a bus: Physical access attacks with firewire
    • Retrieved September 20, 2008
    • th International Ruxcon Conference. Retrieved September 20, 2008, from http://www.ruxcon.orrg.au/files/2006/firewire-attacks.pdf
    • (2006) th International Ruxcon Conference
    • Boileau, A.1
  • 3
    • 3042731401 scopus 로고    scopus 로고
    • A hardware- based memory acquisition procedure for digital investigations
    • Carrier, B., & Grand, J. (2004). A Hardware- Based Memory Acquisition Procedure for Digital Investigations. Digital Investigation, 1(1), 50-60.
    • (2004) Digital Investigation , vol.1 , Issue.1 , pp. 50-60
    • Carrier, B.1    Grand, J.2
  • 5
    • 85036781266 scopus 로고    scopus 로고
    • Retrieved September 20, 2008
    • Carrier, B. (2008). SleuthKit, Retrieved September 20, 2008, from http://www.sleuthkit.org/.
    • (2008)
    • Carrier, B.1
  • 6
    • 3142612259 scopus 로고    scopus 로고
    • Evidence dynamics: Locard's exchange principle and crime reconstruction
    • Chisum, W.J., & Turvey, B. (2000). Evidence Dynamics: Locard's Exchange Principle and Crime Reconstruction, Journal of Behavioral Profiling, 1(1).
    • (2000) Journal of Behavioral Profiling , vol.1 , Issue.1
    • Chisum, W.J.1    Turvey, B.2
  • 8
    • 85036782184 scopus 로고    scopus 로고
    • Encase Retrieved September 20, 2008
    • Encase (2008), Retrieved September 20, 2008, from http://www. guidancesoftware.com/.
    • (2008)
  • 9
  • 11
    • 33847398384 scopus 로고    scopus 로고
    • Using every part of the buffalo in windows memory analysis
    • Kornblum, J. (2007). Using Every Part of the Buffalo in Windows Memory Analysis. Digital Investigation, 4(1), 24-29.
    • (2007) Digital Investigation , vol.4 , Issue.1 , pp. 24-29
    • Kornblum, J.1
  • 12
    • 52149113749 scopus 로고    scopus 로고
    • Windows page file collection and analysis for a live forensic context
    • Jeju Island, Korea: IEEE Computer Society
    • Lee, S., Savoldi, A., Lee, S., & Lim, J. (2007a). Windows Page file Collection and Analysis for a Live Forensic Context. In Future Generation Communication and Networking (pp. 97-101). Jeju Island, Korea: IEEE Computer Society.
    • (2007) Future Generation Communication and Networking , pp. 97-101
    • Lee, S.1    Savoldi, A.2    Lee, S.3    Lim, J.4
  • 14
    • 0024771302 scopus 로고
    • Memory coherence in shared virtual memory systems
    • DOI 10.1145/75104.75105
    • Li, K., & Hudak, P. (1989). Memory Coherence in Shared Virtual Memory System. ACM Transaction on Computer System, 7(4), 321-359. (Pubitemid 20637608)
    • (1989) ACM Transactions on Computer Systems , vol.7 , Issue.4 , pp. 321-359
    • Li Kai1    Hudak Paul2
  • 16
    • 33751342034 scopus 로고    scopus 로고
    • FATkit: A framework for the extraction and analysis of digital forensic data from volatile system memory
    • Petroni, N., Walters, A., Fraser, T., & Arbaugh, W. (2006). FATkit: A Framework for the Extraction and Analysis of Digital Forensic Data from Volatile System Memory. Digital Investigation, 3(4), 197-210.
    • (2006) Digital Investigation , vol.3 , Issue.4 , pp. 197-210
    • Petroni, N.1    Walters, A.2    Fraser, T.3    Arbaugh, W.4
  • 18
    • 77952255373 scopus 로고    scopus 로고
    • Beyond the CPU: Defeating hardware based RAM acquisition tools (Part I: AMD case)
    • Retrieved March 1, 2008
    • Rutkowska, J. (2007). Beyond The CPU: Defeating Hardware Based RAM Acquisition Tools (Part I: AMD case). Black Hat Conference. Retrieved March 1, 2008, from http://in-visiblethings.org/papers.html.
    • (2007) Black Hat Conference
    • Rutkowska, J.1
  • 19
    • 34447528955 scopus 로고    scopus 로고
    • Bodysnatcher: Towards reliable volatile memory acquisition by software
    • In E. Casey (Ed.), Pittsburgh, PA: Elsevier
    • th Annual Digital Forensic Research Workshop (pp. 126-134). Pittsburgh, PA: Elsevier.
    • (2007) th Annual Digital Forensic Research Workshop , pp. 126-134
    • Schatz, B.1
  • 20
  • 22
    • 85036793472 scopus 로고    scopus 로고
    • Retrieved September 20, 2008, from
    • X-Ways Forensic (2008), Retrieved September 20, 2008, from http://www.x-ways.net/.
    • (2008)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.