Providing a Foundation for Analysis of Volatile Data Stores

<p class="JDFSLParagraph">Current threats against typical computer systems demonstrate a need for forensic analysis of memory-resident data in addition to the conventional static analysis common today.  Certain attacks and types of malware exist solely in memory and leave little or...

Full description

Bibliographic Details
Main Author: Timothy Vidas
Format: Article
Language:English
Published: Association of Digital Forensics, Security and Law 2007-09-01
Series:Journal of Digital Forensics, Security and Law
Online Access:http://ojs.jdfsl.org/index.php/jdfsl/article/view/194
id doaj-572cb6073f8a480391602ee8f013514d
record_format Article
spelling doaj-572cb6073f8a480391602ee8f013514d2020-11-25T02:38:56ZengAssociation of Digital Forensics, Security and LawJournal of Digital Forensics, Security and Law1558-72151558-72232007-09-01234556117Providing a Foundation for Analysis of Volatile Data StoresTimothy Vidas0Naval Postgraduate School<p class="JDFSLParagraph">Current threats against typical computer systems demonstrate a need for forensic analysis of memory-resident data in addition to the conventional static analysis common today.  Certain attacks and types of malware exist solely in memory and leave little or no evidentiary information on nonvolatile stores such as a hard disk drive.  The desire to preserve system state at the time of response may even warrant memory acquisition independent of perceived threats and the ability to analyze the acquired duplicate. </p><p class="JDFSLParagraph">Tools capable of duplicating various types of volatile data stores are becoming widely available.  Once the data store has been duplicated, current forensic procedures have no method for extrapolating further useful information from the duplicate.  This paper is focused on providing the groundwork for performing forensic investigations on the data that is typically stored in a volatile data store, such as system RAM.</p><p class="JDFSLParagraph">It is intended that, when combined with good acquisition techniques, it will be shown that it is possible to obtain more post incident response information along with less impact to potential evidence when compared to typical incident response procedures. </p>http://ojs.jdfsl.org/index.php/jdfsl/article/view/194
collection DOAJ
language English
format Article
sources DOAJ
author Timothy Vidas
spellingShingle Timothy Vidas
Providing a Foundation for Analysis of Volatile Data Stores
Journal of Digital Forensics, Security and Law
author_facet Timothy Vidas
author_sort Timothy Vidas
title Providing a Foundation for Analysis of Volatile Data Stores
title_short Providing a Foundation for Analysis of Volatile Data Stores
title_full Providing a Foundation for Analysis of Volatile Data Stores
title_fullStr Providing a Foundation for Analysis of Volatile Data Stores
title_full_unstemmed Providing a Foundation for Analysis of Volatile Data Stores
title_sort providing a foundation for analysis of volatile data stores
publisher Association of Digital Forensics, Security and Law
series Journal of Digital Forensics, Security and Law
issn 1558-7215
1558-7223
publishDate 2007-09-01
description <p class="JDFSLParagraph">Current threats against typical computer systems demonstrate a need for forensic analysis of memory-resident data in addition to the conventional static analysis common today.  Certain attacks and types of malware exist solely in memory and leave little or no evidentiary information on nonvolatile stores such as a hard disk drive.  The desire to preserve system state at the time of response may even warrant memory acquisition independent of perceived threats and the ability to analyze the acquired duplicate. </p><p class="JDFSLParagraph">Tools capable of duplicating various types of volatile data stores are becoming widely available.  Once the data store has been duplicated, current forensic procedures have no method for extrapolating further useful information from the duplicate.  This paper is focused on providing the groundwork for performing forensic investigations on the data that is typically stored in a volatile data store, such as system RAM.</p><p class="JDFSLParagraph">It is intended that, when combined with good acquisition techniques, it will be shown that it is possible to obtain more post incident response information along with less impact to potential evidence when compared to typical incident response procedures. </p>
url http://ojs.jdfsl.org/index.php/jdfsl/article/view/194
work_keys_str_mv AT timothyvidas providingafoundationforanalysisofvolatiledatastores
_version_ 1724788722936840192