Providing a Foundation for Analysis of Volatile Data Stores
<p class="JDFSLParagraph">Current threats against typical computer systems demonstrate a need for forensic analysis of memory-resident data in addition to the conventional static analysis common today. Certain attacks and types of malware exist solely in memory and leave little or...
Main Author: | |
---|---|
Format: | Article |
Language: | English |
Published: |
Association of Digital Forensics, Security and Law
2007-09-01
|
Series: | Journal of Digital Forensics, Security and Law |
Online Access: | http://ojs.jdfsl.org/index.php/jdfsl/article/view/194 |
id |
doaj-572cb6073f8a480391602ee8f013514d |
---|---|
record_format |
Article |
spelling |
doaj-572cb6073f8a480391602ee8f013514d2020-11-25T02:38:56ZengAssociation of Digital Forensics, Security and LawJournal of Digital Forensics, Security and Law1558-72151558-72232007-09-01234556117Providing a Foundation for Analysis of Volatile Data StoresTimothy Vidas0Naval Postgraduate School<p class="JDFSLParagraph">Current threats against typical computer systems demonstrate a need for forensic analysis of memory-resident data in addition to the conventional static analysis common today. Certain attacks and types of malware exist solely in memory and leave little or no evidentiary information on nonvolatile stores such as a hard disk drive. The desire to preserve system state at the time of response may even warrant memory acquisition independent of perceived threats and the ability to analyze the acquired duplicate. </p><p class="JDFSLParagraph">Tools capable of duplicating various types of volatile data stores are becoming widely available. Once the data store has been duplicated, current forensic procedures have no method for extrapolating further useful information from the duplicate. This paper is focused on providing the groundwork for performing forensic investigations on the data that is typically stored in a volatile data store, such as system RAM.</p><p class="JDFSLParagraph">It is intended that, when combined with good acquisition techniques, it will be shown that it is possible to obtain more post incident response information along with less impact to potential evidence when compared to typical incident response procedures. </p>http://ojs.jdfsl.org/index.php/jdfsl/article/view/194 |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Timothy Vidas |
spellingShingle |
Timothy Vidas Providing a Foundation for Analysis of Volatile Data Stores Journal of Digital Forensics, Security and Law |
author_facet |
Timothy Vidas |
author_sort |
Timothy Vidas |
title |
Providing a Foundation for Analysis of Volatile Data Stores |
title_short |
Providing a Foundation for Analysis of Volatile Data Stores |
title_full |
Providing a Foundation for Analysis of Volatile Data Stores |
title_fullStr |
Providing a Foundation for Analysis of Volatile Data Stores |
title_full_unstemmed |
Providing a Foundation for Analysis of Volatile Data Stores |
title_sort |
providing a foundation for analysis of volatile data stores |
publisher |
Association of Digital Forensics, Security and Law |
series |
Journal of Digital Forensics, Security and Law |
issn |
1558-7215 1558-7223 |
publishDate |
2007-09-01 |
description |
<p class="JDFSLParagraph">Current threats against typical computer systems demonstrate a need for forensic analysis of memory-resident data in addition to the conventional static analysis common today. Certain attacks and types of malware exist solely in memory and leave little or no evidentiary information on nonvolatile stores such as a hard disk drive. The desire to preserve system state at the time of response may even warrant memory acquisition independent of perceived threats and the ability to analyze the acquired duplicate. </p><p class="JDFSLParagraph">Tools capable of duplicating various types of volatile data stores are becoming widely available. Once the data store has been duplicated, current forensic procedures have no method for extrapolating further useful information from the duplicate. This paper is focused on providing the groundwork for performing forensic investigations on the data that is typically stored in a volatile data store, such as system RAM.</p><p class="JDFSLParagraph">It is intended that, when combined with good acquisition techniques, it will be shown that it is possible to obtain more post incident response information along with less impact to potential evidence when compared to typical incident response procedures. </p> |
url |
http://ojs.jdfsl.org/index.php/jdfsl/article/view/194 |
work_keys_str_mv |
AT timothyvidas providingafoundationforanalysisofvolatiledatastores |
_version_ |
1724788722936840192 |