Analysis of Windows memory for forensic investigations

Containing most recently accessed data and information about the status of a computer system, physical memory is one of the best sources of digital evidence. This thesis presents new methods to analyze Windows physical memory of compromised computers for cyber forensics. The thesis includes three di...

Full description

Bibliographic Details
Main Author: Hejazi, Seyed Mahmood
Format: Others
Published: 2009
Online Access:http://spectrum.library.concordia.ca/976393/1/MR63196.pdf
Hejazi, Seyed Mahmood <http://spectrum.library.concordia.ca/view/creators/Hejazi=3ASeyed_Mahmood=3A=3A.html> (2009) Analysis of Windows memory for forensic investigations. Masters thesis, Concordia University.
id ndltd-LACETR-oai-collectionscanada.gc.ca-QMG.976393
record_format oai_dc
spelling ndltd-LACETR-oai-collectionscanada.gc.ca-QMG.9763932013-10-22T03:47:51Z Analysis of Windows memory for forensic investigations Hejazi, Seyed Mahmood Containing most recently accessed data and information about the status of a computer system, physical memory is one of the best sources of digital evidence. This thesis presents new methods to analyze Windows physical memory of compromised computers for cyber forensics. The thesis includes three distinct contributions to cyber forensics investigation. Firstly, by digging into details of Windows memory management, forensically important information and data structures are identified. Secondly, we proposed different methods to find files and extract them out of memory in order to rebuild executable and data files. This helps investigators obtain valuable information available in executable or data files that have been in use at incident time. Thirdly, we presented two methods for extraction of forensically sensitive information such as usernames or passwords from memory. The first method is based on fingerprints of applications in memory. In the second method, we have been able to locate and extract arguments used in function calls. This method, leads to the acquisition of important and forensically sensitive information from the memory stack. Finally, to bring these contributions to application level, a framework for cyber forensics investigations has been developed that helps finding sensitive information 2009 Thesis NonPeerReviewed application/pdf http://spectrum.library.concordia.ca/976393/1/MR63196.pdf Hejazi, Seyed Mahmood <http://spectrum.library.concordia.ca/view/creators/Hejazi=3ASeyed_Mahmood=3A=3A.html> (2009) Analysis of Windows memory for forensic investigations. Masters thesis, Concordia University. http://spectrum.library.concordia.ca/976393/
collection NDLTD
format Others
sources NDLTD
description Containing most recently accessed data and information about the status of a computer system, physical memory is one of the best sources of digital evidence. This thesis presents new methods to analyze Windows physical memory of compromised computers for cyber forensics. The thesis includes three distinct contributions to cyber forensics investigation. Firstly, by digging into details of Windows memory management, forensically important information and data structures are identified. Secondly, we proposed different methods to find files and extract them out of memory in order to rebuild executable and data files. This helps investigators obtain valuable information available in executable or data files that have been in use at incident time. Thirdly, we presented two methods for extraction of forensically sensitive information such as usernames or passwords from memory. The first method is based on fingerprints of applications in memory. In the second method, we have been able to locate and extract arguments used in function calls. This method, leads to the acquisition of important and forensically sensitive information from the memory stack. Finally, to bring these contributions to application level, a framework for cyber forensics investigations has been developed that helps finding sensitive information
author Hejazi, Seyed Mahmood
spellingShingle Hejazi, Seyed Mahmood
Analysis of Windows memory for forensic investigations
author_facet Hejazi, Seyed Mahmood
author_sort Hejazi, Seyed Mahmood
title Analysis of Windows memory for forensic investigations
title_short Analysis of Windows memory for forensic investigations
title_full Analysis of Windows memory for forensic investigations
title_fullStr Analysis of Windows memory for forensic investigations
title_full_unstemmed Analysis of Windows memory for forensic investigations
title_sort analysis of windows memory for forensic investigations
publishDate 2009
url http://spectrum.library.concordia.ca/976393/1/MR63196.pdf
Hejazi, Seyed Mahmood <http://spectrum.library.concordia.ca/view/creators/Hejazi=3ASeyed_Mahmood=3A=3A.html> (2009) Analysis of Windows memory for forensic investigations. Masters thesis, Concordia University.
work_keys_str_mv AT hejaziseyedmahmood analysisofwindowsmemoryforforensicinvestigations
_version_ 1716608160576307200