A Study: Volatility Forensic On Hidden Files
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Research Paper | Information Technology | Malaysia | Volume 2 Issue 6, June 2013

A Study: Volatility Forensic On Hidden Files

Cutifa Safitri

More and more forensic researchers gain findings by live investigating memory volatility. Forensic research on volatile data is nowadays big area of interest. In the early days, investigators pulled the plug, but now it could be very interesting to capture the volatile data of the system. Memory forensics and data carving are among methods that are usually used during volatile investigation. Before pulled the plug, it is often desirable to capture volatile information that may not be recorded in a file system or image backup, such as processes and the contents of memory. This data may hold clues as to the attackers identity or the attack methods that were used. However, risks are associated with acquiring information from the live system. Any action performed on the host itself will alter the state of the machine to some extent. In paper, an analysis of hidden process on volatility is conducted.

Keywords: RAM, Forensic, Volatility, Hidden Files

Edition: Volume 2 Issue 6, June 2013

Pages: 71 - 75

Share this Article

How to Cite this Article?

Cutifa Safitri, "A Study: Volatility Forensic On Hidden Files", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=IJSRON20131139, Volume 2 Issue 6, June 2013, 71 - 75

92 PDF Views | 66 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'RAM'

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 91 - 93

A Scalable Two-Phase Bottom-Up Specialization Prospective for Data Anonymization Using Map Reduce on Cloud

Dilipprasad.E, Ajay.R, K. Durairaj

Share this Article

Research Paper, Information Technology, Kenya, Volume 5 Issue 2, February 2016

Pages: 1723 - 1725

An E-Government-Integration Framework for County Governments in Kenya

Florence K. Maweu, Josphat Karani

Share this Article

Research Paper, Information Technology, India, Volume 4 Issue 12, December 2015

Pages: 1101 - 1105

Infectious Malware-Analysis and Protective Measures

Harjit Singh

Share this Article

Informative Article, Information Technology, Tanzania, Volume 3 Issue 11, November 2014

Pages: 950 - 953

An Overview of Multi-Platform Mobile Application with Mobile Push Message Technology

R. Jayaraj

Share this Article

Research Paper, Information Technology, Indonesia, Volume 8 Issue 10, October 2019

Pages: 1387 - 1393

Analysis of Factors Affecting the Intention to Use Internet Banking in Indonesia

Brolyn Pratama, Harisno, Abiyyu Fawwaz Kanz

Share this Article

Similar Articles with Keyword 'Forensic'

Survey Paper, Information Technology, India, Volume 3 Issue 10, October 2014

Pages: 607 - 611

A Survey Based on Fingerprint Recognition - Minutiae

Annapoorani. D, Caroline Viola Stella Mery. M

Share this Article

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 4 Issue 3, March 2015

Pages: 2473 - 2475

Intrusion Detection System with Automatic Forensic Data Acquisition and Firewall

Laimayum Bulbul Sharma, J. Dharani

Share this Article

Research Paper, Information Technology, Malaysia, Volume 2 Issue 6, June 2013

Pages: 71 - 75

A Study: Volatility Forensic On Hidden Files

Cutifa Safitri

Share this Article

Research Paper, Information Technology, India, Volume 3 Issue 11, November 2014

Pages: 2791 - 2794

Internet Usage Analysis Using Karl Pearson?s Coefficient of Correlation -A Computer Forensic Investigation

Suneeta Satpathy, Sateesh K. Pradhan, Subhasish Mohapatra

Share this Article

Research Paper, Information Technology, India, Volume 6 Issue 6, June 2017

Pages: 5 - 8

Memory Forensics: Tools Comparison

Pooja Salave, Atisha Wakdikar

Share this Article
Top