International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064



Research Paper | Information Technology | Malaysia | Volume 2 Issue 6, June 2013

A Study: Volatility Forensic On Hidden Files

Cutifa Safitri

More and more forensic researchers gain findings by live investigating memory volatility. Forensic research on volatile data is nowadays big area of interest. In the early days, investigators pulled the plug, but now it could be very interesting to capture the volatile data of the system. Memory forensics and data carving are among methods that are usually used during volatile investigation. Before pulled the plug, it is often desirable to capture volatile information that may not be recorded in a file system or image backup, such as processes and the contents of memory. This data may hold clues as to the attackers identity or the attack methods that were used. However, risks are associated with acquiring information from the live system. Any action performed on the host itself will alter the state of the machine to some extent. In paper, an analysis of hidden process on volatility is conducted.

Keywords: RAM, Forensic, Volatility, Hidden Files

Edition: Volume 2 Issue 6, June 2013

Pages: 71 - 75

Share this Article

How to Cite this Article?

Cutifa Safitri, "A Study: Volatility Forensic On Hidden Files", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=IJSRON20131139, Volume 2 Issue 6, June 2013, 71 - 75

48 PDF Views | 35 PDF Downloads

Download Article PDF

Similar Articles with Keyword 'RAM'

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 91 - 93

A Scalable Two-Phase Bottom-Up Specialization Prospective for Data Anonymization Using Map Reduce on Cloud

Dilipprasad.E, Ajay.R, K. Durairaj

Share this Article

Survey Paper, Information Technology, India, Volume 4 Issue 5, May 2015

Pages: 2439 - 2441

Improving the Reliability of the Automation Framework based on Code Coverage Analysis

Snehalata Giraddi, Merin Meleet

Share this Article

Research Paper, Information Technology, India, Volume 5 Issue 2, February 2016

Pages: 1470 - 1474

Role Based Encryption with Efficient Access Control in Cloud Storage

G. V. Bandewar, R. H. Borhade

Share this Article

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 3 Issue 5, May 2014

Pages: 1844 - 1847

Privacy Preserving in Participatory Sensing

Deepika Nair, Bhuvaneswari Raju

Share this Article

Review Papers, Information Technology, Kenya, Volume 4 Issue 2, February 2015

Pages: 1293 - 1296

Management of Records in Health Institutions

Samuel Macharia Were

Share this Article

Similar Articles with Keyword 'Forensic'

Survey Paper, Information Technology, India, Volume 3 Issue 10, October 2014

Pages: 607 - 611

A Survey Based on Fingerprint Recognition - Minutiae

Annapoorani. D, Caroline Viola Stella Mery. M

Share this Article

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 4 Issue 3, March 2015

Pages: 2473 - 2475

Intrusion Detection System with Automatic Forensic Data Acquisition and Firewall

Laimayum Bulbul Sharma, J. Dharani

Share this Article

Research Paper, Information Technology, India, Volume 3 Issue 11, November 2014

Pages: 2791 - 2794

Internet Usage Analysis Using Karl Pearson?s Coefficient of Correlation -A Computer Forensic Investigation

Suneeta Satpathy, Sateesh K. Pradhan, Subhasish Mohapatra

Share this Article

Research Paper, Information Technology, Malaysia, Volume 2 Issue 6, June 2013

Pages: 71 - 75

A Study: Volatility Forensic On Hidden Files

Cutifa Safitri

Share this Article

Research Paper, Information Technology, India, Volume 6 Issue 6, June 2017

Pages: 5 - 8

Memory Forensics: Tools Comparison

Pooja Salave, Atisha Wakdikar

Share this Article



Top