A Study: Volatility Forensic On Hidden Files
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064



Downloads: 115 | Weekly Hits: ⮙1 | Monthly Hits: ⮙9

Research Paper | Information Technology | Malaysia | Volume 2 Issue 6, June 2013

A Study: Volatility Forensic On Hidden Files

Cutifa Safitri

More and more forensic researchers gain findings by live investigating memory volatility. Forensic research on volatile data is nowadays big area of interest. In the early days, investigators pulled the plug, but now it could be very interesting to capture the volatile data of the system. Memory forensics and data carving are among methods that are usually used during volatile investigation. Before pulled the plug, it is often desirable to capture volatile information that may not be recorded in a file system or image backup, such as processes and the contents of memory. This data may hold clues as to the attackers identity or the attack methods that were used. However, risks are associated with acquiring information from the live system. Any action performed on the host itself will alter the state of the machine to some extent. In paper, an analysis of hidden process on volatility is conducted.

Keywords: RAM, Forensic, Volatility, Hidden Files

Edition: Volume 2 Issue 6, June 2013

Pages: 71 - 75

Share this Article

How to Cite this Article?

Cutifa Safitri, "A Study: Volatility Forensic On Hidden Files", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=IJSRON20131139, Volume 2 Issue 6, June 2013, 71 - 75

Enter Your Email Address and Click Download Button





Similar Articles with Keyword 'RAM'

Downloads: 43 | Weekly Hits: ⮙2

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 91 - 93

A Scalable Two-Phase Bottom-Up Specialization Prospective for Data Anonymization Using Map Reduce on Cloud

Dilipprasad.E, Ajay.R, K. Durairaj

Share this Article

Downloads: 50 | Weekly Hits: ⮙4 | Monthly Hits: ⮙11

Research Paper, Information Technology, Kenya, Volume 9 Issue 12, December 2020

Pages: 881 - 889

Factors Determining Adoption of Block Chain in the Insurance Industry: A Case of Kenya

Kanuku Musyoku, Shitanda Douglas, Nganu Margaret

Share this Article

Downloads: 101 | Weekly Hits: ⮙3 | Monthly Hits: ⮙12

Research Paper, Information Technology, Nigeria, Volume 3 Issue 4, April 2014

Pages: 528 - 535

Document Security within Institutions Using Image Steganography Technique

Ahaiwe J.

Share this Article

Downloads: 101 | Weekly Hits: ⮙2 | Monthly Hits: ⮙13

Survey Paper, Information Technology, India, Volume 4 Issue 5, May 2015

Pages: 2439 - 2441

Improving the Reliability of the Automation Framework based on Code Coverage Analysis

Snehalata Giraddi, Merin Meleet

Share this Article

Downloads: 102 | Weekly Hits: ⮙1 | Monthly Hits: ⮙11

Review Papers, Information Technology, India, Volume 3 Issue 9, September 2014

Pages: 2342 - 2346

Cloud Compiler Based on Android

Vijay R. Sonawane, Guruprasad S. Iyer, Dilip K. Jaiswal

Share this Article

Similar Articles with Keyword 'Forensic'

Downloads: 102 | Weekly Hits: ⮙6

Survey Paper, Information Technology, India, Volume 3 Issue 10, October 2014

Pages: 607 - 611

A Survey Based on Fingerprint Recognition - Minutiae

Annapoorani. D, Caroline Viola Stella Mery. M

Share this Article

Downloads: 110 | Weekly Hits: ⮙4 | Monthly Hits: ⮙10

Research Paper, Information Technology, India, Volume 3 Issue 11, November 2014

Pages: 2791 - 2794

Internet Usage Analysis Using Karl Pearson?s Coefficient of Correlation -A Computer Forensic Investigation

Suneeta Satpathy, Sateesh K. Pradhan, Subhasish Mohapatra

Share this Article

Downloads: 112 | Weekly Hits: ⮙1 | Monthly Hits: ⮙11

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 4 Issue 3, March 2015

Pages: 2473 - 2475

Intrusion Detection System with Automatic Forensic Data Acquisition and Firewall

Laimayum Bulbul Sharma, J. Dharani

Share this Article

Downloads: 115 | Weekly Hits: ⮙1 | Monthly Hits: ⮙9

Research Paper, Information Technology, Malaysia, Volume 2 Issue 6, June 2013

Pages: 71 - 75

A Study: Volatility Forensic On Hidden Files

Cutifa Safitri

Share this Article

Downloads: 164 | Weekly Hits: ⮙1 | Monthly Hits: ⮙13

Research Paper, Information Technology, India, Volume 6 Issue 6, June 2017

Pages: 5 - 8

Memory Forensics: Tools Comparison

Pooja Salave, Atisha Wakdikar

Share this Article



Top