Significance of Residual Artifacts from Random Access Memory
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064



Downloads: 136 | Weekly Hits: ⮙4 | Monthly Hits: ⮙14

M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 5 Issue 5, May 2016

Significance of Residual Artifacts from Random Access Memory

Sreelakshmi K, Princy Sugathan

Insistent data-oriented approaches in computer forensics face some limitations regarding a number of technological developments, that make an in-time investigation more and more difficult. In order to cope with these issues, security professionals have started to inspect alternative data sources and emphasize the value of volatile system information in RAM more recently. By imaging this part of computer memory and by performing forensics analysis of the data located in RAM, it can be easily concluded that accomplishing RAM imagining and analysis should be one of the essential steps in any forensic investigation. This paper will give a brief introduction to digital forensics and the role of live data forensics. Furthermore, the main goal will be to show and explain the importance of forensics of live machines and artifacts which can be found and are used for extracting and analysing data from RAM.

Keywords: Digital forensics, RAM, Live Data Forensics, Volatile Data, Memory Acquisition

Edition: Volume 5 Issue 5, May 2016

Pages: 201 - 204

Share this Article

How to Cite this Article?

Sreelakshmi K, Princy Sugathan, "Significance of Residual Artifacts from Random Access Memory", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=NOV163234, Volume 5 Issue 5, May 2016, 201 - 204

Enter Your Email Address and Click Download Button





Similar Articles with Keyword 'Digital forensics'

Downloads: 110 | Weekly Hits: ⮙1 | Monthly Hits: ⮙6

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1404 - 1408

A Joint Forensic System to Detect Image Forgery using Copy Move Forgery Detection and Double JPEG Compression Approaches

Dhara Anandpara, Rohit Srivastava

Share this Article

Downloads: 116 | Weekly Hits: ⮙2 | Monthly Hits: ⮙9

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 1544 - 1551

Security Measures in SCADA Systems

Steffi Paul Kalib, Manoj K. Rawat

Share this Article

Downloads: 117

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2452 - 2455

A Review on Big Data Management and NoSQL Databases in Digital Forensics

Nikhil Mangle, Prof. Praful B. Sambhare

Share this Article

Downloads: 118 | Weekly Hits: ⮙5 | Monthly Hits: ⮙12

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2024 - 2027

A Survey on Corrupted Video Recovery Using CODEC Specifications

Avinash Deshmukh, Manisha Desai

Share this Article

Downloads: 130 | Monthly Hits: ⮙8

Survey Paper, Computer Science & Engineering, India, Volume 6 Issue 11, November 2017

Pages: 927 - 929

A Survey Paper on Revealing Image Forgery Using Image Manipulation Detection

Deepak B. Waghchaure, Ashish R. Gaikwad

Share this Article

Similar Articles with Keyword 'RAM'

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, Russia, Volume 10 Issue 4, April 2021

Pages: 1115 - 1121

Conceptual Modeling of a Tramcar

Iftikhar B. Abbasov, Viacheslav V. Orekhov

Share this Article

Downloads: 32 | Weekly Hits: ⮙2

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2267 - 2274

Two Accounts of Solitude in Online Communal Networks

Alla Venu Gopal, G. Srinivasa Reddy

Share this Article

Downloads: 34 | Weekly Hits: ⮙5 | Monthly Hits: ⮙22

Research Paper, Computer Science & Engineering, Syria, Volume 10 Issue 3, March 2021

Pages: 524 - 528

Detection and Classification of Skin Cancer using Image Processing Techniques

Maha Shawish, Balsam Eid

Share this Article

Downloads: 36 | Weekly Hits: ⮙3

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1789 - 1791

The Survey Paper on Importance of Integration of Knowledge Management and Business Intelligence

Vina Lomte, Saloni Shah

Share this Article

Downloads: 38 | Weekly Hits: ⮙4 | Monthly Hits: ⮙16

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 2, February 2021

Pages: 1673 - 1677

Convolution Neural Network Based Image Recognition

Sofia Hamid, Mrigana Walia

Share this Article



Top