International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 136

M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 5 Issue 5, May 2016


Significance of Residual Artifacts from Random Access Memory

Sreelakshmi K [4] | Princy Sugathan [2]


Abstract: Insistent data-oriented approaches in computer forensics face some limitations regarding a number of technological developments, that make an in-time investigation more and more difficult. In order to cope with these issues, security professionals have started to inspect alternative data sources and emphasize the value of volatile system information in RAM more recently. By imaging this part of computer memory and by performing forensics analysis of the data located in RAM, it can be easily concluded that accomplishing RAM imagining and analysis should be one of the essential steps in any forensic investigation. This paper will give a brief introduction to digital forensics and the role of live data forensics. Furthermore, the main goal will be to show and explain the importance of forensics of live machines and artifacts which can be found and are used for extracting and analysing data from RAM.


Keywords: Digital forensics, RAM, Live Data Forensics, Volatile Data, Memory Acquisition


Edition: Volume 5 Issue 5, May 2016,


Pages: 201 - 204


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

Sreelakshmi K, Princy Sugathan, "Significance of Residual Artifacts from Random Access Memory", International Journal of Science and Research (IJSR), Volume 5 Issue 5, May 2016, pp. 201-204, https://www.ijsr.net/get_abstract.php?paper_id=NOV163234

Similar Articles with Keyword 'Digital forensics'

Downloads: 110

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1404 - 1408

A Joint Forensic System to Detect Image Forgery using Copy Move Forgery Detection and Double JPEG Compression Approaches

Dhara Anandpara | Rohit Srivastava [2]

Share this Article

Downloads: 116

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 1544 - 1551

Security Measures in SCADA Systems

Steffi Paul Kalib | Manoj K. Rawat

Share this Article
Top