Significance of Residual Artifacts from Random Access Memory
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 136 | Views: 328

M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 5 Issue 5, May 2016 | Popularity: 6.2 / 10


     

Significance of Residual Artifacts from Random Access Memory

Sreelakshmi K, Princy Sugathan


Abstract: Insistent data-oriented approaches in computer forensics face some limitations regarding a number of technological developments, that make an in-time investigation more and more difficult. In order to cope with these issues, security professionals have started to inspect alternative data sources and emphasize the value of volatile system information in RAM more recently. By imaging this part of computer memory and by performing forensics analysis of the data located in RAM, it can be easily concluded that accomplishing RAM imagining and analysis should be one of the essential steps in any forensic investigation. This paper will give a brief introduction to digital forensics and the role of live data forensics. Furthermore, the main goal will be to show and explain the importance of forensics of live machines and artifacts which can be found and are used for extracting and analysing data from RAM.


Keywords: Digital forensics, RAM, Live Data Forensics, Volatile Data, Memory Acquisition


Edition: Volume 5 Issue 5, May 2016


Pages: 201 - 204


DOI: https://www.doi.org/10.21275/NOV163234



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Sreelakshmi K, Princy Sugathan, "Significance of Residual Artifacts from Random Access Memory", International Journal of Science and Research (IJSR), Volume 5 Issue 5, May 2016, pp. 201-204, https://www.ijsr.net/getabstract.php?paperid=NOV163234, DOI: https://www.doi.org/10.21275/NOV163234

Similar Articles

Downloads: 110

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014

Pages: 1404 - 1408

A Joint Forensic System to Detect Image Forgery using Copy Move Forgery Detection and Double JPEG Compression Approaches

Dhara Anandpara, Rohit Srivastava

Share this Article

Downloads: 116

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 1544 - 1551

Security Measures in SCADA Systems

Steffi Paul Kalib, Manoj K. Rawat

Share this Article

Downloads: 117

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015

Pages: 2452 - 2455

A Review on Big Data Management and NoSQL Databases in Digital Forensics

Nikhil Mangle, Prof. Praful B. Sambhare

Share this Article

Downloads: 120 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2024 - 2027

A Survey on Corrupted Video Recovery Using CODEC Specifications

Avinash Deshmukh, Manisha Desai

Share this Article

Downloads: 130

Survey Paper, Computer Science & Engineering, India, Volume 6 Issue 11, November 2017

Pages: 927 - 929

A Survey Paper on Revealing Image Forgery Using Image Manipulation Detection

Deepak B. Waghchaure, Ashish R. Gaikwad

Share this Article



Top