Downloads: 136 | Views: 328
M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 5 Issue 5, May 2016 | Popularity: 6.2 / 10
Significance of Residual Artifacts from Random Access Memory
Sreelakshmi K, Princy Sugathan
Abstract: Insistent data-oriented approaches in computer forensics face some limitations regarding a number of technological developments, that make an in-time investigation more and more difficult. In order to cope with these issues, security professionals have started to inspect alternative data sources and emphasize the value of volatile system information in RAM more recently. By imaging this part of computer memory and by performing forensics analysis of the data located in RAM, it can be easily concluded that accomplishing RAM imagining and analysis should be one of the essential steps in any forensic investigation. This paper will give a brief introduction to digital forensics and the role of live data forensics. Furthermore, the main goal will be to show and explain the importance of forensics of live machines and artifacts which can be found and are used for extracting and analysing data from RAM.
Keywords: Digital forensics, RAM, Live Data Forensics, Volatile Data, Memory Acquisition
Edition: Volume 5 Issue 5, May 2016
Pages: 201 - 204
DOI: https://www.doi.org/10.21275/NOV163234
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 110
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014
Pages: 1404 - 1408A Joint Forensic System to Detect Image Forgery using Copy Move Forgery Detection and Double JPEG Compression Approaches
Dhara Anandpara, Rohit Srivastava
Downloads: 116
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015
Pages: 1544 - 1551Security Measures in SCADA Systems
Steffi Paul Kalib, Manoj K. Rawat
Downloads: 117
Review Papers, Computer Science & Engineering, India, Volume 4 Issue 5, May 2015
Pages: 2452 - 2455A Review on Big Data Management and NoSQL Databases in Digital Forensics
Nikhil Mangle, Prof. Praful B. Sambhare
Downloads: 120 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 2024 - 2027A Survey on Corrupted Video Recovery Using CODEC Specifications
Avinash Deshmukh, Manisha Desai
Downloads: 130
Survey Paper, Computer Science & Engineering, India, Volume 6 Issue 11, November 2017
Pages: 927 - 929A Survey Paper on Revealing Image Forgery Using Image Manipulation Detection
Deepak B. Waghchaure, Ashish R. Gaikwad