Memory forensics

Memory forensics is forensic analysis of a computer's memory dump. Its primary application is investigation of advanced computer attacks which are… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2017
Review
2017
Traditionally, digital forensics focused on artifacts located on the storage devices of computer systems, mobile phones, digital… (More)
Is this relevant?
2015
2015
To a great degree, research in memory forensics concentrates on the acquisition and analysis of kerneland user-space software… (More)
  • figure 1
  • figure 2
  • table 2
  • table 1
Is this relevant?
2014
2014
Nowadays several papers have shown the ability to dump the EEPROM area of several Java Cards leading to the disclosure of already… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2014
2014
As the use of virtual machine environments increases, virtual machines forensics is becoming more and more important and emergent… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2013
2013
Physical memory can contain various data such as user passwords, encryption keys, web browser activity and other traces… (More)
  • figure 1
  • figure 3
  • figure 4
  • figure 2
Is this relevant?
2013
2013
Memory forensics is the branch of computer forensics that aims at extracting artifacts from memory snapshots taken from a running… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
Is this relevant?
Highly Cited
2010
Highly Cited
2010
In this paper, we proposed an automated system to perform a live memory forensic analysis for mobile phones. We investigated the… (More)
Is this relevant?
2010
2010
The IEEE 1394 “FireWire” interface provides a means for acquiring direct memory access. We discuss how this can be used to… (More)
  • figure 1
  • table 1
  • table 2
  • figure 2
  • table 3
Is this relevant?
Highly Cited
2007
Highly Cited
2007
In this work, we demonstrate the integral role of volatile memory analysis in the digital investigation process and how that… (More)
  • figure 1
  • table 1
  • table 2
  • figure 2
  • figure 3
Is this relevant?
Review
2007
Review
2007
This paper gives an overview of all known “live” memory collection techniques on a Windows system, and freely available memory… (More)
Is this relevant?