2013
DOI: 10.1016/j.diin.2013.06.012
|View full text |Cite
|
Sign up to set email alerts
|

Anti-forensic resilient memory acquisition

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
36
1
4

Year Published

2015
2015
2023
2023

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 62 publications
(41 citation statements)
references
References 7 publications
0
36
1
4
Order By: Relevance
“…This fact is quite surprising, considering that recent works have indicated quality deficiencies in popular imaging solutions under certain conditions that may severely impede or even prevent thorough artifact examination at a later time (V€ omel and Stüttgen, 2013;Stüttgen and Cohen, 2013).…”
Section: Introductionmentioning
confidence: 87%
See 2 more Smart Citations
“…This fact is quite surprising, considering that recent works have indicated quality deficiencies in popular imaging solutions under certain conditions that may severely impede or even prevent thorough artifact examination at a later time (V€ omel and Stüttgen, 2013;Stüttgen and Cohen, 2013).…”
Section: Introductionmentioning
confidence: 87%
“…First, more extensive studies concerning the quality of imaging applications were presented by V€ omel and and Stüttgen and Cohen (2013). We will further elaborate upon these works and assess the performance of common imaging products, specifically when sophisticated malware species are present.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Subsequently, analysts use plug-and-play devices to duplicate the computer disk data, and then conduct a post hoc analysis of image data. However, with the continuous development of computer hardware, large-capacity memory is widely used; moreover, a variety of encryption and anti-forensic technologies have emerged [9,12], which result in a significant loss of valuable information in the traditional forensics process. Volatile data in a computer memory can contain critical information about a crime, such as the password used to encrypt information, system states in the criminal process, traces of use of anti-forensics tools and related to system-level malicious software or backdoors that are easily overlooked in the analysis of survey data from a hard disk, and other related information.…”
Section: Introductionmentioning
confidence: 99%
“…(e.g., [37,51,59,211,243]), or through VMI. In Section 5.4, we evaluate our approach using both LO-PHI and MalT techniques to gather memory snapshots.…”
Section: Memory Snapshotsmentioning
confidence: 99%