“…[58], [61], [66], [67], [69], [75] Lack of standardized tools and technologies [59], [65], [66], [69], [70], [74] Forensic seizure and analysis of proprietary and/or distributed filesystems [58]- [60], [70], [71], [71], [73] Variety of format and content type. Not standard logging features and settings [61], [65]- [70], [73], [75] No validation/verification in real-life scenarios and large datasets [72], [74] Subjectivity of the evaluation of content retrieval algorithms [72], [74] Advanced knowledge and training of analysts and investigators [69], [72] Lack of guidance for investigators regarding selective search and seize. Subjectivity of search terms based on investigator's experience [69], [74] Difficulty to apply low-level analysis techniques, hindering correctness of the results [62], [70] Sophisticated malware implementing antiforensic techniques [61]- [63], [74] Volatile data acquisition due to hardware constraints [71] Stealthy non-memory-resident malware [64] Handling, execution and monitoring of memory [61], [63], […”