2008
DOI: 10.1016/j.diin.2008.05.014
|View full text |Cite
|
Sign up to set email alerts
|

Forensic memory analysis: Files mapped in memory

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
21
0

Year Published

2009
2009
2015
2015

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 40 publications
(21 citation statements)
references
References 4 publications
0
21
0
Order By: Relevance
“…The newly created data set was dubbed Baseline Carving Data Set 6 . The overall purpose is to represent a file structure that is indicative of what may be encountered in investigations in order to provide more viable carving performance results.…”
Section: Data Setsmentioning
confidence: 99%
See 1 more Smart Citation
“…The newly created data set was dubbed Baseline Carving Data Set 6 . The overall purpose is to represent a file structure that is indicative of what may be encountered in investigations in order to provide more viable carving performance results.…”
Section: Data Setsmentioning
confidence: 99%
“…Furthermore, methods have also been developed for scenarios including carving network packets; e.g. IP packets from forensic images [5] and carving file objects from memory dumps [6]. Advanced file carving techniques have also been investigated including in-place file carving to reduce storage space and processing time [7] and recovery and re-assembly of fragmented JPEG files [8].…”
Section: Introductionmentioning
confidence: 99%
“…Sarmoria and Chapin [177] present an approach for monitoring access to shared memory mapped files and Schuster [185] examines the impact of Windows memory allocation strategies on process and context persistence in memory. van Baar et al [206] describe a method for recovering files mapped in memory and to link mapped file information process data. The paper presents a case for extracting such data which reduces the amount of unidentified data in memory dumps.…”
Section: Digital Timestamps and Time-liningmentioning
confidence: 99%
“…However, the dynamic nature of memory means that obtaining a complete and consistent perspective of memory is impossible without taking multiple memory snapshots. In addition to problems posed by memory fragmentation, the analysis of data is complicated by the fact that memory structures vary considerably for different systems [16].…”
Section: Related Workmentioning
confidence: 99%
“…Best practices have been specified to ensure that acquisition methods minimize the impact on volatile system memory and that relevant evidentiary data can be extracted from a memory dump [3,12,16]. However, most approaches focus only on a single snapshot of system memory, which has several drawbacks.…”
Section: Introductionmentioning
confidence: 99%