2019 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/13th IEEE International 2019
DOI: 10.1109/trustcom/bigdatase.2019.00070
|View full text |Cite
|
Sign up to set email alerts
|

Framework for the Retrieval of Social Media and Instant Messaging Evidence from Volatile Memory

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0
1

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 16 publications
(9 citation statements)
references
References 19 publications
0
8
0
1
Order By: Relevance
“…Although they are very popular, Tinder and Coffee Meets Bagel are by no means the only e-dating applications encountered in investigations. Future research will employ a new framework [20] to support evidence retrieval from other e-dating platforms on iPhones and Android devices.…”
Section: Discussionmentioning
confidence: 99%
“…Although they are very popular, Tinder and Coffee Meets Bagel are by no means the only e-dating applications encountered in investigations. Future research will employ a new framework [20] to support evidence retrieval from other e-dating platforms on iPhones and Android devices.…”
Section: Discussionmentioning
confidence: 99%
“…The memory forensics process typically involves two main phases: memory acquisition and memory analysis. Some of the most common tools used for memory acquisition in the literature include DumpIt [60,83,150] and LiMe (Linux Memory Extractor) [25,81,82,134], while other acquisition tools include FTK Imager [84], Android Debug Bridge [34,38,82], and Belkasoft Ram capturer [84]. From the review of the existing literature, it is seen that DumpIt is the most common choice for memory acquisition in Windows machines.…”
Section: Memory Acquisitionmentioning
confidence: 99%
“…Despite this limitation, the framework was experimentally tested on different social media and messaging platforms and operating systems, successfully retrieving valuable data that examiners could use in an investigation, including usernames and passwords for specific social media accounts. However, Thantilage and Le Khac (2019) should expand their investigation to include mobile devices and other smart home appliances. Mittal et al (2021) have contributed to the field of data carving and memory forensics by presenting a new identification method for files, as depicted in Fig.…”
Section: Volatile Memory Evidence Retrievalmentioning
confidence: 99%