2013
DOI: 10.5120/14123-2240
|View full text |Cite
|
Sign up to set email alerts
|

Safeguarding Forensic Integrity of Virtual Environment Evidence

Abstract: Virtual machine technology has emerged with powerful features, offering several benefits and promising revolutionary outcomes. It is one technology that combines into one package several computing concepts like resource management, emulation, time-sharing, isolation and partitioning. These features have made evidence acquisition and preservation difficult and in some cases unfeasible. The aftermath is that conventional approaches to integrity preservation have not yielded the best results required to facilitat… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 14 publications
0
2
0
Order By: Relevance
“…Attackers not only evade detection mechanisms but also they will try to make it difficult for forensics investigators to understand their intentions [69], [70]. Malwares can exploit systems in ways to make it difficult to be realised or investigated easily.…”
Section: Anti-forensics Techniquesmentioning
confidence: 99%
See 1 more Smart Citation
“…Attackers not only evade detection mechanisms but also they will try to make it difficult for forensics investigators to understand their intentions [69], [70]. Malwares can exploit systems in ways to make it difficult to be realised or investigated easily.…”
Section: Anti-forensics Techniquesmentioning
confidence: 99%
“…The idea here is intelligent gathering while protecting live environment, and ultimately paralysing the Trojan botnet. With the utilisation of virtual machines or cloud based simulation platforms security experts can gather sufficient evidence up to successful prosecution provided the integrity of the evidence is accounted for [6], [70]. With offensive strategies skiing on the edge of the line of legality and ethics, one needs to be very careful as attacking back is not only unethical but illegal too.…”
Section: Offensive Strategiesmentioning
confidence: 99%