A Study: Volatility Forensic On Hidden Files

Journal Title: UNKNOWN - Year 2013, Vol 2, Issue 6

Abstract

"More and more forensic researchers gain findings by live investigating memory volatility. Forensic research on volatile data is nowadays big area of interest. In the early days, investigators pulled the plug, but now it could be very interesting to capture the volatile data of the system. Memory forensics and data carving are among methods that are usually used during volatile investigation. Before pulled the plug, it is often desirable to capture volatile information that may not be recorded in a file system or image backup, such as processes and the contents of memory. This data may hold clues as to the attacker’s identity or the attack methods that were used. However, risks are associated with acquiring information from the live system. Any action performed on the host itself will alter the state of the machine to some extent. In paper, an analysis of hidden process on volatility is conducted. "

Authors and Affiliations

Keywords

Related Articles

Implementation of Adaptive Viterbi Decoder for Wireless Communication

Implementation of Adaptive Viterbi Decoder for Wireless Communication

Instructional Leadership and Its Effect on the Teaching and Learning Process: the Case of Head teachers in Selected Basic Schools in the Central Province of Zambia

Research asserts that instructional leadership by head teachers affects the teaching and learning process positively and consequently leads to high pupil performance. The National Education Policy of 1996 in Zambia ident...

Implementation of Gesture Recognition System for Home Automation using FPGA and ARM Controller

New natural methods of control are needed due to the increase in the number of industrial and home appliances that must be controlled. In this paper presents releasable fpga based hand gesture recognition system is propo...

A Secure Account based Mobile Payment Protocol with Public Key Cryptography and Biometric Characteristics

A Secure Account based Mobile Payment Protocol with Public Key Cryptography and Biometric Characteristics

Image Embedding in QR Code

Quick Response (QR) code is a two dimensional barcode widely used in many applications such as manufacturing, advertising, retailing etc. QR code looks like a noisy structure. The appearance of QR code can be improved by...

Download PDF file
  • EP ID EP336342
  • DOI -
  • Views 74
  • Downloads 0

How To Cite

(2013). A Study: Volatility Forensic On Hidden Files. UNKNOWN, 2(6), -. https://www.europub.co.uk/articles/-A-336342