slugVolatile Memory Based Forensic Artifacts & Analysis
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2014, Vol 2, Issue 1
Abstract
Today’s technology grows its roots in positive and negatives both directions. Cyber criminals are always get one step ahead then the investigator. Digital forensics in the live environment is the biggest challenge. Aquistion of live artifacts on running system needs expertise to achieve expected results. One of the most important areas where every forensicator looks into is Memory, i.e. RAM - Random Access Memory. RAM is a volatile memory which flushes when system is shut down or restart. So before shutting down the system Memory dump should be taken. It is very important aspect for carving information resided into the volatile memory.[1] Here a role of a volatile memory analysis in digital forensics and the importance of the physical memory analysis is proposed. It is very useful in real time evidence acquisition analysis. Further we have introduced some of the tools and techniques used in acquisition and analysis of memory.
Authors and Affiliations
Rushita Dave, Nilay R. Mistry, Dr. M. S. Dahiya
Thermal comfort assessment for naturally ventilated classrooms during summer in composite climate of Jaipur
Background: Considering the importance of comfort requirements in classrooms and the fast growing number of institutes for higher education in India, classroom thermal comfort needs serious attention. Methodology: Thir...
Performance and Emission Characteristics of a CI Engine Fueled With Diesel- Waste Fried Oil Blend with Dee as Additive
An experimental study is conducted to evaluate the effects of using diethyl ether as additive to waste fried oil/diesel blend on the performance and emissions of a direct injection diesel engine. The waste fried oil and...
Comparison of Effectiveness of Two Different Setups of Double Pipe Heat Exchangers
At present cost and performance are the two major factors which plays a vital role in the selection of any augmentation method of heat transfer. Cutting of triangular shaped fins is also very difficult to insert inside...
Using Internet of Things for Home Applications
By implementing IoT along with a home automated system, which monitors the sensor data, like temperature, gas, light, motion sensors, and also actuates a process according to the requirement. For example turning the lig...
slugA Survey on Image Matching Techniques
The matching is a difficult task in model based object recognition system because images do not present perfect data, noise and occlusion. Several image matching techniques have been developed to find logos from the rea...