Basic Memory Analysis

0Citations
Citations of this article
1Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Computer memory (RAM) is a great source of forensic artifacts as it contains information that the computer worked on since the last reboot. Also, information must take its true unencrypted form in memory, in order to be meaningful for the user. From a forensic perspective, a memory dump can contain vital information such as passwords, decrypted versions of encrypted data and malware in its true form. This chapter provides the reader with an introduction to memory analysis using the open source tool Volatility. Using Volatility rather than treating a memory dump as a big blob of data allows the examiner to complete a more structured analysis. This chapter demonstrates how to use Volatility to find several key artifacts including list of user on the system, files loaded into memory and information relating to Truecrypt, a tool used for encryption. The aim of the chapter is to show the reader the basic functionality of Volatility so that the reader can continue to learn memory analysis on his own.

Author supplied keywords

Cite

CITATION STYLE

APA

Kävrestad, J. (2017). Basic Memory Analysis. In SpringerBriefs in Computer Science (Vol. 0, pp. 117–122). Springer. https://doi.org/10.1007/978-3-319-67450-6_11

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free