Abstract
The analysis of computer memory is becoming increasingly important in digital forensic investigations. Volatile memory analysis can provide valuable indicators on what to search for on a hard drive, help recover passwords to encrypted hard drives and possibly refute defense claims that criminal activity was the result of a malware infection. Historically, digital forensic investigators have performed live response by executing multiple utilities. However, using a single tool to capture and analyze computer memory is more efficient and has less impact on the system state (potential evidence). This paper describes CMAT, a self-contained tool that extracts forensic information from a memory dump and presents it in a format that is suitable for further analysis. A comparison of the results obtained with utilities that are commonly employed in live response demonstrates that CMAT provides similar information and identifies malware that is missed by the utilities. © 2010 International Federation for Information Processing.
Author supplied keywords
Cite
CITATION STYLE
Okolica, J., & Peterson, G. (2010). A compiled memory analysis tool. In IFIP Advances in Information and Communication Technology (Vol. 337 AICT, pp. 195–204). Springer New York LLC. https://doi.org/10.1007/978-3-642-15506-2_14
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.