Windows operating systems agnostic memory analysis

20Citations
Citations of this article
87Readers
Mendeley users who have this article in their library.

Abstract

Memory analysis is an integral part of any computer forensic investigation, providing access to volatile data not found on a drive image. While memory analysis has recently made significant progress, it is still hampered by hard-coded tools that cannot generalize beyond the specific operating system and version they were developed for. This paper proposes using the debug structures embedded in memory dumps and Microsoft's program database (PDB) files to create a flexible tool that takes an arbitrary memory dump from any of the family of Windows NT operating systems and extract process, configuration, and network activity information. The debug structures and PDB files are incorporated into a memory analysis tool and tested against dumps from 32-bit Windows XP with physical address extensions (PAE) enabled and disabled, 32-bit Windows Vista with PAE enabled, and 64-bit Windows 7 systems. The results show the analysis tool is able to identify and parse an arbitrary memory dump and extract process, registry, and network communication information. © 2010 Digital Forensic Research Workshop. Published by Elsevier Ltd. All rights reserved.

Cite

CITATION STYLE

APA

Okolica, J., & Peterson, G. L. (2010). Windows operating systems agnostic memory analysis. Digital Investigation, 7(SUPPL.). https://doi.org/10.1016/j.diin.2010.05.007

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free