Affiliation:
1. University of Alaska Fairbanks, Fairbanks, AK
Abstract
While static examination of computer systems is an important part of many digital forensics investigations, there are often important system properties present only in volatile memory that cannot be effectively recovered using static analysis techniques, such as offline hard disk acquisition and analysis. An alternative approach, involving the live analysis of target systems to uncover this volatile data, presents significant risks and challenges to forensic investigators as observation techniques are generally intrusive and can affect the system being observed. This paper provides a discussion of live digital forensics analysis through virtual introspection and presents a suite of virtual introspection tools developed for Xen (VIX tools). The VIX tools suite can be used for unobtrusive digital forensic examination of volatile system data in virtual machines, and addresses a key research area identified in the virtualization in digital forensics research agenda [22].
Publisher
Association for Computing Machinery (ACM)
Reference35 articles.
1. Access Data. Retrieved August 10 2007 from http://www.accessdata.com/ Access Data. Retrieved August 10 2007 from http://www.accessdata.com/
2. Using VMM-based sensors to monitor honeypots
3. A hardware-based memory acquisition procedure for digital investigations
4. The Virtualization Reality
Cited by
67 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Enhancing Cloud Security: A Comprehensive Framework for Real-Time Detection, Analysis and Cyber Threat Intelligence Sharing;Advances in Science, Technology and Engineering Systems Journal;2023-12
2. Quantifying Paging on Recoverable Data from Windows User-Space Modules;Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering;2022
3. A defensible role-based case management system for remote forensic investigation;2021 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS);2021-02-19
4. Blue-Pill Oxpecker: a VMI Platform for Transactional Modification;IEEE Transactions on Cloud Computing;2021
5. Kernel-Level Rootkits Features to Train Learning Models Against Namespace Attacks on Containers;2020 7th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/2020 6th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom);2020-08