Affiliation:
1. University of Glamorgan, Wales, United Kingdom
2. Gwent Police Headquarters, United Kingdom
Abstract
The current approach to forensic examination during search and seizure has predominantly been to pull the plug on the suspect machine and subsequently perform a post mortem examination on the storage medium. However, with the advent of larger capacities of memory, drive encryption and anti-forensics, this procedure may result in the loss of valuable evidence. Volatile data may be vital in determining criminal activity; it may contain passwords used for encryption, indications of anti-forensic techniques, memory resident malware which would otherwise go unnoticed by the investigator. This paper emphasizes the importance of understanding the potential value of volatile data and how best to collate forensic artifacts to the benefit of the investigation, ensuring the preservation and integrity of the evidence. The paper will review current methods for volatile data collection, assessing the capabilities, limitations and liabilities of current tools and techniques available to the forensic investigator.
Publisher
Association for Computing Machinery (ACM)
Reference29 articles.
1. ACPO Good Practice Guidelines for Computer Based Evidence 2006 page 20 and 21 ACPO Good Practice Guidelines for Computer Based Evidence 2006 page 20 and 21
2. Live forensics
3. A hardware-based memory acquisition procedure for digital investigations
4. Risks of live digital forensic analysis
Cited by
20 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献