Volatile Memory Collection and Analysis for Windows Mission-Critical Computer Systems

被引:2
|
作者
Savoldi, Antonio [1 ]
Gubian, Paolo [1 ]
机构
[1] Univ Brescia, Brescia, Italy
关键词
Blurriness; Live Forensic Analysis; Page File Collection; Ram Collection; Volatile Memory Analysis; Volatile Memory Integrity;
D O I
10.4018/jdcf.2009070103
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Most enterprises rely on the continuity of service guaranteed by means of a computer system infrastructure, which can often be based on the Windows operating system family. For such a category of systems, which might be referred to as mission-critical for the relevance of the service supplied, it is indeed fundamental to be able to define which approach could be better to apply when a digital investigation needs to be performed. This is the very goal of this paper: the definition of a forensically sound methodology which can be used to collect the full state of the machine being investigated by avoiding service interruptions. It will be pointed out why the entire volatile memory dump, with the necessary extension which is nowadays missing, is required with the purpose of being able to gather much more evidential data, by illustrating also, at the same time, the limitation and disadvantages of current state of-the-art approaches in performing the collection phase.
引用
收藏
页码:42 / 61
页数:20
相关论文
共 50 条
  • [31] Active mission assignment for improving the effectiveness of opportunistic maintenance in a fleet of mission-critical systems
    Lee, Jun
    Yu, Jaesang
    Hong, Yoo S.
    INTERNATIONAL JOURNAL OF PRODUCTION RESEARCH, 2024,
  • [32] Defect-based reliability analysis for mission-critical software
    Paul, RA
    Bastani, F
    Yen, IL
    Challagulla, VUB
    24TH ANNUAL INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COSPSAC 2000), 2000, 24 : 439 - 444
  • [33] Experimentation for Business-to-Business Mission-Critical Systems: A Case Study
    Mattos, David Issa
    Dakkak, Anas
    Bosch, Jan
    Olsson, Helena Holmstrom
    2020 IEEE/ACM INTERNATIONAL CONFERENCE ON SOFTWARE AND SYSTEM PROCESSES, ICSSP, 2020, : 95 - 104
  • [35] The role of software failure modes and effects analysis for interfaces in safety- and mission-critical systems
    Ozarin, Nathaniel
    2008 2ND ANNUAL IEEE SYSTEMS CONFERENCE, 2008, : 252 - 259
  • [36] The HURRIER process for experimentation in business-to-business mission-critical systems
    Issa Mattos, David
    Dakkak, Anas
    Bosch, Jan
    Olsson, Helena Holmstrom
    JOURNAL OF SOFTWARE-EVOLUTION AND PROCESS, 2023, 35 (05)
  • [37] Analysing Mission-critical Cyber-physical Systems with AND/OR Graphs and MaxSAT
    Barrere, Martin
    Hankin, Chris
    ACM TRANSACTIONS ON CYBER-PHYSICAL SYSTEMS, 2021, 5 (03)
  • [38] Towards Developing Resilient and Service-oriented Mission-critical Systems
    Ergenc, Doganalp
    Bruelhart, Cornelia
    Fischer, Mathias
    2023 IEEE 9TH INTERNATIONAL CONFERENCE ON NETWORK SOFTWARIZATION, NETSOFT, 2023, : 317 - 319
  • [39] System Security Engineering Vulnerability Assessments for Mission-Critical Systems and Functions
    LeSaint, JeanPaul
    Popick, Paul
    Reed, Melinda
    2015 9TH ANNUAL IEEE INTERNATIONAL SYSTEMS CONFERENCE (SYSCON), 2015, : 608 - 613
  • [40] Fujitsu's windows strategy for next-generation mission-critical IA server PRIMEQUEST
    Sagawa, C
    Burns, M
    FUJITSU SCIENTIFIC & TECHNICAL JOURNAL, 2005, 41 (03): : 323 - 327