Review of Live Forensic Analysis Techniques
نویسندگان
چکیده
منابع مشابه
Triage in Live Digital Forensic Analysis
Digital communication techniques such as email, SMS, blogs etc. have progressed rapidly during the last two decades. Email is one of the most commonly used communication technique. Emails can be sent/received on laptops, computers and mobile phones as well as on some other digital devices such as PDAs and Notebooks. Despite its benefits, it can also lead to malware or cyber attacks in the digit...
متن کاملModelling Live Forensic Acquisition
This paper discusses the development of a South African model for Live Forensic Acquisition Liforac. The Liforac model is a comprehensive model that presents a range of aspects related to Live Forensic Acquisition. The model provides forensic investigators with guidelines on how to proceed during an investigation. It provides forensic investigators with a robust foundation to understand what ne...
متن کاملSafer Live Forensic Acquisition
Computer forensic practitioners must gather, analyse and present evidence at court. A method of data gathering called live forensic acquisition is often used. This method involves gathering data from a system without shutting it down and allows forensic practitioners to access a large quantity of valuable information. However, as data on the computer is constantly changing the copy of data take...
متن کاملLive and Trustworthy Forensic Analysis of Commodity Production Systems
We present HyperSleuth, a framework that leverages the virtualization extensions provided by commodity hardware to securely perform live forensic analysis of potentially compromised production systems. HyperSleuth provides a trusted execution environment that guarantees four fundamental properties. First, an attacker controlling the system cannot interfere with the analysis and cannot tamper th...
متن کاملProgress of Forensic Tracking Techniques Progress of Forensic Tracking Techniques
Project co-funded by the European Commission within the 6th Framework Programme Dissemination Level PU Public X PP Restricted to other programme participants (including the Commission services) RE Restricted to a group specified by the consortium (including the Commission services) CO Confidential, only for members of the consortium (including the Commission services) Abstract This deliverable ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Hybrid Information Technology
سال: 2015
ISSN: 1738-9968
DOI: 10.14257/ijhit.2015.8.2.35