期刊文献+

基于Volatility的内存信息调查方法研究 被引量:1

Research on the Method of RAM Investigation Based on Volatility
下载PDF
导出
摘要 随着反取证技术的发展,调查人员越来越难于在磁盘介质中寻找到有价值的证据或线索。针对内存信息的调查分析研究由此成为计算机法庭科学领域日益关注的焦点。通过以内存调查取证开源软件Volatility为背景,从进程及DLL、内存及VAD、驱动程序及内核对象、网络连接与注册表等多个角度描述内存信息的调查方法,并结合实例说明所述方法在实际工作中的具体应用。 With the development of anti-forensics technology, it is more difficult to seek for valuable evidence or clues for investigators. Therefore, the research on RAM investigation has become a focus in the field of computer forensics. Based on open source software Volatility, which is used to investigate into RAM, this paper introduces the investigation mothod for RAM from the aspects of process and DLL, RAM and VAD, driver and kernel object, net connection and registry. This paper also introduces the specific applications of the method with actual examples.
出处 《中国司法鉴定》 2012年第4期90-93,共4页 Chinese Journal of Forensic Sciences
关键词 内存 VOLATILITY hivescan hashdump psscan pslist RAM Volatility hivescan hashdump psscan pslist
  • 相关文献

参考文献4

二级参考文献6

  • 1Peter Lyman, Hal R Varian. How Much Information 2003 [EB/ O L]. http ://www2.sims.berkeley.edu/research/proj ects/how-much-info ( 2003 - 10-27 ) [2009-12-10].
  • 2Scott Ferguson, Keith Gittings, Casey Lunny. A Forensic E- valuation of ANT System[J]. FALL 2002, CS 585 F.
  • 3Organization on Digital Evidence (IOCE) 2000.Digital Evi- dence: Standards and Principles[J].Forensic Science Commu- nications, April 2000, 2(2).
  • 4NIJ Special Report. Forensic Examination of Digital Evidence: A Guide for Law Enforcement[M]. National Institute of Justice, Washington D.C.1994.
  • 5金波,陶明明.计算机取证关键技术研究[C].第二十一届全国计算机安全技术交流会论文集.2006:7.
  • 6王玲,钱华林.计算机取证技术及其发展趋势[J].软件学报,2003,14(9):1635-1644. 被引量:198

共引文献16

同被引文献3

  • 1Russinovich MR, Solomon DA. Microsoft windows Internals: Windows Server 2008 and Window Vista [M]. 5th ed. USA: Microsoft Press, 2012:146-253.
  • 2Okolica J, Peterson GL. Windows operating systems agnostic memory analysis[J]. Digital Investigation 2010, (7) ::48-56.
  • 3Hejazi SM, Talhi C, Debbabi M. Extraction of forensically sensitive information from windows physical memory[J]. Digital Investigation, 2009,6 (S 1 ) : 121 - 131.

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部