DocumentCode :
3579164
Title :
A novel methodology for windows 7 × 64 memory forensics
Author :
Suma, G.S. ; Dija, S. ; Thomas, K.L.
Author_Institution :
Resource Centre for Cyber Forensics, Centre for Development of Advanced Computing, Thiruvananthapuram, India
fYear :
2014
Firstpage :
1
Lastpage :
6
Abstract :
Due to the ever increasing growth rate of malwares, Memory Forensics has become unavoidable in a cyber crime investigation. This is because physical memory may contain crucial information that is available nowhere in the system hard disk. Memory Forensics deals with collection of forensically sound evidence from physical memory content of Suspect´s system. This is a fast growing and challenging field in computer forensics where a live forensic methodology is adopted in order to acquire physical memory content. Analysis of the collected memory dump is very difficult due to the complex data structures in it, especially in Windows ×64 systems. Also, the complexity involved in 64-bit address translation makes the analysis tougher. This translation can be done only after finding an artifact called Directory Table Base (DTB). Even though there are few methods available for finding DTB, none is efficient for adopting in a memory analysis tool. In this paper, a novel methodology for finding DTB in a 64-bit Windows system is described in detail. The paper also explains algorithms for retrieving forensically relevant information like running processes and its associated details from physical memory dump collected from Windows7 × 64 machines.
Keywords :
Computers; Data mining; Data structures; Forensics; Hard disks; Media; Operating systems; Computer Forensics; Directory Table Base; Executable Process; Handle Table; Memory Analysis; Process Environment Block; Windows 7;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computational Intelligence and Computing Research (ICCIC), 2014 IEEE International Conference on
Print_ISBN :
978-1-4799-3974-9
Type :
conf
DOI :
10.1109/ICCIC.2014.7238400
Filename :
7238400
Link To Document :
بازگشت