A study on memory dump analysis based on digital forensic tools
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Seo, Jungtaek | - |
dc.contributor.author | Lee, Seokjun | - |
dc.contributor.author | Shon, Taeshik | - |
dc.date.accessioned | 2021-09-15T04:40:31Z | - |
dc.date.available | 2021-09-15T04:40:31Z | - |
dc.date.created | 2021-09-15 | - |
dc.date.issued | 2015-07 | - |
dc.identifier.issn | 1936-6442 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/gachon/handle/2020.sw.gachon/82135 | - |
dc.description.abstract | The application of IT in all industrial facilities has led to the use of special-purpose systems in diverse areas. As such, special-purpose systems have increasingly become the target or path of hacking attacks. From a digital forensics viewpoint, these systems can be used to gather evidence from all the relevant digital devices such as whole systems or storage units at the scene of a crime. Notably, In case of special-purpose embedded system, unlike a conventional computing system, is almost always 'powered on' like server, the accumulated data can remain in the volatile memory. This paper focuses on analyzing ways of gathering physical memory data for application in an embedded system and of developing a test system to analyze the physical memory for verification. | - |
dc.language | 영어 | - |
dc.language.iso | en | - |
dc.publisher | SPRINGER | - |
dc.relation.isPartOf | PEER-TO-PEER NETWORKING AND APPLICATIONS | - |
dc.title | A study on memory dump analysis based on digital forensic tools | - |
dc.type | Article | - |
dc.type.rims | ART | - |
dc.description.journalClass | 1 | - |
dc.identifier.wosid | 000356580800016 | - |
dc.identifier.doi | 10.1007/s12083-013-0217-3 | - |
dc.identifier.bibliographicCitation | PEER-TO-PEER NETWORKING AND APPLICATIONS, v.8, no.4, pp.694 - 703 | - |
dc.description.isOpenAccess | N | - |
dc.identifier.scopusid | 2-s2.0-84931578799 | - |
dc.citation.endPage | 703 | - |
dc.citation.startPage | 694 | - |
dc.citation.title | PEER-TO-PEER NETWORKING AND APPLICATIONS | - |
dc.citation.volume | 8 | - |
dc.citation.number | 4 | - |
dc.contributor.affiliatedAuthor | Seo, Jungtaek | - |
dc.type.docType | Article | - |
dc.subject.keywordAuthor | Memory | - |
dc.subject.keywordAuthor | Memory dump | - |
dc.subject.keywordAuthor | Dump | - |
dc.subject.keywordAuthor | Linux | - |
dc.subject.keywordAuthor | Ram | - |
dc.subject.keywordAuthor | Embedded | - |
dc.subject.keywordAuthor | Forensic | - |
dc.subject.keywordPlus | SYSTEM | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalResearchArea | Telecommunications | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.relation.journalWebOfScienceCategory | Telecommunications | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
1342, Seongnam-daero, Sujeong-gu, Seongnam-si, Gyeonggi-do, Republic of Korea(13120)031-750-5114
COPYRIGHT 2020 Gachon University All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.