Detailed Information

Cited 3 time in webofscience Cited 6 time in scopus
Metadata Downloads

A study on memory dump analysis based on digital forensic tools

Full metadata record
DC Field Value Language
dc.contributor.authorSeo, Jungtaek-
dc.contributor.authorLee, Seokjun-
dc.contributor.authorShon, Taeshik-
dc.date.accessioned2021-09-15T04:40:31Z-
dc.date.available2021-09-15T04:40:31Z-
dc.date.created2021-09-15-
dc.date.issued2015-07-
dc.identifier.issn1936-6442-
dc.identifier.urihttps://scholarworks.bwise.kr/gachon/handle/2020.sw.gachon/82135-
dc.description.abstractThe application of IT in all industrial facilities has led to the use of special-purpose systems in diverse areas. As such, special-purpose systems have increasingly become the target or path of hacking attacks. From a digital forensics viewpoint, these systems can be used to gather evidence from all the relevant digital devices such as whole systems or storage units at the scene of a crime. Notably, In case of special-purpose embedded system, unlike a conventional computing system, is almost always 'powered on' like server, the accumulated data can remain in the volatile memory. This paper focuses on analyzing ways of gathering physical memory data for application in an embedded system and of developing a test system to analyze the physical memory for verification.-
dc.language영어-
dc.language.isoen-
dc.publisherSPRINGER-
dc.relation.isPartOfPEER-TO-PEER NETWORKING AND APPLICATIONS-
dc.titleA study on memory dump analysis based on digital forensic tools-
dc.typeArticle-
dc.type.rimsART-
dc.description.journalClass1-
dc.identifier.wosid000356580800016-
dc.identifier.doi10.1007/s12083-013-0217-3-
dc.identifier.bibliographicCitationPEER-TO-PEER NETWORKING AND APPLICATIONS, v.8, no.4, pp.694 - 703-
dc.description.isOpenAccessN-
dc.identifier.scopusid2-s2.0-84931578799-
dc.citation.endPage703-
dc.citation.startPage694-
dc.citation.titlePEER-TO-PEER NETWORKING AND APPLICATIONS-
dc.citation.volume8-
dc.citation.number4-
dc.contributor.affiliatedAuthorSeo, Jungtaek-
dc.type.docTypeArticle-
dc.subject.keywordAuthorMemory-
dc.subject.keywordAuthorMemory dump-
dc.subject.keywordAuthorDump-
dc.subject.keywordAuthorLinux-
dc.subject.keywordAuthorRam-
dc.subject.keywordAuthorEmbedded-
dc.subject.keywordAuthorForensic-
dc.subject.keywordPlusSYSTEM-
dc.relation.journalResearchAreaComputer Science-
dc.relation.journalResearchAreaTelecommunications-
dc.relation.journalWebOfScienceCategoryComputer Science, Information Systems-
dc.relation.journalWebOfScienceCategoryTelecommunications-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
Files in This Item
There are no files associated with this item.
Appears in
Collections
IT융합대학 > 컴퓨터공학과 > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher SEO, JUNGTAEK photo

SEO, JUNGTAEK
College of IT Convergence (컴퓨터공학부(스마트보안전공))
Read more

Altmetrics

Total Views & Downloads

BROWSE