Essays about: "Memory Forensics"

Showing result 1 - 5 of 8 essays containing the words Memory Forensics.

  1. 1. Peering into the Dark : A Dark Web Digital Forensic Investigation on Windows 11

    University essay from Högskolan i Halmstad/Akademin för informationsteknologi

    Author : Johanna Kahlqvist; Frida Wilke; [2023]
    Keywords : Dark Web; Digital Forensics; The Onion Router Tor ; Windows 11;

    Abstract : The ability to access the Internet while remaining anonymous is a necessity in today's society. Whistleblowers need it to establish contact with journalists, and individuals living under repressive regimes need it to access essential resources. READ MORE

  2. 2. Password Managers in Digital Forensics

    University essay from Stockholms universitet/Institutionen för data- och systemvetenskap

    Author : Sascha David Hähni; [2023]
    Keywords : Digital Forensics; Password Managers; Memory Forensics; Live Forensics;

    Abstract : Digital forensics – the scientific process to draw evidence from digital devices confiscated in a criminal investigation – is constantly adapting to technological changes. A current challenge is the widespread use of encryption that makes classical data retrieval methods obsolete. READ MORE

  3. 3. Automate memory forensics Investigation

    University essay from Högskolan i Halmstad/Akademin för informationsteknologi

    Author : Azeem Mohamed; Tirmizi Saad; [2022]
    Keywords : ;

    Abstract : The growth of digital technology spawns both positive and negative effects. Cybercrimes rise with the advancement of computer technology, necessitating a digital forensics investigation of the evolving digital world to assist in solving and tracing criminals' digital activity. READ MORE

  4. 4. Digital incursion: Breaching the android lock screen and liberating data

    University essay from Högskolan i Halmstad/Akademin för informationsteknologi

    Author : Tim Oskarsson; [2021]
    Keywords : Android forensics; Mobile forensics; Memory forensics; Device access; PIN; Pattern; Biometrics; Android Debug Bridge; TWRP; Frida.;

    Abstract : Android is the most used operating system in the world, because of this the probability of an android device being acquired in an investigation is high. To begin to extract data from an android device you first need to gain access to it. Mechanisms like full system encryption can make this very difficult. READ MORE

  5. 5. Digital forensics - Performing virtual primary memory extraction in cloud environments using VMI

    University essay from Blekinge Tekniska Högskola/Institutionen för datalogi och datorsystemteknik

    Author : David Hjerpe; Henrik Bengtsson; [2018]
    Keywords : Memory forensics; Virtual Machine Introspection; Cloud computing; KVM; QEMU;

    Abstract : Infrastructure as a Service and memory forensics are two subjects which have recently gained increasing amounts of attention. Combining these topics poses new challenges when performing forensic investigations. READ MORE