Title
Automated Windows Memory File Extraction for Cyber Forensics Investigation
Abstract
In digital forensics, the first step to conducting an investigation is to acquire evidence that is most related to the case. Containing most recently accessed data and information about the status of a system, physical memory is a valuable source of digital evidence. When a process runs or accesses a file, all or some parts of the process's executable or accessed data file are mapped into the physical memory. In this article, we propose various methods to find files and extract them from memory in order to rebuild executable and data files that existed in physical memory at the time of incident. We developed a memory analysis plug-in that uses this automated memory file extraction. Using this tool, we have been able to extract a wide range of data file types, including text, PDF, Java Archives (JAR), various logs, EVT (system event-log files, used by the system event viewer), HTML and many more. Investigators can use the result of this research in order to (1) compare the files found on disk with those extracted from memory to find possible tampering or (2) reconstruct those files that no longer exist on the disk. In addition, they can find the last file modifications that have not been mapped out to the corresponding files on the disk. Memory extracted files can be used for the purpose of correlation analysis along with other sources of evidence such as application or network log files, E-mail files, and data files found on disks.
Year
DOI
Venue
2008
10.1080/15567280802552829
J. Digital Forensic Practice
Keywords
Field
DocType
file extraction,automated windows memory,network log file,system event-log file,cyber forensics investigation,corresponding file,automated memory file extraction,physical memory,e-mail file,last file modification,accessed data,memory analysis,data file,digital forensics
File Control Block,Flash file system,Computer security,Computer science,Unix file types,Data file,Memory-mapped file,File synchronization,File system fragmentation,Database,Computer file
Journal
Volume
Issue
Citations 
2
3
1
PageRank 
References 
Authors
0.42
10
3
Name
Order
Citations
PageRank
Seyed Mahmood Hejazi110.75
Mourad Debbabi21467144.47
chamseddine talhi319223.98