Volatile memory forensics of privacy-aware operating systems Online publication date: Thu, 28-Oct-2021
by Nilay R. Mistry; Sampada Kanitkar; S.O. Junare
International Journal of Electronic Security and Digital Forensics (IJESDF), Vol. 13, No. 6, 2021
Abstract: Along with the use of the internet, awareness regarding the privacy of the user data is also increasing slowly and gradually but at a comparatively slower rate than that of cybercrime. At present in the market, there are many such operating systems available that are secured and leave the minimum number of traces which makes it difficult to retrieve or obtain any kind of data from that system after carrying out the forensics of that machine. In this research, acquisition, and analysis of random access memory (RAM), of such secured operating systems, is performed and potential artefacts related to the activities are identified, that the operating systems leave in the memory of the system which can be further submitted in the court of law as evidence in case of a crime being committed using such security providing technology.
Existing subscribers:
Go to Inderscience Online Journals to access the Full Text of this article.
If you are not a subscriber and you just want to read the full contents of this article, buy online access here.Complimentary Subscribers, Editors or Members of the Editorial Board of the International Journal of Electronic Security and Digital Forensics (IJESDF):
Login with your Inderscience username and password:
Want to subscribe?
A subscription gives you complete access to all articles in the current issue, as well as to all articles in the previous three years (where applicable). See our Orders page to subscribe.
If you still need assistance, please email subs@inderscience.com