Memory Acquisition in Forensic
Memory Acquisition in Forensic
computer's volatile memory (RAM) to create a memory dump, which can then be
analyzed to uncover evidence of malicious activity, running processes, network
connections, and other data that might not be readily visible on the hard drive, as this
information can be lost when the computer is powered off; essentially, it's the act of collecting
data from a system's active memory for forensic investigation. [1, 2, 3, 4, 5]
Generative AI is experimental.
[1] https://www.sciencedirect.com/topics/computer-science/memory-acquisition
[2] https://www.sciencedirect.com/science/article/pii/S2214785321038633
[3] https://www.varonis.com/blog/memory-forensics
[4] https://www.granthaalayahpublication.org/ijetmr-ojms/index.php/ijetmr/article/download/IJET
MR18-CINSP-13/515/
[5] https://www.adfsolutions.com/adf-blog/memory-forensics-101-the-basics-you-need-to-know-f
or-effective-digital-forensics-investigations
[6] https://www.oreilly.com/library/view/the-art-of/9781118824993/c04.xhtml
[7] https://indjst.org/download-article.php?Article_Unique_Id=INDJST11736&Full_Text_Pdf_Dow
nload=True
[8] https://www.sans.org/blog/memory-forensic-acquisition-and-analysis-101/
[9] https://intezer.com/blog/incident-response/memory-analysis-forensic-tools/