Modern windows hibernation file analysis

نویسندگان

  • Joe Sylve
  • Lodovico Marziale
  • Golden G. Richard
چکیده

This paper presents the first analysis of the new hibernation file format that is used in Windows versions 8, 8.1, and 10. We also discuss several changes in the hibernation and shutdown behavior of Windows that will have a direct impact on digital forensic practitioners who use hibernation files as sources of

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Role of Hibernation File in Memory Forensics of windows 10

Azad Singh M.Tech Student, Department of Computer Science & Applications, Kuruksheta University, Kurukshetra-136119 [email protected] Pankaj Sharma M.Tech Student, Department of Computer Science & Applications, Kuruksheta University, Kurukshetra-136119 [email protected] RajenderNath Professor, Department of Computer Science & Applications, Kuruksheta University, Kurukshetra-136119 rnath...

متن کامل

iMeMex: Escapes from the Personal Information Jungle

Modern computer work stations provide thousands of applications that store data in >100.000 files on the file system of the underlying OS. To handle these files data processing logic is reinvented inside each application. This results in a jungle of data processing solutions and a jungle of data and file formats. For a user, it is extremely hard to manage information in this jungle. Most of all...

متن کامل

Forensic Carving of Network Packets and Associated Data Structures

Using validated carving techniques, we show that popular operating systems (e.g. Windows, Linux, and OSX) frequently have residual IP packets, Ethernet frames, and associated data structures present in system memory from long-terminated network traffic. Such information is useful for many forensic purposes including establishment of prior connection activity and services used; identification of...

متن کامل

Defeating Encrypted and Deniable File Systems: TrueCrypt v5.1a and the Case of the Tattling OS and Applications

We examine the security requirements for creating a Deniable File System (DFS), and the efficacy with which the TrueCrypt disk-encryption software meets those requirements. We find that the Windows Vista operating system itself, Microsoft Word, and Google Desktop all compromise the deniability of a TrueCrypt DFS. While staged in the context of TrueCrypt, our research highlights several fundamen...

متن کامل

Modern Business Process Automation - YAWL and its Support Environment

Reading is a hobby to open the knowledge windows. Besides, it can provide the inspiration and spirit to face this life. By this way, concomitant with the technology development, many companies serve the e-book or book in soft file. The system of this book of course will be much easier. No worry to forget bringing the modern business process automation yawl and its support environment book. You ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Digital Investigation

دوره 20  شماره 

صفحات  -

تاریخ انتشار 2017