dc.contributor.author | Ben Yehuda, Raz | |
dc.contributor.author | Shlingbaum, Erez | |
dc.contributor.author | Gershfeld, Yuval | |
dc.contributor.author | Tayouri, Shaked | |
dc.contributor.author | Zaidenberg, Nezer Jacob | |
dc.date.accessioned | 2024-02-27T10:53:36Z | |
dc.date.available | 2024-02-27T10:53:36Z | |
dc.date.issued | 2021 | |
dc.identifier.citation | Ben Yehuda, R., Shlingbaum, E., Gershfeld, Y., Tayouri, S., & Zaidenberg, N. J. (2021). Hypervisor memory acquisition for ARM. <i>Forensic Science International: Digital Investigation</i>, <i>37</i>, Article 301106. <a href="https://doi.org/10.1016/j.fsidi.2020.301106" target="_blank">https://doi.org/10.1016/j.fsidi.2020.301106</a> | |
dc.identifier.other | CONVID_52434168 | |
dc.identifier.uri | https://jyx.jyu.fi/handle/123456789/93683 | |
dc.description.abstract | Cyber forensics use memory acquisition in advanced forensics and malware analysis. We propose a hypervisor based memory acquisition tool. Our implementation extends the volatility memory forensics framework by reducing the processor's consumption, solves the in-coherency problem in the memory snapshots and mitigates the pressure of the acquisition on the network and the disk. We provide benchmarks and evaluation. | en |
dc.format.mimetype | application/pdf | |
dc.language.iso | eng | |
dc.publisher | Elsevier | |
dc.relation.ispartofseries | Forensic Science International: Digital Investigation | |
dc.rights | CC BY-NC-ND 4.0 | |
dc.subject.other | real time | |
dc.subject.other | ARM | |
dc.subject.other | hypervisor | |
dc.subject.other | virtualization | |
dc.subject.other | Linux | |
dc.title | Hypervisor memory acquisition for ARM | |
dc.type | research article | |
dc.identifier.urn | URN:NBN:fi:jyu-202402272155 | |
dc.contributor.laitos | Informaatioteknologian tiedekunta | fi |
dc.contributor.laitos | Faculty of Information Technology | en |
dc.type.uri | http://purl.org/eprint/type/JournalArticle | |
dc.type.coar | http://purl.org/coar/resource_type/c_2df8fbb1 | |
dc.description.reviewstatus | peerReviewed | |
dc.relation.issn | 2666-2817 | |
dc.relation.volume | 37 | |
dc.type.version | acceptedVersion | |
dc.rights.copyright | © 2021 Elsevier Ltd. | |
dc.rights.accesslevel | openAccess | fi |
dc.type.publication | article | |
dc.subject.yso | tietoturva | |
dc.subject.yso | muistit (tietotekniikka) | |
dc.subject.yso | tekninen rikostutkinta | |
dc.subject.yso | Linux | |
dc.subject.yso | haittaohjelmat | |
dc.subject.yso | virtualisointi | |
dc.format.content | fulltext | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p5479 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p12658 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p28613 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p723 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p2837 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p22009 | |
dc.rights.url | https://creativecommons.org/licenses/by-nc-nd/4.0/ | |
dc.relation.doi | 10.1016/j.fsidi.2020.301106 | |
dc.type.okm | A1 | |