High Impact Factor : 4.396 icon | Submit Manuscript Online icon |

An Analyzing of different Techniques and Tools to Recover Data from Volatile Memory


Mr. Arpit Patel , GTU PG School,Ahemedabad; Prof. Nilay Mistry, Gujarat Forensic Science University, Ahmedabad, Gujarat, India


Volatile Memory,Data,Techniques,File system,FAT,NTFS


Computer forensics has recently gained significant popularity with many local law enforcement agencies. It is currently employed in fraud, theft, drug enforcement and almost every other enforcement activity. There are many relatively new tools available that have been developed in order to recover and dissect the information that can be gleaned from data storage area like hard-disk, pen drive, etc. it's all like a volatile memory, but because this is a relatively new and fast-growing field many forensic analysts do not know or take advantage of these assets. Memory like Volatile memory may contain many pieces of information relevant to a forensic investigation, such as passwords, cryptographic keys, and other data. Having the knowledge which type of method use and tools needed to recover that data is essential, and this capability is becoming increasingly more relevant as hard drive encryption and other security mechanisms make traditional hard disk forensics more challenging. This research will cover the theory behind volatile memory analysis, including why it is important, what kinds of data can be recovered, and the potential pitfalls of this type of analysis, as well as techniques for recovering and analyzing volatile data and currently available toolkits that have been developed for this purpose.

Other Details

Paper ID: IJSRDV1I2044
Published in: Volume : 1, Issue : 2
Publication Date: 01/05/2013
Page(s): 227-233

Article Preview

Download Article