Tools for Collecting Volatile Data: A Survey Study

Leonardo Carvajal, Cihan Varol, Lei Chen

Research output: Contribution to book or proceedingChapter

4 Scopus citations

Abstract

Volatile information is a critical element when conducting a digital investigation. As a result, commercial and open source tools are becoming more varied in which options they offer to users. This paper compares six forensic tools including: FTK Imager, Pro Discover, Win32dd, Nigilant32, Memoryze, and Helix3 (dd). The evaluation of each forensic tool is based on the following capabilities: user interface, reporting, processing time, training, and leaving fingerprints or artifacts. We have observed that if time is the concern, command line forensic tools such as Win32dd and Memoryze are faster in acquiring physical memory contents than the graphical user interface tools such as FTK imager, ProDiscover, Nigilant32, and Helix3. In addition, Win32dd leaves the least fingerprints using 13.55 MB in memory when loaded. On the other hand, FKT Imager leaves the most fingerprints using 155 MB of RAM.
Original languageAmerican English
Title of host publicationProceedings of the International Conference on Technological Advances in Electrical, Electronics and Computer Engineering
DOIs
StatePublished - May 9 2013

Disciplines

  • Databases and Information Systems

Keywords

  • Forensic tools
  • Memory aquisition
  • Volatile data

Fingerprint

Dive into the research topics of 'Tools for Collecting Volatile Data: A Survey Study'. Together they form a unique fingerprint.

Cite this