A framework for password harvesting from volatile memory

This source preferred by Vasilis Katos

This data was imported from Scopus:

Authors: Karayianni, S., Katos, V. and Georgiadis, C.K.

Journal: International Journal of Electronic Security and Digital Forensics

Volume: 4

Issue: 2-3

Pages: 154-163

eISSN: 1751-9128

ISSN: 1751-911X

DOI: 10.1504/IJESDF.2012.048411

In this paper, we challenge the widely accepted approach where a first responder does not capture the RAM of a computer system if found to be powered off at a crime scene. We investigate the presence of confidential data in RAM such as user passwords. Our findings show that even if the computer is switched off but not removed from the mains, the data are preserved. In fact, when a process is terminated but the computer is still operating, the respective data are more likely to be lost. Therefore, capturing the memory could be as critical on a switched off system as on a running one. Copyright © 2012 Inderscience Enterprises Ltd.

The data on this page was last updated at 04:45 on January 16, 2018.