Forensic Strategies for Revealing Memory Artifacts in IoT Devices

Authors

  • Hafiz Ahmad Mujtaba Faculty of Computer Science and Information Technology, Superior University, Lahore, 54000, Pakistan.
  • Gohar Mumtaz Faculty of Computer Science and Information Technology, Superior University, Lahore, 54000, Pakistan.
  • Muhammad Haroon Ahmad Riphah International University, Lahore, 54000, Pakistan.
  • Mudassar Rehman Riphah International University, Sahiwal, 57000, Pakistan.

Keywords:

Digital Memory Forensics, Volatile Memory Analysis, Digital Forensics, Malware Detection, Evidence Extraction

Abstract

Forensics of Ram plays an important role when used in the field of digital forensics, during the examination of Memory to identify signs of unauthorized or unusual activities within computer systems. This area has gained significant attention because it allows for the recovery of fleeting data that typically disappears when a system is powered down, thus helping investigators piece together the sequence of events that led to security breaches. Recent developments in memory forensics have focused on improving the methods used for acquiring and analyzing memory. This paper seeks to assess the effectiveness of different memory forensic tools and techniques, particularly in their application to malware detection and the extraction of evidence. It wraps up by proposing a framework aimed at enhancing memory forensic practices, addressing current shortcomings in the field, and outlining potential research avenues to strengthen memory analysis in increasingly complex digital landscapes.

Downloads

Published

2024-09-01

How to Cite

Hafiz Ahmad Mujtaba, Gohar Mumtaz, Muhammad Haroon Ahmad, & Mudassar Rehman. (2024). Forensic Strategies for Revealing Memory Artifacts in IoT Devices. Journal of Computing & Biomedical Informatics, 7(02). Retrieved from https://jcbi.org/index.php/Main/article/view/574