Over the last few years, analysing a computer or a digital device has become a necessity in the field of criminal investigations. Traditional digital forensics analysis includes static analysis, which concerns data that are permanently stored in devices, and live analysis, which regards data that are temporarily stored in equipments or that transit in networks. This paper proposes a live forensics analysis on two different operating systems: Windows XP and Windows Seven. The case study focuses on some common applications such as Skype, Google Talk and the browser Internet Explorer. The last software involves only those cases in which the browser is surfing on Facebook, Yahoo, Hotmail and Gmail. In addition, although many types of applications are payment software, one of the main objectives of this work has been the only use of the free software in order to prove the possibility to obtain the same results minimizing the costs.

Live digital forensics: Windows XP vs Windows 7

FENU, GIANNI;SOLINAS, FABRIZIO
2013-01-01

Abstract

Over the last few years, analysing a computer or a digital device has become a necessity in the field of criminal investigations. Traditional digital forensics analysis includes static analysis, which concerns data that are permanently stored in devices, and live analysis, which regards data that are temporarily stored in equipments or that transit in networks. This paper proposes a live forensics analysis on two different operating systems: Windows XP and Windows Seven. The case study focuses on some common applications such as Skype, Google Talk and the browser Internet Explorer. The last software involves only those cases in which the browser is surfing on Facebook, Yahoo, Hotmail and Gmail. In addition, although many types of applications are payment software, one of the main objectives of this work has been the only use of the free software in order to prove the possibility to obtain the same results minimizing the costs.
2013
978-1-4673-5255-0
Live forensics; RAM forensics analysis: Computer forensic investigation; Cybercrime; Investigation
File in questo prodotto:
File Dimensione Formato  
PID2883049.pdf

Solo gestori archivio

Tipologia: versione post-print (AAM)
Dimensione 357.31 kB
Formato Adobe PDF
357.31 kB Adobe PDF   Visualizza/Apri   Richiedi una copia

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/11584/105638
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 5
  • ???jsp.display-item.citation.isi??? ND
social impact