{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T23:46:19Z","timestamp":1740181579247,"version":"3.37.3"},"reference-count":16,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2023,6,17]],"date-time":"2023-06-17T00:00:00Z","timestamp":1686960000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,6,17]],"date-time":"2023-06-17T00:00:00Z","timestamp":1686960000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SN COMPUT. SCI."],"DOI":"10.1007\/s42979-023-01844-8","type":"journal-article","created":{"date-parts":[[2023,6,17]],"date-time":"2023-06-17T13:01:35Z","timestamp":1687006895000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["An Efficient Tactic for Analysis and Evaluation of Malware Dump File Using the Volatility Tool"],"prefix":"10.1007","volume":"4","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1325-7329","authenticated-orcid":false,"given":"Amit Kumar","family":"Singh","sequence":"first","affiliation":[]},{"given":"Swapnesh","family":"Taterh","sequence":"additional","affiliation":[]},{"given":"Uddalak","family":"Mitra","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,6,17]]},"reference":[{"unstructured":"N Sai Vaibhav, D Haritha \u201cVolatile Memory Acquisition and Extracting of Data Using Volatility Framework and Web GUI Application\u201d, International Journal of Innovative Technology and Exploring Engineering (IJITEE) ISSN: 2278-3075, Volume-8, Issue-7, May 2019","key":"1844_CR1"},{"unstructured":"Amari K. \u201cTechniques and Tools for Recovering and Analyzing Data from Volatile Memory\u201d-33049.\u201d SANS Insttitute. 2009","key":"1844_CR2"},{"key":"1844_CR3","first-page":"221","volume":"3","author":"L Cai","year":"2013","unstructured":"Cai L, Sha J, Qian W. Study on forensic analysis of physical memory. Int Symp Comput Commun Cont Autom. 2013;3:221\u20134.","journal-title":"Int Symp Comput Commun Cont Autom"},{"issue":"2","key":"1844_CR4","first-page":"57","volume":"10","author":"ZU Rehman","year":"2017","unstructured":"Rehman ZU, Ahmad A, Saleem S. A brief survey of memory analysis tools. NUST J Eng Sci. 2017;10(2):57\u201364.","journal-title":"NUST J Eng Sci"},{"key":"1844_CR5","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1016\/j.diin.2006.06.010","volume":"3","author":"A Schuster","year":"2006","unstructured":"Schuster A. Searching for processes and threads in Microsoft Windows memory dumps. Digit Investig. 2006;3:10\u20136.","journal-title":"Digit Investig"},{"key":"1844_CR6","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.17","author":"A Moser","year":"2007","unstructured":"Moser A, Kruegel C, Kirda E. Exploring multiple execution paths for malware analysis. Proc IEEE Symp Secur Priv. 2007. https:\/\/doi.org\/10.1109\/SP.2007.17.","journal-title":"Proc IEEE Symp Secur Priv"},{"key":"1844_CR7","doi-asserted-by":"publisher","first-page":"S121","DOI":"10.1016\/j.diin.2009.06.003","volume":"6","author":"SM Hejazi","year":"2009","unstructured":"Hejazi SM, Talhi C, Debbabi M. Extraction of forensically sensitive information from windows physical memory. Digit Investig. 2009;6:S121\u201331.","journal-title":"Digit Investig"},{"key":"1844_CR8","volume-title":"Physical Memory Forensics for Files and Cache","author":"J Butler","year":"2011","unstructured":"Butler J, Murdock J. Physical Memory Forensics for Files and Cache. Com: Craigchamberlain. Dreamhosters; 2011."},{"doi-asserted-by":"crossref","unstructured":"Ahmed W, Aslam B. A comparison of windows physical memory acquisition tools. In MILCOM 2015-2015 IEEE Military Communications Conference. (2015, October); (pp. 1292-1297). IEEE.","key":"1844_CR9","DOI":"10.1109\/MILCOM.2015.7357623"},{"doi-asserted-by":"crossref","unstructured":"Omer ASLAN, Refik SAMET, \u201cInvestigation of possibilities to detect malware using-existing-tools,\u201d 2017 14th International Conference on Computer Systems and Applications IEEE\/ACS, 2017.","key":"1844_CR10","DOI":"10.1109\/AICCSA.2017.24"},{"issue":"January","key":"1844_CR11","doi-asserted-by":"publisher","first-page":"110","DOI":"10.1111\/1556-4029.12979","volume":"61","author":"RJ Mcdown","year":"2016","unstructured":"Mcdown RJ, Varol C, Carvajal L, Chen L. In-depth analysis of computer memory acquisition software for forensic purposes. J Forensic Sci. 2016;61(January):110\u20136.","journal-title":"J Forensic Sci"},{"doi-asserted-by":"crossref","unstructured":"Otsuki Y, Kawakoya Y, Iwamura M, Miyoshi J, Ohkubo K. Building stack traces from memory dump of Windows x64. Digital Investigation, 2018;24:S101\u2013S110.","key":"1844_CR12","DOI":"10.1016\/j.diin.2018.01.013"},{"key":"1844_CR13","first-page":"301486","volume":"44","author":"A Holmes","year":"2023","unstructured":"Holmes A, Buchanan WJ. A framework for live host-based Bitcoin wallet forensics and triage. Foren Sci Int Dig Invest. 2023;44:301486.","journal-title":"Foren Sci Int Dig Invest"},{"unstructured":"Sikorski M, Honig A. Practical malware analysis: the hands-on guide to dissecting malicious software. no starch press. (2012).","key":"1844_CR14"},{"doi-asserted-by":"crossref","unstructured":"Pandey, Sudhir Kumar, and B. M. Mehtre. \u201cA Lifecycle Based Approach for Malware Analysis.\u201d Communication Systems and Network Technologies (CSNT), 2014 Fourth International Conference on. IEEE, 2014","key":"1844_CR15","DOI":"10.1109\/CSNT.2014.161"},{"issue":"1","key":"1844_CR16","first-page":"103","volume":"4","author":"D Uppal","year":"2014","unstructured":"Uppal D, Mehra V, Verma V. Basic survey on malware analysis, tools and techniques. Int J Comput Sci Appl (IJCSA). 2014;4(1):103\u201312.","journal-title":"Int J Comput Sci Appl (IJCSA)"}],"container-title":["SN Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-023-01844-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s42979-023-01844-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-023-01844-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,17]],"date-time":"2023-06-17T13:09:21Z","timestamp":1687007361000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s42979-023-01844-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,17]]},"references-count":16,"journal-issue":{"issue":"5","published-online":{"date-parts":[[2023,9]]}},"alternative-id":["1844"],"URL":"https:\/\/doi.org\/10.1007\/s42979-023-01844-8","relation":{},"ISSN":["2661-8907"],"issn-type":[{"type":"electronic","value":"2661-8907"}],"subject":[],"published":{"date-parts":[[2023,6,17]]},"assertion":[{"value":"15 February 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 April 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 June 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known competing financial interest or personal relationship that could have appeared to influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interest"}}],"article-number":"457"}}