{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T17:56:44Z","timestamp":1730224604014,"version":"3.28.0"},"reference-count":34,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1109\/hicss.2010.439","type":"proceedings-article","created":{"date-parts":[[2010,3,12]],"date-time":"2010-03-12T16:13:22Z","timestamp":1268410402000},"page":"1-6","source":"Crossref","is-referenced-by-count":4,"title":["Volatile Memory Acquisition via Warm Boot Memory Survivability"],"prefix":"10.1109","author":[{"given":"Timothy","family":"Vidas","sequence":"first","affiliation":[]}],"member":"263","reference":[{"journal-title":"Syslinux memory map Segment 0","year":"0","key":"ref33"},{"journal-title":"msramdump By McGrew security","year":"0","key":"ref32"},{"key":"ref31","first-page":"331","article-title":"Shredding your garbage: Reducing data lifetime through secure deallocation","author":"chow","year":"2005","journal-title":"14th USENIX Security Symposium"},{"key":"ref30","first-page":"45","article-title":"Lest We Remember: Cold Boot Attacks on Encryption Keys","author":"halderman","year":"2008","journal-title":"Proc USENIX Security07"},{"journal-title":"Syslinux memory map General","year":"0","key":"ref34"},{"key":"ref10","article-title":"First Responders Guide to Computer Forensics","author":"nolan","year":"2005","journal-title":"CMU\/SEI-2005-HB-001"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1113034.1113070"},{"journal-title":"Volatility – by AAron Walters and Nick Pedroni Jr","year":"0","key":"ref12"},{"journal-title":"KnTTools and KnTList by GMG systems","year":"0","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2006.06.010"},{"journal-title":"VAD Tools By Brendan Dolan-Gavitt","year":"0","key":"ref15"},{"journal-title":"Memparser By Chris Betz","year":"0","key":"ref16"},{"journal-title":"Responder By HBGary","year":"0","key":"ref17"},{"journal-title":"Memoryze By Mandiant","year":"0","key":"ref18"},{"journal-title":"lsproc part of WindowsIR By Harlan Carvey","year":"0","key":"ref19"},{"journal-title":"RAM Capture Tool By BBN Technology","year":"0","key":"ref28"},{"key":"ref4","first-page":"43","article-title":"Using Memory Dumps in Digital Forensics","volume":"30","author":"stover","year":"2005","journal-title":"Login Magazine"},{"journal-title":"Microsoft strengthens anti-malware protection with leading-edge rootkit detection provider","year":"2008","key":"ref27"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1080\/15567280701418171"},{"journal-title":"Metasploits Meterpreter skape","year":"2004","key":"ref6"},{"key":"ref29","article-title":"Firewire – all your memory are belong to us","author":"domseif","year":"2005","journal-title":"CanSecWest\/core05"},{"article-title":"An introduction to the windows memory forensic","year":"2005","author":"burdach","key":"ref5"},{"journal-title":"Portable Apps Documentation","year":"0","key":"ref8"},{"journal-title":"Blackhat USA 2004","article-title":"An Introduction to MOSDEF","year":"2004","key":"ref7"},{"journal-title":"DFRWS 2005 challenge","year":"0","key":"ref2"},{"key":"ref9","article-title":"CERT Forensics Tools","author":"waits","year":"2007","journal-title":"DoD Cybercrime Conference 2007"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2003.12.001"},{"journal-title":"ProcessLocator By Tim Vidas","year":"0","key":"ref20"},{"journal-title":"win32dd By Matthieu Suiche","year":"0","key":"ref22"},{"journal-title":"Changes to functionality in Windows Server 2003 SP1 Device\\PhysicalMemory Object Microsoft Technet","year":"0","key":"ref21"},{"journal-title":"Software Guidance","year":"0","key":"ref24"},{"journal-title":"mdd By Mantech","year":"0","key":"ref23"},{"journal-title":"USAF AFMC AIR FORCE RESEARCH LABORATORY Award number FA875005C0202","year":"2005","key":"ref26"},{"year":"0","key":"ref25"}],"event":{"name":"2010 43rd Hawaii International Conference on System Sciences","start":{"date-parts":[[2010,1,5]]},"location":"Honolulu, Hawaii, USA","end":{"date-parts":[[2010,1,8]]}},"container-title":["2010 43rd Hawaii International Conference on System Sciences"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5428222\/5428274\/05428490.pdf?arnumber=5428490","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,18]],"date-time":"2017-03-18T16:38:27Z","timestamp":1489855107000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5428490\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"references-count":34,"URL":"https:\/\/doi.org\/10.1109\/hicss.2010.439","relation":{},"subject":[],"published":{"date-parts":[[2010]]}}}