Investigating the PROCESS block for memory analysis

  • Authors:
  • Khairul Akram Zainol Ariffin;Ahmad Kamil Mahmood;Jafreezal Jaafar

  • Affiliations:
  • Computer Information Science, Universiti Teknologi Petronas, Perak, Malaysia;Computer Information Science, Universiti Teknologi Petronas, Perak, Malaysia;Computer Information Science, Universiti Teknologi Petronas, Perak, Malaysia

  • Venue:
  • ACS'11 Proceedings of the 11th WSEAS international conference on Applied computer science
  • Year:
  • 2011

Quantified Score

Hi-index 0.00

Visualization

Abstract

Over the past few years, memory analysis has been an issue that has been discussed in digital forensics. A number of tools have been released that focus on memory acquisition of Windows system. However, the implementation of memory analysis is still limited as it encounters a lot of difficulties. The aim of this paper is to outline one of the difficulties with regards to the structure of EPROCESS block. It will discuss about the differences in offset between Windows 2000 and Window XP. Further, the important of internal structures in EPROCESS block will be identified as they play an important role in the analysis and theory reconstruction for forensic investigation. Nevertheless, an address translation for x86 platforms will be demonstrated in this paper. Hence, the limitation of the address translation algorithm will also been discussed and identified.