FATKit: A framework for the extraction and analysis of digital forensic data from volatile system memory

  • Authors:
  • Nick L. Petroni, Jr.;Aaron Walters;Timothy Fraser;William A. Arbaugh

  • Affiliations:
  • University of Maryland, College Park, MD 20742, USA;4tphi Research, Vienna, VA 22182, USA;University of Maryland, College Park, MD 20742, USA;University of Maryland, College Park, MD 20742, USA

  • Venue:
  • Digital Investigation: The International Journal of Digital Forensics & Incident Response
  • Year:
  • 2006

Quantified Score

Hi-index 0.00

Visualization

Abstract

We present the Forensic Analysis ToolKit (FATKit) - a modular, extensible framework that increases the practical applicability of volatile memory forensic analysis by freeing human analysts from the prohibitively-tedious aspects of low-level data extraction. FATKit allows analysts to focus on higher-level tasks by providing novel methods for automatically deriving digital object definitions from C source code, extracting those objects from memory images, and visualizing the underlying data in various ways. FATKit presently includes modules for general virtual address space reconstruction and visualization, as well as Linux- and Windows-specific kernel analysis.