A hardware-based memory acquisition procedure for digital investigations

  • Authors:
  • Brian D. Carrier;Joe Grand

  • Affiliations:
  • Department of Computer Sciences, CERIAS, Purdue University, Recitation Building 656 Oval Drive, West Lafayette, IN 47907-2086, USA;Grand Idea Studio, Inc., 2907 Shelter Island Drive, Suite 105-169, San Diego, CA 92106, USA

  • Venue:
  • Digital Investigation: The International Journal of Digital Forensics & Incident Response
  • Year:
  • 2004

Quantified Score

Hi-index 0.00

Visualization

Abstract

The acquisition of volatile memory from a compromised computer is difficult to perform reliably because the acquisition procedure should not rely on untrusted code, such as the operating system or applications executing on top of it. In this paper, we present a procedure for acquiring volatile memory using a hardware expansion card that can copy memory to an external storage device. The card is installed into a PCI bus slot before an incident occurs and is disabled until a physical switch on the back of the system is pressed. The card cannot easily be detected by an attacker and the acquisition procedure does not rely on untrusted resources. We present general requirements for memory acquisition tools, our acquisition procedure, and the initial results of our hardware implementation of the procedure.