A Comprehensive Literature Review on Volatile Memory Forensics
Abstract
:1. Introduction
Overview of Sections
- How successful are the current methods and devices of memory forensics, and in which areas do they differ in terms of precision, speed, and usability?The aim of this question is to assess whether the memory forensic tools currently used for investigative purposes are effective. The pros and cons of these tools will be evaluated to determine how effective they are for different types of investigations.
- What is the role in the development of memory forensic methods of breakthroughs in hardware and software technology, and what challenges have emerged with them?The aim of this question is to understand the evolution of memory forensic techniques, considering the new challenges that may arise due to increasing amounts of data and advances in encryption.
- What ethics and laws are involved in memory forensics, and how are these being considered in ongoing research and practice?
2. Methodology for Literature Selection
2.1. Inclusion and Exclusion Criteria
2.2. Search Strategy
2.3. Paper Selection Process
2.4. PRISMA Statement and Flow Diagram
3. Background
3.1. Types of Memory
3.2. Volatile Memory Overview
3.3. Memory Forensic Techniques
4. Analyzing Existing Literature Reviews
4.1. Comparative Analysis of Existing Literature Reviews: Background and Scope
4.2. Methodology
4.3. Findings
4.4. Gaps in Literature
5. Main Research Contributions
5.1. Overview of Key Works
5.2. Comparative Analysis of Methods
5.3. Thematic Categorization
5.4. Innovations and Gaps
5.5. Methodological Challenges
5.6. Emerging Technologies
5.7. Legal and Ethical Considerations
6. Discussion
6.1. Challenges
6.2. Limitations
6.3. Implications
6.3.1. Legal Frameworks and Regulations Impacting Memory Forensics
6.3.2. Ethical Issues in Memory Forensics
6.3.3. Role in Criminal Investigations
6.3.4. Impact on Privacy and Data Protection
6.3.5. Legal and Regulatory Considerations
6.3.6. Ethical Responsibilities
6.3.7. Implications for Policy and Governance
6.4. Future Directions
7. Future Recommendations
7.1. Areas for Further Research
7.2. Emerging Trends and Technologies
7.3. Methodological Improvements
8. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Acknowledgments
Conflicts of Interest
References
- Strandberg, K.; Nowdehi, N.; Olovsson, T. A systematic literature review on automotive digital forensics: Challenges, technical solutions and data collection. IEEE Trans. Intell. Veh. 2022, 8, 1350–1367. [Google Scholar] [CrossRef]
- Coronel, B.; Cedillo, P.; Campos, K.; Camacho, J.; Bermeo, A. A systematic review in cyber forensics: Current trends from the client perspective. In Proceedings of the 2018 IEEE Third Ecuador Technical Chapters Meeting (ETCM), Cuenca, Ecuador, 15–19 October 2018; pp. 1–6. [Google Scholar]
- Ishrag Hamid, R.A.; Riad, K. Advancing Malware Artifact Detection and Analysis through Memory Forensics: A Comprehensive Literature Review. J. Theor. Appl. Inf. Technol. 2024, 102, 1–16. [Google Scholar]
- Maneli, M.A.; Isafiade, O.E. 3D forensic crime scene reconstruction involving immersive technology: A systematic literature review. IEEE Access 2022, 10, 88821–88857. [Google Scholar] [CrossRef]
- Hamid, I.; Alabdulhay, A.; Hafizur Rahman, M.M. A systematic literature review on volatility memory forensics. In Computational Vision and Bio-Inspired Computing; Springer: Berlin/Heidelberg, Germany, 2023; pp. 589–600. [Google Scholar]
- Manral, B.; Somani, G.; Choo, K.K.R.; Conti, M.; Gaur, M.S. A systematic survey on cloud forensics challenges, solutions, and future directions. ACM Comput. Surv. (CSUR) 2019, 52, 1–38. [Google Scholar] [CrossRef]
- Bai, V.S.; Sudha, T. A systematic literature review on cloud forensics in cloud environment. Int. J. Intell. Syst. Appl. Eng. 2023, 11, 565–578. [Google Scholar]
- Bahrum, N.N.; Setumin, S.; Abdullah, M.F.; Maruzuki, M.I.F.; Che Ani, A.I. A systematic review of face sketch recognition system. J. Electr. Electron. Syst. Res. 2023, 22, 1–10. [Google Scholar] [CrossRef]
- Al-Dhaqm, A.; Ikuesan, R.A.; Kebande, V.R.; Abd Razak, S.; Grispos, G.; Choo, K.K.R.; Al-Rimy, B.A.S.; Alsewari, A.A. Digital forensics subdomains: The state of the art and future directions. IEEE Access 2021, 9, 152476–152502. [Google Scholar]
- Al-Dhaqm, A.; Abd Razak, S.; Othman, S.H.; Ali, A.; Ghaleb, F.A.; Rosman, A.S.; Marni, N. Database forensic investigation process models: A review. IEEE Access 2020, 8, 48477–48490. [Google Scholar]
- Lutta, P.; Sedky, M.; Hassan, M.; Jayawickrama, U.; Bastaki, B.B. The complexity of internet of things forensics: A state-of-the-art review. Forensic Sci. Int. Digit. Investig. 2021, 38, 301210. [Google Scholar] [CrossRef]
- Fernando, V. Cyber forensics tools: A review on mechanism and emerging challenges. In Proceedings of the 2021 11th IFIP International Conference on New Technologies, Mobility and Security (NTMS), Paris, France, 19–21 April 2021; pp. 1–7. [Google Scholar]
- Ghosh, A.; Majumder, K.; De, D. A systematic review of digital, cloud and iot forensics. In The “Essence” of Network Security: An End-to-End Panorama; Springer: Berlin/Heidelberg, Germany, 2021; pp. 31–74. [Google Scholar]
- Casino, F.; Dasaklis, T.K.; Spathoulas, G.P.; Anagnostopoulos, M.; Ghosal, A.; Borocz, I.; Solanas, A.; Conti, M.; Patsakis, C. Research trends, challenges, and emerging topics in digital forensics: A review of reviews. IEEE Access 2022, 10, 25464–25493. [Google Scholar] [CrossRef]
- Paul Joseph, D.; Norman, J. A review and analysis of ransomware using memory forensics and its tools. In Smart Intelligent Computing and Applications: Proceedings of the Third International Conference on Smart Computing and Informatics; Springer: Singapore, 2020; Volume 1, pp. 505–514. [Google Scholar]
- Gancedo, Y.; Fariña, F.; Seijo, D.; Vilariño, M.; Arce, R. Reality monitoring: A meta-analytical review for forensic practice. Eur. J. Psychol. Appl. Leg. Context 2021, 13, 99–110. [Google Scholar] [CrossRef]
- Chopade, R.; Pachghare, V.K. Ten years of critical review on database forensics research. Digit. Investig. 2019, 29, 180–197. [Google Scholar] [CrossRef]
- Taylor, J.; Turnbull, B.; Creech, G. Volatile memory forensics acquisition efficacy: A comparative study towards analysing firmware-based rootkits. In Proceedings of the 13th International Conference on Availability, Reliability and Security, Hamburg, Germany, 27–30 August 2018; pp. 1–11. [Google Scholar]
- Nyholm, H.; Monteith, K.; Lyles, S.; Gallegos, M.; DeSantis, M.; Donaldson, J.; Taylor, C. The evolution of volatile memory forensics. J. Cybersecur. Priv. 2022, 2, 556–572. [Google Scholar] [CrossRef]
- Osbourne, G. Memory forensics: Review of acquisition and analysis techniques. Defence Sci. Technol. Organ. Edinb. Cyber Electron. Warfare Div, Tech. Rep. 2013. [Google Scholar]
- Chetry, A.; Sharma, U. Memory forensics analysis for investigation of online crime-a review. In Proceedings of the 2019 6th International Conference on Computing for Sustainable Global Development (INDIACom), New Delhi, India, 13–15 March 2019; pp. 40–45. [Google Scholar]
- Pagani, F.; Fedorov, O.; Balzarotti, D. Introducing the temporal dimension to memory forensics. ACM Trans. Priv. Secur. (TOPS) 2019, 22, 1–21. [Google Scholar]
- Daghmehchi Firoozjaei, M.; Habibi Lashkari, A.; Ghorbani, A.A. Memory forensics tools: A comparative analysis. J. Cyber Secur. Technol. 2022, 6, 149–173. [Google Scholar] [CrossRef]
- Latzo, T.; Palutke, R.; Freiling, F. A universal taxonomy and survey of forensic memory acquisition techniques. Digit. Investig. 2019, 28, 56–69. [Google Scholar] [CrossRef]
- Shree, R.; Shukla, A.K.; Pandey, R.P.; Shukla, V.; Bajpai, D. Memory forensic: Acquisition and analysis mechanism for operating systems. Mater. Today Proc. 2022, 51, 254–260. [Google Scholar] [CrossRef]
- Ostrovskaya, S.; Skulkin, O. Practical Memory Forensics: Jumpstart Effective Forensic Analysis of Volatile Memory; Packt Publishing Ltd.: Birmingham, UK, 2022. [Google Scholar]
- Likhar, D.; Rajput, M. Study of Memory Forensics: Memory Analysis Technique. Memory 2019, 7, 2333–2335. [Google Scholar]
- Jones, G.M.; Winster, S.G. An insight into digital forensics: History, frameworks, types and tools. In Cyber Security and Digital Forensics; Wiley: Hoboken, NJ, USA, 2022; pp. 105–125. [Google Scholar]
- Al-Dhaqm, A.; Ikuesan, R.A.; Kebande, V.R.; Razak, S.; Ghabban, F.M. Research challenges and opportunities in drone forensics models. Electronics 2021, 10, 1519. [Google Scholar] [CrossRef]
- Alharbi, S.; Weber-Jahnke, J.; Traore, I. The proactive and reactive digital forensics investigation process: A systematic literature review. In Proceedings of the Information Security and Assurance: International Conference, ISA 2011, Brno, Czech Republic, 15–17 August 2011; pp. 87–100. [Google Scholar]
- Pandey, A.K.; Tripathi, A.K.; Kapil, G.; Singh, V.; Khan, M.W.; Agrawal, A.; Kumar, R.; Khan, R.A. Current challenges of digital forensics in cyber security. In Critical Concepts, Standards, and Techniques in Cyber Forensics; IGI Global: Pennsylvania, PA, USA, 2020; pp. 31–46. [Google Scholar]
- Al-Dhaqm, A.; Abd Razak, S.; Ikuesan, R.A.; Kebande, V.R.; Siddique, K. A review of mobile forensic investigation process models. IEEE Access 2020, 8, 173359–173375. [Google Scholar] [CrossRef]
- Azzery, Y.; Mulyanto, N.D.; Hidayat, T. Memory Forensic Development and Challenges in Identifying Digital Crime: A Review. Teknokom 2022, 5, 96–102. [Google Scholar] [CrossRef]
- Ganesh, N.G.; Venkatesh, N.M.; Prasad, D.V.V. A systematic literature review on forensics in cloud, IoT, AI & blockchain. In Illumination of Artificial Intelligence in Cybersecurity and Forensics; Springer: Berlin/Heidelberg, Germany, 2022; pp. 197–229. [Google Scholar]
- Sjöstrand, M. Combatting the Data Volume Issue in Digital Forensics: A Structured Literature Review. Independent Thesis, School of Informatics, University of Skövde, Skövde, Sweden, 2020. Available online: https://www.essays.se/essay/6451f12a1d/ (accessed on 23 June 2024).
- Case, A.; Maggio, R.D.; Firoz-Ul-Amin, M.; Jalalzai, M.M.; Ali-Gombe, A.; Sun, M.; Richard, G.G., III. Hooktracer: Automatic detection and analysis of keystroke loggers using memory forensics. Comput. Secur. 2020, 96, 101872. [Google Scholar] [CrossRef]
- Nayerifard, T.; Amintoosi, H.; Bafghi, A.G.; Dehghantanha, A. Machine learning in digital forensics: A systematic literature review. arXiv 2023, arXiv:2306.04965. [Google Scholar]
- Aly, M.; Khomh, F.; Haoues, M.; Quintero, A.; Yacout, S. Enforcing security in Internet of Things frameworks: A systematic literature review. Internet Things 2019, 6, 100050. [Google Scholar] [CrossRef]
- Pallivalappil, A.S.; Jagadeesha, S.N. Procedures for Digital Forensics and Incident Response on Including Data Integrity Constraints on Solid-State Drives (SSD)-A Literature Review. Int. J. Case Stud. Bus. IT Educ. (IJCSBE) 2022, 6, 328–350. [Google Scholar] [CrossRef]
- Montasari, R.; Hill, R. Next-generation digital forensics: Challenges and future paradigms. In Proceedings of the 2019 IEEE 12th International Conference on Global Security, Safety and Sustainability (ICGS3), London, UK, 16–18 January 2019; pp. 205–212. [Google Scholar]
- Dawson, L.; Akinbi, A. Challenges and opportunities for wearable IoT forensics: TomTom Spark 3 as a case study. Forensic Sci. Int. Rep. 2021, 3, 100198. [Google Scholar] [CrossRef]
- Alghamdi, M.I. Digital forensics in cyber security—Recent trends, threats, and opportunities. In Cybersecurity Threats with New Perspectives; Books on Demand: Norderstedt, Germany, 2021. [Google Scholar]
- Servida, F.; Casey, E. IoT forensic challenges and opportunities for digital traces. Digit. Investig. 2019, 28, S22–S29. [Google Scholar] [CrossRef]
- Tiwari, A.; Mehrotra, V.; Goel, S.; Naman, K.; Maurya, S.; Agarwal, R. Developing trends and challenges of digital forensics. In Proceedings of the 2021 5th International Conference on Information Systems and Computer Networks (ISCON), Mathura, India, 22–23 October 2021. [Google Scholar]
- Yaacoub, J.P.A.; Noura, H.N.; Salman, O.; Chehab, A. Digital forensics vs. Anti-digital forensics: Techniques, limitations and recommendations. arXiv 2021, arXiv:2103.17028. [Google Scholar]
- Zhang, N.; Zhang, R.; Sun, K.; Lou, W.; Hou, Y.T.; Jajodia, S. Memory forensic challenges under misused architectural features. IEEE Trans. Inf. Forensics Secur. 2018, 13, 2345–2358. [Google Scholar] [CrossRef]
- Javeed, D.; Khan, M.T.; Ahmad, I.; Iqbal, T.; Badamasi, U.M.; Ndubuisi, C.O.; Umar, A. An efficient approach of threat hunting using memory forensics. Int. J. Comput. Netw. Commun. Secur. 2020, 8, 37–45. [Google Scholar] [CrossRef] [PubMed]
- Thomas, T.; Piscitelli, M.; Nahar, B.A.; Baggili, I. Duck Hunt: Memory forensics of USB attack platforms. Forensic Sci. Int. Digit. Investig. 2021, 37, 301190. [Google Scholar] [CrossRef]
- Qawasmeh, E.; Al-Saleh, M.I.; Al-Sharif, Z.A. November. Towards a generic approach for memory forensics. In Proceedings of the 2019 Sixth HCT Information Technology Trends (ITT), Ras Al Khaimah, United Arab Emirates, 20–21 November 2019; pp. 094–098. [Google Scholar]
Paper | Key Finding | Limitation/Research Gap | Suggested Mitigation |
---|---|---|---|
Coronel et al. [2] | Trends in cyber forensics from a client perspective | Need for user-friendly forensic tools for non-technical users | Enhance collaboration among stakeholders |
Ishrag et al. [3] | Advancements in malware artifact detection | Challenges in processing large memory dumps | Require automated tools for analysis |
Alharbi, Weber-Jahnke, and Traore [30] | Efficiency of proactive in digital forensics | Difficulty in consistently adapting to evolving cyber-threats | Combine proactive and reactive methods |
Maneli et al. [4] | 3D crime scene reconstruction using immersive tech | Technical restrictions and privacy concerns | Standardization and validation of reconstruction methods |
Hamid, Alabdulhay, and Hafizur Rahman [5] | Importance of volatility memory in forensics | Need for standard solutions for memory anomalies | Research and development in memory forensics |
Manral et al. [6] | Challenges in cloud forensics | Data dispersion and jurisdiction issues in cloud computing | Collaboration between cloud providers and investigators |
Bai et al. [7] | Complexities in cloud forensics | Difficulty in evidence gathering due to cloud complexity | Develop forensic tools specific to cloud architectures |
Bahrum et al. [8] | Advances in face sketch recognition systems | Achieving high accuracy with different sketch styles | Further research to enhance system performance |
Strandberg et al. [1] | Automotive digital forensics challenges and solutions | Complexity of automotive systems and data volatility | Develop specific forensic tools and address privacy concerns |
Coronel et al. [2] | Trends in cyber forensics from a client perspective | Need for user-friendly forensic tools for non-technical users | Enhance collaboration among stakeholders |
Alharbi, Weber-Jahnke, and Traore [30] | Efficiency of proactive in digital forensics | Difficulty in consistently adapting to evolving cyber-threats | Combine proactive and reactive methods |
Maneli, et al. [4] | 3D crime scene reconstruction using immersive tech | Technical restrictions and privacy concerns | Standardization and validation of reconstruction methods |
Manral et al. [6] | Challenges in cloud forensics | Data dispersion and jurisdiction issues in cloud computing | Collaboration between cloud providers and investigators |
Bai et al. [7] | Complexities in cloud forensics | Difficulty in evidence gathering due to cloud complexity | Develop forensic tools specific to cloud architectures |
Bahrum et al. [8] | Advances in face sketch recognition systems | Achieving high accuracy with different sketch styles | Further research to enhance system performance |
Al-Dhaqm, Ghabban et al. [32] | Mobile forensic investigation process models | Rapid evolution of mobile devices and encryption | Develop adaptive frameworks and automatic data extraction tools |
Lutta et al. [11] | Challenges in IoT forensics | Device interoperability and evolving IoT technologies | Intersectoral cooperation for accepted practices |
Fernando et al. [12] | Mechanism of cyber forensic tools | Evolving challenges in cyber forensics like encryption | Interdisciplinary collaboration for tool enhancement |
Ghosh, Majumder, and De [13] | Digital, cloud, and IoT forensics in network security | Managing vast data and variety of devices | Strategic plans for diverse cyber threats |
Paul Joseph and Norman [15] | Ransomware detection using memory forensics | Limited methods in current memory forensic tools | Research for improved memory forensic tools |
Gancedo et al. [16] | Reality monitoring in forensic practice | Limited reliability in legal proceedings | Research and standardized guidelines for reality monitoring |
Chopade and Pachghare [17] | Database forensics over a decade | Need for more efficient solutions to complex database issues | Interdisciplinary collaboration and standardization |
Azzery, Mulyanto, and Hidayat [33] | Memory forensics in digital crime detection | Handling encryption and anti-forensic methods | Enhance forensic tools and techniques |
Ganesh, Venkatesh, and Prasad [34] | Forensics in cloud, IoT, AI and blockchain | Specific complexities in each sector | Utilize AI and blockchain for improved forensic practices |
Al-Dhaqm, Siddique et al. [10] | Approaches in database forensic investigations | Gaps in current investigation models | Improve efficiency of investigation models |
Sjöstrand et al. [35] | Tackling data volume issues in digital forensics | Difficulty in managing extensive data | Develop enhanced data management strategies |
Pandey et al. [31] | Challenges in cyber security digital forensics | Need for standardized tools and collaboration | Enhance collaborative efforts across sectors |
Case et al. [36] | Using Hooktracer for keystroke logger detection | Necessity for tools against keystroke loggers | Apply Hooktracer for effective malware detection |
Nayerifard et al. [37] | Machine learning in digital forensics | Need for quality training data and adaptable algorithms | Focus on developing and refining ML techniques |
Aly et al. (2019) | Security challenges in IoT frameworks | Evolving threats and need for comprehensive security | Continuous research and development in IoT security |
Al-Dhaqm, Ghabban et al. [29] | State-of-the-art in digital forensics subdomains | Rapid technological advancements outpacing current methods | Interdisciplinary R&D and integration of AI and ML |
Challenge | Mitigation | Future Direction |
---|---|---|
Volatility of memory | Develop rapid capture techniques and tools to preserve data quickly and accurately. | Advance real-time memory analysis capabilities to mitigate the impact of volatility. |
Encryption and obfuscation | Implement specialized decryption techniques and tools to uncover hidden information. | Explore advanced analytical techniques to address encryption challenges, such as quantum computing. |
Data volume and complexity | Utilize sophisticated tools and deep technical expertise to navigate and interpret complex memory structures. | Enhance the scalability of forensic tools to handle large-scale systems and cloud environments. |
Rapid technological advancements | Continuously update and adapt forensic tools and methodologies to keep pace with new threats. | Foster interdisciplinary collaboration to innovate and develop adaptable forensic tools and methodologies. |
Resource constraints | Optimize forensic tools for efficiency and develop scalable solutions for large memory dumps. | Invest in research to develop lightweight and efficient forensic tools. |
Legal and ethical considerations | Ensure compliance with legal frameworks and ethical guidelines, and maintain integrity in investigations. | Continuously evaluate and update legal and ethical frameworks to align with technological advancements. |
Skills gap | Enhance training and education programs for forensic professionals. | Promote interdisciplinary education to bridge the gap between technical expertise and legal knowledge. |
Privacy and data protection concerns | Develop methodologies and tools that minimize the exposure of non-relevant personal data. | Advance privacy-preserving forensic techniques to balance investigation needs with privacy rights. |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Hamid, I.; Rahman, M.M.H. A Comprehensive Literature Review on Volatile Memory Forensics. Electronics 2024, 13, 3026. https://doi.org/10.3390/electronics13153026
Hamid I, Rahman MMH. A Comprehensive Literature Review on Volatile Memory Forensics. Electronics. 2024; 13(15):3026. https://doi.org/10.3390/electronics13153026
Chicago/Turabian StyleHamid, Ishrag, and M. M. Hafizur Rahman. 2024. "A Comprehensive Literature Review on Volatile Memory Forensics" Electronics 13, no. 15: 3026. https://doi.org/10.3390/electronics13153026
APA StyleHamid, I., & Rahman, M. M. H. (2024). A Comprehensive Literature Review on Volatile Memory Forensics. Electronics, 13(15), 3026. https://doi.org/10.3390/electronics13153026