{"title":"Recovery of Pidgin Chat Communication Artefacts from Physical Memory: A Pilot Test to Determine Feasibility","authors":"Matthew Simon, J. Slay","doi":"10.1109/ARES.2011.33","DOIUrl":null,"url":null,"abstract":"This research describes a study that looks at the feasibility of extracting remnant information about an instant message client from physical memory. The research goal was to gather information about the target application in order to assess the viability of creating methods to recover specific data about its use. The study consists of a formal experiment where the application is used and the physical memory collected at various points. The memory image was then interrogated to assess whether remnant data could be recovered. The study shows that it is feasible to recover data about the target application.","PeriodicalId":254443,"journal":{"name":"2011 Sixth International Conference on Availability, Reliability and Security","volume":"31 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 Sixth International Conference on Availability, Reliability and Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ARES.2011.33","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 7
Abstract
This research describes a study that looks at the feasibility of extracting remnant information about an instant message client from physical memory. The research goal was to gather information about the target application in order to assess the viability of creating methods to recover specific data about its use. The study consists of a formal experiment where the application is used and the physical memory collected at various points. The memory image was then interrogated to assess whether remnant data could be recovered. The study shows that it is feasible to recover data about the target application.