Dissemin is shutting down on January 1st, 2025

Published in

Springer Verlag (Germany), Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, p. 17-22, 2012

DOI: 10.1007/978-3-642-33448-1_3

Links

Tools

Export citation

Search in Google Scholar

Practical Password Harvesting from Volatile Memory

Journal article published in 2012 by Stavroula Karayianni, Vasilios Katos ORCID
This paper is available in a repository.
This paper is available in a repository.

Full text: Download

Green circle
Preprint: archiving allowed
Green circle
Postprint: archiving allowed
Red circle
Published version: archiving forbidden
Data provided by SHERPA/RoMEO

Abstract

In this paper we challenge the widely accepted approach where a first responder does not capture the RAM of a computer system if found to be powered off at a crime scene. We investigate the presence of confidential data in RAM such as user passwords. Our findings show that even if the computer is switched off but not removed from the mains, the data are preserved. In fact, when a process is terminated but the computer is still operating, the respective data are more likely to be lost. Therefore capturing the memory could be as critical on a switched off system as on a running one.