Abstract
This paper describes the use of the Virtual Address Descriptor (VAD) tree structure in Windows memory dumps to help guide forensic analysis of Windows memory. We describe how to locate and parse the structure, and show its value in breaking up physical memory into more manageable and semantically meaningful units than can be obtained by simply walking the page directory for the process. Several tools to display information about the VAD tree and dump the memory regions it describes will also be presented.
Original language | English (US) |
---|---|
Pages (from-to) | 62-64 |
Number of pages | 3 |
Journal | Digital Investigation |
Volume | 4 |
Issue number | SUPPL. |
DOIs | |
State | Published - Sep 2007 |
Keywords
- Anti-forensics
- Digital forensics
- Microsoft Windows
- Virtual Address Descriptors
- Volatile memory
ASJC Scopus subject areas
- Pathology and Forensic Medicine
- Information Systems
- Computer Science Applications
- Medical Laboratory Technology
- Law