A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is
RETRACTED: "A Probability Model of Covering Key Trace during Capturing Volatile Memory" Procedia Engineering Volume 29, 2012, Pages 1253–1258
In this paper, we give a clear description of the running memory acquiring tool on a target system, especially for possibility covering the key trace during capturing volatile memory. Some key trace of offender may still in the running memory after the scene of a crime and have critical role in court and security applications. However, some key trace, such as rootkits in the memory, memory occupied by their corresponding process will probably be covered/ reallocated during the procedure ofdoi:10.1016/j.proeng.2012.01.122 fatcat:grqpfvyszva7vnumc6xjcy7q2a