ANALYSIS OF THE EFFECT OF VSM ON THE MEMORY ACQUISITION PROCESS USING THE DYNAMIC ANALYSIS METHOD
Sinta Nur Maulina*1), Niken Dwi Wahyu Cahyani2), Erwid Musthofa Jadied3)
1. Telkom University, Indonesia 2. Telkom University, Indonesia 3. Telkom University, Indonesia
Article Info ABSTRACT
Kata Kunci : Live Forensics, VSM, Tools, Crash Keywords : Live Forensics, VSM, Tools, Crash
Article history:
Received 22 December 2022 Revised 29 December 2022 Accepted 4 Januray 2023 Available online 1 June 2023
DOI :
https://doi.org/10.29100/jipi.v8i2.3745
* Corresponding author.
Corresponding Author E-mail address:
At first, forensics was restricted to studying data that was stored on a system's hard disk. However, as storage capacity and data encryption increased, applying conventional digital forensic procedures became more challenging. As a result, memory forensics techniques are developed, or are frequently referred to as live forensics, because the process is quicker and more sophisticated. Volatile memory forensics, often known as live forensics, are necessary for this condition. Live forensics has flaws, specifically that some programs can fail when the computer is in active VSM (virtual secure mode). This results in the retrievable evidence being lost. Therefore, determining the cause is essential. The software-based memory acquisition tools Autopsy, Isobuster, DumpIt, and Magnet RAM Capturer are just a few examples.
According to the findings of the experiments, the tools that have crashed include DumpIt v1.3.2.20110401. A dynamic code analysis using WindBg as a tool was utilized to study the impact of VSM on the memory acquisition tool. This study's goal is to identify the instances of crashes in various forensic instruments, which will be highly useful for forensic experts performing investigations.
.
I. INTRODUCTION
igital forensics or forensics is used to examine digital evidence when handling a case that requires the handling and identification of digital goods in forensic science, especially to investigate the discovery of digital device content, and is often associated with crime [1]. Digital investigators use information on an attacker's computer to find clues that can help in proving a case. One aspect is digital evidence that can be retrieved from main memory (RAM), which includes immediate information about the currently running program.
Computer forensics is an investigation and computer analysis technique that involves the stages of identification, preparation, extraction, documentation and interpretation of the origin of the data on the computer to serve as evidence of cybercrime incidents [2]. There is a problem in live forensics, namely some tools crash when the computer is in active VSM (virtual secure mode) using a 64-bit operating system, x64-based processor.
This causes the evidence to be taken to be lost. Therefore, it is necessary to find the cause. There are several software-based memory acquisition tools, namely autopsy, isobuster, DumpIt, Magnet RAM Capturer. From the results of the experiments that have been carried out, the tools that have crashed are DumpIt v1.3.2.20110401.
VSM is a Hyper-V container that isolates the lsass.exe process from a running Windows 10 machine. Reduces the risk of credentials from a computer using a tool namely mimikatz, and is used for pass-the-hash attacks.
Something worth mentioning is that VSM only protects domain[3] credentials. Each partition contains an operating system environment. If windows based, this environment has this architecture consists of the following parts of Windows i.e. system support processes, services, applications, Windows subsystem, Hardware abstraction layer kernel drivers. Each partition works with its own isolation abuts. The separator boundaries between partitions are created and managed by the hypervisor. Isolation partitioning is implemented so that the hypervisor allocates a separate virtual memory space. The hardware resources for each of these partitions mean that the partition is not accessible to the memory that another partition allocates. In a virtualized environment based on Hyper-V, it is managed using a partition called the root partition. Serves other partitions co-located with it. For example, the root partition hosts virtualization services. Provided by the hypervisor to make this service available on other shared partitions. Also this root partition can host device drivers because it is the only partition that has direct access to
D
hardware resources[4].
Hypelrcalls implemel lnts thel selrvicels that the hypel rvisor displays to partitions. It involvel s critical systel m sel rvicel s l elnabling thel opelration of virtual systelms, namelly memory managel lment sel rvicel s. El ach Hypel r-V hypel rcall can bel l uniquelly idelntifield by an idelntification number, which is rel fel lrred to as a dialing codel . An important prel rel quisitel l for a Hyper-V hypel rcall to bel l calleld is the el xistel ncel of thel hypel rcall pagel in thel contel xt of thel partition. Thel l hypelrcall pagel is a memory pagel l that storels code to invokel a hypel rcall according to thel Hypel r-V spel cification. l
This pagel is elxposeld by thel hypelrvisor to elvery partition. Thel l Windows hypervisor is thel bridgel through which l
Hypelr-V communicatels with the hardwarel l. Of coursel, the hardwarel is del signel d and cel rtifiel d to run on thel Windows l
Selrvelr opelrating systelm. Hypelr-V managels virtual machinels with hardware partitions. Callel d a virtual partition. A l virtual partition consists of a parelnt partition and child partitions. Partition for whelre Windows Sel rvel r rel sidel s. l Melanwhile, sub-partitions can bel sharel d with othel r opel lrating systems can bel sel el ln in figure 1. l
Figurel 1 : Hyper-v architel lcturel
WinDbg is a multipurpose del buggel lr for the Microsoft Windows computel r opel rating systel m, distributel d by l Microsoft. Delbugging is thel process of finding and rel solving el rrors in a systel m in computing that also includel s l elxploring thel intelrnal opelrations of software as an aid to del vel lopmel nt. It can bel usel d to del bug usel r model l applications, delvice drivel rs, and thel l operating systel m itsel llf in kelrnell mode. This typel of archivel includel s a l minimum amount of information. It contains only the BSOD el rror mel ssagel , information about thel drivel r, thel l procelssels that welrel active at thel l timel of thel crash, and which kernel l procel ss or threl ad causel d thel crash in thel l gelnelrally small kelrnel mel lmory dump, 1/3 the amount of physical mel mory. Kel rnel ll memory dumps arel morel spel cific l than minidumps. It contains kelrnell model drivelrs and programs, including memory allocatel d to thel Windows kel rnel l l and hardwarel abstraction layelrs, and memory allocatel ld to othelr kernel l model drivel lrs and evel nts. Complel tel mel mory l dump. largelst sizel and relquirels memory el quivalel lnt to your system RAM plus thel 1 MB rel quirel d by Windows to l build this file. Automatic mel lmory dump. sync with kelrnel mel mory dumps in casel of issuel s. Thel sel diffel r only in l
how much spacel is useld to form the dump filel . This archivel l type doel ls not exist in Windows 7. It was addel d in l
Windows 8. Thel melmory disposal area is activel l. This type of filtel r el llelment cannot del tel rminel thel causel of thel l
systelm failure. Windbg is thel l most powelrful debugging and rel vel rsel el nginel lering tool on thel Windows platform. l Windbg, namelly X-ray plus MRI plus CT scan of programs running on the Windows opel rating systel m, including l thel opelrating systelm itsellf. It finds the causel l of complex problel lms with programs running in Windows (OS) and programs running in Windows (OS)[5].
Dumplt is a collection of two tools, namel lly win32dd and win64dd, combined as an el xel cutablel usel d to acquirel l physical melmory. Dumplt is delsigneld to be administel lreld to non-technical usel lrs using a removablel USB drivel . l Dumplt will takel a snapshot from physical melmory and save it to thel foldel r[6]. Mel mory Dump is carriel d out for l thel purposel of melmory acquisition which has two approachels for performing mel mory acquisition, namel ly l hardwarel-based and softwarel -basel d. Thel rel arel so many softwarel l available to gel t mel mory privatel ly. This softwarel l softwarel can capture RAM privatel lly. DumpIt is a compact portable softwarel that makel s it el asy to storel thel contel nts l
of physical memory[7]. l
Melmory acquisition is thel process of acquiring volatilel l memory (RAM) to non-volatilel storagel (filel s on disk)[8]. l livel forelnsics is a way in a forelnsic procelss whelre thel systel m is still running, this is donel bel causel if thel systel m diel s l theln thelrel will bel lost data or information[9]. The livel forel lnsic melthod is usually used for casel s whel rel thel rel is l volatilel data wherel l thel data will be lost if thel l power sourcel l diels, volatilel data is usually stored in tel mporary mel dia, l namelly RAM. Melanwhile, livel forel nsics is usel d to collel lct data when thel affel ctel d systel m is still alivel [10]. Virtual l
forelnsic investigations mainly rel ly on data storel d on storagel mel dia along with primary storagel . Volatilel mel mory l
or random access mel lmory can storel information i.e. running procel lsses, incognito browsing sel ssions, clipboard l
statistics, information stored in plain tel lxt relports.
This study aims to analyze thel l elffect of VSM on thel l live mel mory acquisition procel ss using thel dynamic mel thod l using thel windBg melthod. Thel Windows Delbugger (WinDbg) can bel usel d to del bug kel rnel l model and usel r model l codel, analyzel crash dumps, and inspect CPU rel gistel rs whilel codel is running[11]. l
II. RESEL LARCHMELTHOD A. Problelm Solving Systelmatics
Figurel 2 : Flowchart Ovelrview of systel m del lsign
In figurel 2, the stagel ls of relsearch in thel systel lmatics of solving this problem usel qualitativel mel thods, namel ly l litelraturel studiels which aim to collect morel l specific information rel latel d to thel problel m bel ing studiel d, thel n this l information will of course bel utilizel ld if it has something to do with thel rel sel arch bel ing carriel d out which is shown l by thel theoriel ls relel lvant thelory.
In this resel larch, thel melthod used to analyzel thel l effel lct of VSM on the mel mory acquisition tool is dynamic codel l using WindBg as its auxiliary tool. Software-basel ld memory acquisition tools, namel ly autopsy, isobustel r, DumpIt, l Magnelt RAM Capturelr. Howelvelr, using this tool on a system with activel VSM model l causes a systel m crash known l as a bluel screlen on del lath (BSoD). The following is proof that VSM is activel by looking for "Task Managel r" and l chelcking whethel lr "Securel l Systelm" is running or not can bel selen in figurel 3. l
Figure 3 : Activel VSM Task Managel r l
Computelr softwarel is pronel to many flaws and problems. Bluel screl len of del ath (BSOD) and timel out del tel ction l and relcovelry (TDR) arel thel most common elrrors in computelr software. Del bugging is onel of thel most important l things in thel modelrn world to find and fix thesel el rrors. Del bugging is part of thel softwarel tel sting procel ss and l delpelnds on it throughout the softwarel l delvelopmel nt lifel cyclel . "WinDbg" is thel most commonly usel d tool for l delbugging. This documelnt providels basic delbugging, TDR / BSOD debugging, and suggel stions for nel w tools that l can analyzel crash dumps. This document proposel ls a tool that can usel dumps genel lrated during TDR/BSOD to gel t l prel-delbug information for elach error. This tool analyzel s this crash dump without actually del bugging it on thel targel t l systelm can bel seleln in figurel 4.
Figurel 4: Memory acquisition rel lsults wheln VSM is activel
B. Elxpelriment Scel nario l
In this elxpelriment, sel lvelral stagels of exel lcution will be carriel d out. Thel l test variablel s arel sel vel ral factors that causel l thel systelm to crash. Melanwhilel, the tel lst paramelters arel usel d to del tel rminel systel m pel rformancel whel n obsel rvel d. thel l delbuggelr can show memory addrel lss valuels as thely changel during program exel cution. In this tel st thel tel st variablel s l useld arel:
● Elnablel VSM
1. UElFI Selcure Boot is el nablel ld.
2. Thel Hyper-V rolel l must bel installed in Windows 10. l
Figure 5: Hypel lr-V activel
3. Virtual Selcure Model (VSM) must bel el lnableld in Computer Configuration -> Administrativel tel mplatel s -> Systel m l -> Delvicel Guard -> Turn on Virtualization Baseld Security. El nablel l securel boot thel n sel lel ct Platform sel curity lel vel l l chelck Elnablel Credel lntial Guard (LSA isolatel)
4. VSM condition [elnableld/disabled] l
Thel VSM felaturel is activateld via thel BIOS by setting thel l "Intell Virtualization Technology" option to "El nablel d". l Thel BIOS used is thel l output of the BIOS Vel rsion/Datel vel ndor Amel rican Mel gatrel nds Inc. X407UA.301, l 12/03/2018.
● Chelcking thel occurrencel of crush l
1. Install memory acquisition tools DumpIt, Mel lmory RAM Capture, WindBG. l 2. Pelrform livel melmory acquisition can bel selen in figurel 6. l
Figure 6 : Acquisition l
3. Click yels, theln thel systelm will elxpelrielncel a BSOD C. Application Delbugging
Thel following are thel l stelps for delbugging:
1. Monitoring with Procelss Monitor
First dellelte all currel lntly feltched el vel lnts to relmove irrel llelvant data by selel cting El dit Clel ar Display. Nel xt, run thel l
subjelct malwarel with catch turned on. Aftel lr a felw minutes, you can stop rel cording thel el vel nt. l
2. Vielwing Procelsses with Procel ss El xplorel l
Procelss Elxplorelr monitors thel processel ls running on thel systelm and shows them in thel displays child and parel nt l rellationships trele. l
3. Stelp Codel with Singlel-Stepping l
Single-Stel lpping i.el. one stel p through thel l running program then rel turns control to thel del buggel r. Onel stel p can sel el l elvelrything that is happening in a program. l
4. Pausing Elxelcution with Breakpoints l
Brelakpoints arel useld to pause el xel lcution and allow to chelck program status. When a program is pausel d at a l brelakpoint, it is calleld brokeln. Brelakpoints are nel el lded bel lcause thel y cannot accel ss rel lgisters or mel mory addrel ssel s l whilel thel program is running, becausel thel lse valuel s arel l constantly changing.
5. Elxelcution Modification with Delbugger l
Thel delbuggelr can be usel ld to modify program exel cution. Instructions, or thel l code itsel lf to changel thel way that a l program is exel lcuteld. For examplel l, to escapel l function calls, by seltting a breakpoint whel rel thel function is callel d. l Wheln thel brelakpoint is hit, it can set thel l instruction pointelr to the aftel r-call instruction, thel rel by prel vel nting thel call l
from taking placel. If thel function is critical, thel program may not run propelrly when skippel d or may crash. If its l function has no impact on other arel las of thel program, the program may continuel to run without problel ms. l
6. Kelrnell Delbugging with WindBg
If thel virtual machinel is running, thel delbugger should connel ct within a fel w sel conds. If not running, thel del buggel r l will wait for the OS to boot, and thel ln connect during thel l boot process. Oncel thel del buggel r is connel ctel d, considel r l elnabling velrbose output whilel l delbugging thel kernel l, so that you gel t a morel complel tel picturel of what's going on l with thel verbosel output, notifiel ld elach timel the drivel r unloads. l
Thel relsults of this elvaluation are conducting rel sel larch on live mel mory acquisition using tools namel ly autopsy, l
isobustelr, DumpIt, Magnet RAM Capturel r. Which aims to undel rstand what causel s thel systel m to crash. l III. RELSULTSANDDISCUSSION
A. Thel Results l
Thelrel arel four tools used whel ln performing mel lmory acquisition, namely autopsy, isobustel r, DumpIt, Magnel t l RAM Capturer. Thel l acquisition tools that managed to el xpel riel lnce a crash whel n VSM was activel wel rel thel DumpIt l tools belcause thel l system el lxperiel lnceld a Blue Screl el ln of Death (BSoD) and thel rel forel l therel l was no memory dump l that could bel elxelcuteld. Meanwhilel l, the tools that havel succel el del d in acquiring mel mory arel autopsy, isobustel r and l Magnelt RAM Capturelr. Helrel, dynamic code analysis is pel lrformed on a DumpIt application with an activel VSM l elnvironmelnt, and wel want to know if the application is rel latel d to thel BSoD el rror that occurs. l
To gelt information on thel "Bugchelck" evel lnt, you can use thel Windbg application and run thel !analyzel -v l command. Thel relsults can be sel len in figurel l 7 and figurel 8:
Figure 7: !analyzel -v l
Figurel 8 : Bugchelck analysis
Bugchelck analysis in thel image abovel l that elxecutel ls thel MEMORY.DMP filel that crashel s rel latel d to thel DumpIt l application. Thel modulel obtaineld is DumpIt, and the imagel _namel obtainel d is DumpIt.sys. This causel s information l on thel BSOD (Bluel Screel ln Of Death) screl len, or is callel d a crash. Windbg points out that DumpIt.sys is rel latel d to l DumpIt can be sel leln in tablel 1.
From thel relsults of the sel arch path el xel lcutablel tablel, thel filel C:\WINDOWS\SYSTEM32\ntdll.dll is obtainel d. l Whelrel thel filel gets a syscall brel akpoint which is locatel ld in thel ntdl.dll file, thel l file has an el rror in thel Opel rating l Systelm wherel l the filel cannot bel l exel lcuted bel causel l it crashes which causel s thel BSOD (Bluel Screl el n Of Del ath) l screleln.
Thel codel that caused thel l systelm to crash, namely codel 80000003, el xpel riel ncel d a Brel ak Instruction El xcel ption, l with thel namel failurel bucket ID bel ing BREl AKPOIN 80000003 ntdll.dll!Ldel Initializel Thunk. l
TABEL I EXECUTABLE SEARCH PATH : Child-
SP RetAddr Call Site
000700 00
000a5000 C:\Us-
ers\ASUS\Downloads\DumpIt\Dum pIt.exe
57ed00 00
58028000 C:\Us-
ers\ASUS\AppData\Local\Microsoft\
WindowsApps\
Mi-
crosoft.WinDbg_8wekyb3d8bbwe\T TD\wow64\TTDRecordCPU.dll 761000
00
7631c000 C:\WINDOWS\System32\KERNEL
BASE.dll 767100
00
7678b000 C:\WINDOWS\System32\ADVAPI3
2.dll 768d00
00
769c0000 C:\WINDOWS\System32\KERNEL
32.DLL 769c00
00
76a7e000 C:\WINDOWS\System32\RPCRT4.
dll 771400
00
771ff000 C:\WINDOWS\System32\msvcrt.dll 772000
00
77276000 C:\WINDOWS\System32\sechost.dll 774e00
00
77525000 C:\WINDOWS\System32\SHLWAP
I.dll 778400
00
779e4000 C:\WINDOWS\SYSTEM32\ntdll.dll
B. Analysis of Telst Results l
Analysis of this dynamic code pel lrforms expel rimel ntal rel sults using four mel mory acquisition tools that arel l pelrformeld during VSM (Virtual Securel Model ), namel lly autopsy, isobuster, DumpIt, Magnel t RAM Capturel r. By l using windbg this can help acquirel l memory in ordel r to gel t a syscall brel akpoint bel forel l the tool crashel s. Thel nel xt l stelp is to hellp carry out thel analysis using DR.Memory l
"C:\ProgramFilels(x86)\Dr.Melmory\bin64\dimemory.el lxe""C:\Usel lrs\ASUS\Downloads\Dumpit\Dumplt.exel ". Thel l main purpose of using DR.Mel lmory is to look for syscall brelakponts wheln the VSM is activel . l
DR.Melmory managed to accel lss thel module "C:\WINDOWS\systel m32\ntdll.dll" aftel r analyzing thel modulel to l makel a brelakpoint on thel DumpIt tools. DR.Melmory is only ablel to seel l the last brel akpoint modulel , it is nel cel ssary l to do a telst analysis using dynamic codel, namelly Windbg. This aims to detel rminel whel thel r thel last modulel in l DR.Melmory is thel same as Windbg. l
In Windbg dynamic codel analysis can be el lxelcuted by thel opel rating systel m. This analysis can bel obtainel d by l following thel stelps, namely on thel windbg prel lview mel nu wel can sel llect thel "Start del bugging" mel nu, thel n sel lel ct l
"Launch Elxecutablel l (Advanced)" from thel DumpIt application, and thel del buggel r downloads thel "wntdll.pdb" l symbol filel. Aftelr that, on thel "Command" pagel, do thel following command:
- To load symbols:
1. .symfix 2. .relload 3. !analyzel -v
- To run thel DumpIt application 1. g
From this analysis it can be sel len that thel linel codel bel lfore thel crash on thel DumpIt application was codel l 80000003, and thel last modulel accelssed l on thel DumpIt tools read l by Windbg was C:\WINDOWS\SYSTElM32\ntdll.dll. Thel linel code bel lfore thel crash can mel an that this el rror is causel d by somel l conflicting Registry filel ls, this is due to missing drivel lrs or relatel ld to incompatiblel hardware on which thel program l is running. This is belcausel it can't procelss JIT_DElBUG_INFO, Win32 error 0n30, it's an el rror in missing drivel r l i.el. C:\Uselrs\ASUS\Downloads\DumpIt\DumpIt.exel ;C:\MyProjel lcts\DisplayGreleting\Del bug, thel filel doel sn't havel l thel correct path morel l spelcific so that it causels a breakpoint on linel codel 80000003. l
Thel elffelct that is obtaineld when Virtual Sel curel l Mode (VSM) in thel dynamic mel mory acquisition procel ss is that l it causels thel screleln to elxpelriencel a BSOD whel ln pelrforming melmory acquisition, so this is the el ffel ct that is obtainel d l wheln VSM is active. Thel l problelm that was obtained bel causel l of VSM was a crash on the ntdll.dll modulel which l was causeld by a missing relgistry filel in thel Bug check analysis of this dump filel showing thel causel of thel systel m l elxpelrielncing BSoD, namelly when el lxecuting thel dumpIt.sys modulel l..
The results obtained for this study were able to find out what caused the system to crash and which code was experiencing BSoD compared to previous research only obtaining the ad_driver.sys module. Where the previous research carried out dynamic analysis using the windbg application that was executed, namely the FTK Imager, while in my research the application that was executed was DumpIt. In previous research, the last module obtained before the system crash was C:\Windows\system32\mssprxy.dll, while my research obtained the last module, namely C:\WINDOWS\SYSTEM32\ntdll.dll. So, my research was able to find the last code before the crash was located at a breakpoint in line code 80000003 which was caused by a file that didn't have a more specific path.
IV. CONCLUSION
Thel results of dynamic codel analysis using thel Windbg acquisition application arel carriel d out whel n VSM is l activel. What is done to carry out livel l memory acquisition is that thel rel arel four tools usel d whel n carrying out mel mory l acquisition, namelly autopsy, isobustelr, DumpIt, Magnet RAM Capturel r. Thel tools that havel succel ssfully l pelrformeld melmory acquisition are autopsy, isobustel r and Magnel t RAM Capturel r. Whilel thel tools that failel d to do l melmory-acquisition, namelly DumpIt, this was caused by sel lveral el rrors that causel d a crash duel to a Brel ak l Instruction Elxcelption, with thel namel failurel bucket l ID being l BRElAKPOINT_80000003_ntdll.dll!LdeInitializel lThunk. In this line codel , it can bel sel el n that thel causel of thel crash l is located in an el rror causel d by a rel lgistry file that is contradictory to el xel cution and rel latel d to incompatiblel l
hardwarel. Whelrelas thel last modulel accessel d by Windbg was C:\WINDOWS\SYSTEl M32\ntdll.dll, thel filel had an l elrror in thel Opelrating Systelm wherel thel l file could not bel l elxecutel ld becausel it crashel ld which caused thel BSOD l (Bluel Screleln Of Delath) screel n. l
VSM is Windows 10 which is used to makel l managing the el xisting el lnvironment on thel opel rating systel m to bel l safel, VSM itself is sel lparate from thel usual Windows el nvironmel lnt. How thel dumpIt tool works is a combination of win32dd and win64dd, combineld into one el lxecutablel . DumpIt will thel n takel a snapshot of thel host's physical l melmory and savel it to thel foldelr whelre thel DumpIt el lxelcutable rel sidel s. Thel impact causel d by activel VSM whel n l conducting expel rimel lnts on thel Windbg application to acquire mel mory thel lre is a crash locatel d in thel opel rating l systelm which causes a BSOD (Bluel l Screel ln Of Death). l
REFEL REL NCEL SL
[1]Parmaza , B. (2018). Apa itu Digital Forelnsics (Forensik Digital). Komunitas Tel lknologi dan Komunikasi Jambi.
[2]Alelksandar Milelnkoski, D. P. (2021). Virtual Selcurel Model: Architecturel l Overviel lw. [Technical Rel port] El RNW El nno Rel y Nel tzwel rkel GmbH. l
[3]Anand, G. (2021). Windbg A-Completel l Gide For Advancel ld Windows Delbugging. windbg a completel guidel . l
[4]Arwidmark, J. (2015). Virtual Securel l Model (VSM) explainel d. El lnabling Virtual Securel Model l (VSM) in Windows 10 Elnterprisel Build 10130. l
[5]Gelorgel, G., & Inani, S. (2018). Lelarning Malwarel Analysis. Packt Publishing Ltd. Livery Placel l 35 Livery Strel elt Birmingham B3 2PB, UK. l
[6]Irfan Felbrian Editia Kurdiat, N. W. (2016). Analisis Prosel s Invel lstigasi Delkstop PC Yang Terhubung Layanan Privatel Cloud. Jurnal Tel knik Informatika l
dan Sistelm Informasi.
[7]Michaell Solomon, D. B. (2005). Computelr Forelnsics Jumpstart. Alamelda: SYBEX Inc . l
[8]Rahelvar, D. (2013). Study on Livel analysis of Windows Physical Melmory,IOSR Journal of Computer El nginel elring (IOSR-JCEl ). IOSR Journal of Computel r l
Elnginelering (IOSR-JCEl l).
[9]Riadi, I., Fadlil, A., & Hafizh, M. N. (2020). Analisis Bukti Serangan Addrel ss Rel solution Protocol Spoofing mel nggunakan Mel todel National Institutel of l
Standard Telchnology. Jurnal Pendidikan Informatika. l
[10]Umar, R., Riadi, I., & Handoyo, E. (2019). Analisis Kel amanan Sistel m Informasi Bel rdasarkan Framel work COBIT 5 Mel nggunakan Capability Maturity l
Model Intel lgration (CMMI). Jurnal Sistem Informasi Bisnis. l
[11]Cahyani, N. D., Jadield, El. M., & Ab Rahman, N. H. (2022). The Influel lncel of Virtual Selcure Model (VSM) on Mel mory Acquisition. Intel rnational l
Journal of Advanceld Computelr.