Abstract
Unlike the existing electric grid, the smart grid has a variety of functions that enable electric utility suppliers and consumers to perform dual exchanges of real-time information by adding IT technology. Therefore, the systems of smart grid suppliers and those of users are always connected through a network, which means that the systems related to the smart grid could become targets of malicious attackers. The various smart grid systems could have different hardware configuration from those of general systems, but their fundamental operating mechanism is the same as that of the general computer system. When a system is operating, its information and the data used by a program are loaded into the system’s memory. In this paper, we studied the method of physical memory collection and analysis in smart grid embedded systems in order to help investigate crimes related to smart grids. In addition, we verify the method studied in this paper through the collection and analysis of physical memory in the virtual Linux environment using a virtual machine.
Similar content being viewed by others
References
Vijayapriya T, Kothari DP (2011) Smart grid: an overview. Smart Grid Renew Energy 2(4):305–311
Grochocki D, Huh JH, Berthier R, Bobba R, Sanders WH, Cardenas AA, Jetcheva JG (2012) AMI threats, intrusion detection requirements and deployment recommendations. IEEE SmartGridComm, pp 395–400
Vomel S, Freiling FC (2011) A survey of main memory acquisition and analysis techniques for the Windows operating system. Digit Investig 8(1):3–22
Petroni Jr NL, Walters AA, Fraser T, Arbaugh WA (2006) FATKit: a framework for the extraction and analysis of digital forensic data from volatile system memory. Digital Investigation 3(4):197–210
Han JS, Lee SJ (2011) The Windows physical memory dump explorer for live forensics. KIISC J 26(2), 21(2):77–82
Young Sup H, Jin Baek K, Jae Chan M, Seong Je C (2013) Classifying malicious web pages by using an adaptive support vector machine. J Inf Process Syst 9(3):395–404
Sylve J (2012) Android mind reading: memory acquisition and analysis with DMD and volatility. Shmoocon
Dolan-Gavitt B (2008) Forensic analysis of the Windows registry in memory. Digit Investig 5(Supplement):S26–S32
Volatility (An advanced memory forensics framework). https://code.google.com/p/volatility/
Acknowledgments
This research was supported by the Basic Science Research Program through the National Research Foundation of Korea (NRF), and funded by the Ministry of Science, ICT & Future Planning (NRF-2012R1A1A1010667)
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Lee, S., Shon, T. Physical Memory Collection and Analysis in Smart Grid Embedded System. Mobile Netw Appl 19, 382–391 (2014). https://doi.org/10.1007/s11036-014-0504-0
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11036-014-0504-0