Skip to main content
Log in

Physical Memory Collection and Analysis in Smart Grid Embedded System

  • Published:
Mobile Networks and Applications Aims and scope Submit manuscript

Abstract

Unlike the existing electric grid, the smart grid has a variety of functions that enable electric utility suppliers and consumers to perform dual exchanges of real-time information by adding IT technology. Therefore, the systems of smart grid suppliers and those of users are always connected through a network, which means that the systems related to the smart grid could become targets of malicious attackers. The various smart grid systems could have different hardware configuration from those of general systems, but their fundamental operating mechanism is the same as that of the general computer system. When a system is operating, its information and the data used by a program are loaded into the system’s memory. In this paper, we studied the method of physical memory collection and analysis in smart grid embedded systems in order to help investigate crimes related to smart grids. In addition, we verify the method studied in this paper through the collection and analysis of physical memory in the virtual Linux environment using a virtual machine.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13

Similar content being viewed by others

References

  1. Vijayapriya T, Kothari DP (2011) Smart grid: an overview. Smart Grid Renew Energy 2(4):305–311

    Article  Google Scholar 

  2. Grochocki D, Huh JH, Berthier R, Bobba R, Sanders WH, Cardenas AA, Jetcheva JG (2012) AMI threats, intrusion detection requirements and deployment recommendations. IEEE SmartGridComm, pp 395–400

  3. Vomel S, Freiling FC (2011) A survey of main memory acquisition and analysis techniques for the Windows operating system. Digit Investig 8(1):3–22

    Article  Google Scholar 

  4. Petroni Jr NL, Walters AA, Fraser T, Arbaugh WA (2006) FATKit: a framework for the extraction and analysis of digital forensic data from volatile system memory. Digital Investigation 3(4):197–210

    Article  Google Scholar 

  5. Han JS, Lee SJ (2011) The Windows physical memory dump explorer for live forensics. KIISC J 26(2), 21(2):77–82

  6. Young Sup H, Jin Baek K, Jae Chan M, Seong Je C (2013) Classifying malicious web pages by using an adaptive support vector machine. J Inf Process Syst 9(3):395–404

    Article  Google Scholar 

  7. Sylve J (2012) Android mind reading: memory acquisition and analysis with DMD and volatility. Shmoocon

  8. Dolan-Gavitt B (2008) Forensic analysis of the Windows registry in memory. Digit Investig 5(Supplement):S26–S32

    Article  Google Scholar 

  9. Volatility (An advanced memory forensics framework). https://code.google.com/p/volatility/

Download references

Acknowledgments

This research was supported by the Basic Science Research Program through the National Research Foundation of Korea (NRF), and funded by the Ministry of Science, ICT & Future Planning (NRF-2012R1A1A1010667)

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Taeshik Shon.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Lee, S., Shon, T. Physical Memory Collection and Analysis in Smart Grid Embedded System. Mobile Netw Appl 19, 382–391 (2014). https://doi.org/10.1007/s11036-014-0504-0

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11036-014-0504-0

Keywords

Navigation