Skip to main navigation Skip to search Skip to main content

A forensic investigation of robot operating system

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

10 Citations (Scopus)

Abstract

The robot operating system for robot which is still relatively new, is rapidly gaining robot manufacture industry market share with dozens of robots and drons either released or set to be released. In this paper we present the first methodology and toolset for acquisition and deep analysis of volatile physical memory from robot operating system devices. The article discusses some of the challenges in performing ros memory acquisition, discusses. For memory forensics we used Lime, volatility memory framework and DD command. The acquisition tool supports dump memory to either exterl drive or via the network.
Original languageEnglish
Title of host publicationIEEE 15th Intl Conf on Dependable, Autonomic and Secure Computing
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages368-372
ISBN (Print)9781538619551
DOIs
Publication statusPublished - 2 Apr 2018
Event2017 IEEE 15th Intl Conf on Dependable, Autonomic and Secure Computing, 15th Intl Conf on Pervasive Intelligence and Computing, 3rd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech) - Orlando
Duration: 6 Oct 201710 Oct 2017

Conference

Conference2017 IEEE 15th Intl Conf on Dependable, Autonomic and Secure Computing, 15th Intl Conf on Pervasive Intelligence and Computing, 3rd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech)
CityOrlando
Period6/10/1710/10/17
Other2017 IEEE 15th Intl Conf on Dependable, Autonomic and Secure Computing, 15th Intl Conf on Pervasive Intelligence and Computing, 3rd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech) (06/10/2017-10/10/2017, Orlando)

Keywords

  • Memory Forensics
  • Memory dump
  • Robot Operating System
  • Volatility
  • dd command

Fingerprint

Dive into the research topics of 'A forensic investigation of robot operating system'. Together they form a unique fingerprint.

Cite this