AdvancedForensicsMalwareIncident Response

The Art of Memory Forensics

Detecting Malware and Threats in Windows, Linux, and Mac Memory

5 / 5

Ligh, Case, Levy, and Walters' canonical reference on memory analysis with Volatility — the technique, the tooling, and the operating-system internals it depends on, across Windows, Linux, and macOS.

Buy on Amazon

As an Amazon Associate we earn from qualifying purchases. The link above is sponsored.

Published
2014
Publisher
Wiley
Pages
912
Language
English

Read this if

Incident responders, threat hunters, and malware analysts moving past disk forensics into the place where modern attackers actually live: in memory, in transit, and unbacked by files on disk. Also the textbook for the GCFA-and-beyond DFIR career path.

Skip this if

Beginners with no OS-internals background; the book assumes you know what a process, a handle, and a kernel object are. Also dated on Volatility 3 — written for 2.x — though the conceptual material translates cleanly.

Key takeaways

  • Memory is the only place where modern post-exploitation tools are guaranteed to be honest; the book makes that argument by showing what you can recover that disk cannot.
  • Volatility plugins are an investigative grammar — once you know the verbs, you can construct the questions; the book is the dictionary for the grammar.
  • Cross-OS memory forensics is one workflow with three dialects; the unified Windows/Linux/macOS coverage is the book's underrated structural choice.

Notes

Pair with Practical Malware Analysis (Sikorski/Honig) for the static-and-dynamic complement and with Incident Response and Computer Forensics 3e (Mandia et al.) for the engagement-level frame. The Volatility Foundation's documentation and the SANS FOR526 / FOR508 courses are the natural follow-ups. The single best printed introduction to memory forensics and one of the rare books where you actually want to do the labs.