\begin{abstract}
When incidents occur within or when attackers penetrate into
information systems, preventive actions are no longer an appropriate
resort to turn to. It is then vital for the targeted organizations to
review and understand the what's, why's and how's of the threats, as
well as their executions and their outcomes.

This is usually the role of a team of computer forensics experts,
which will go through the tedious task of investigating the digital
crime scene. Because of the very nature of the crime, investigators
need to collect non-disputable evidence to build a valid case.

However, it is not always possible to conduct such an investigation on
the target machine, as it may have been physically destroyed or have
its memory units wiped out clean by skillful malevolent attackers. To
address this problem, we turn ourselves towards post-mortem forensics
analysis tools.
\end{abstract}
