-
2
-
-
84868372495
-
-
Arasteh A. Forensic memory analysis: from stack and code execution history. In: Proceedings of the 2007 Digital Forensic Research Workshop (DFRWS), 2007.
-
Arasteh A. Forensic memory analysis: from stack and code execution history. In: Proceedings of the 2007 Digital Forensic Research Workshop (DFRWS), 2007.
-
-
-
-
3
-
-
48749133376
-
-
Carrier B. The Sleuthkit and Autopsy, http://www.sleuthkit.org/.
-
Carrier B. The Sleuthkit and Autopsy, http://www.sleuthkit.org/.
-
-
-
-
4
-
-
3042731401
-
Hardware-based memory aquisition procedure for digital investigations
-
Carrier B., and Grand J. Hardware-based memory aquisition procedure for digital investigations. Journal of Digital Investigation 1 1 (2004)
-
(2004)
Journal of Digital Investigation
, vol.1
, Issue.1
-
-
Carrier, B.1
Grand, J.2
-
6
-
-
85084160792
-
-
Chow J, Pfaff B, Garfinkel T, Christopher K, Rosenblum M. Understanding data lifetime via whole system simulation. In: Proceedings of the 13th USENIX security symposium, August 2004.
-
Chow J, Pfaff B, Garfinkel T, Christopher K, Rosenblum M. Understanding data lifetime via whole system simulation. In: Proceedings of the 13th USENIX security symposium, August 2004.
-
-
-
-
7
-
-
84868338713
-
-
Dolan-Gavitt B. The VAD tree: a process-eye view of physical memory. In: Proceedings of the 2007 Digital Forensic Research Workshop (DFRWS), 2007.
-
Dolan-Gavitt B. The VAD tree: a process-eye view of physical memory. In: Proceedings of the 2007 Digital Forensic Research Workshop (DFRWS), 2007.
-
-
-
-
9
-
-
48749104659
-
Exploiting the Rootkit Paradox with Windows memory analysis
-
Kornblum J. Exploiting the Rootkit Paradox with Windows memory analysis. International Journal of Digital Evidence 5 1 (Fall 2006)
-
(2006)
International Journal of Digital Evidence
, vol.5
, Issue.1
-
-
Kornblum, J.1
-
10
-
-
33847398384
-
Using every part of the buffalo in Windows memory analysis
-
Kornblum J. Using every part of the buffalo in Windows memory analysis. Digital Investigation (January 2007)
-
(2007)
Digital Investigation
-
-
Kornblum, J.1
-
12
-
-
48749117830
-
-
Burdach M. idetect, http://forensic.seccure.net/tools/idetect.tar.gz.
-
Burdach M. idetect, http://forensic.seccure.net/tools/idetect.tar.gz.
-
-
-
-
13
-
-
77955400664
-
-
Richard III GG, Roussev V. Scalpel: a frugal, high-performance file carver. In: Proceedings of the 2005 Digital Forensics Research Workshop (DFRWS 2005).
-
Richard III GG, Roussev V. Scalpel: a frugal, high-performance file carver. In: Proceedings of the 2005 Digital Forensics Research Workshop (DFRWS 2005).
-
-
-
-
14
-
-
48749095088
-
-
Rutkowska J. Beyond the CPU: defeating hardware based RAM acquisition tools (part I: AMD case), BlackHat DC 2007 presentation.
-
Rutkowska J. Beyond the CPU: defeating hardware based RAM acquisition tools (part I: AMD case), BlackHat DC 2007 presentation.
-
-
-
-
15
-
-
48749086904
-
-
Ruff N, Suiche M. Enter Sandman (why you should never go to sleep). In: PacSec applied security conference, 2007, Tokyo, Japan.
-
Ruff N, Suiche M. Enter Sandman (why you should never go to sleep). In: PacSec applied security conference, 2007, Tokyo, Japan.
-
-
-
-
16
-
-
84868380591
-
-
Schatz B. BodySnatcher: towards reliable volatile memory acquisition by software. In: Proceedings of the 2007 Digital Forensic Research Workshop (DFRWS), 2007.
-
Schatz B. BodySnatcher: towards reliable volatile memory acquisition by software. In: Proceedings of the 2007 Digital Forensic Research Workshop (DFRWS), 2007.
-
-
-
-
17
-
-
50849097989
-
-
Schuster A. Searching for processes and threads in Microsoft Windows memory dumps. In: Proceedings of the 2006 Digital Forensic Research Workshop (DFRWS), 2006a.
-
Schuster A. Searching for processes and threads in Microsoft Windows memory dumps. In: Proceedings of the 2006 Digital Forensic Research Workshop (DFRWS), 2006a.
-
-
-
-
18
-
-
48749095817
-
-
Schuster A. Pool allocations as an information source in Windows memory forensics. In: International conference on IT-incident management and IT-forensics, October 2006b.
-
Schuster A. Pool allocations as an information source in Windows memory forensics. In: International conference on IT-incident management and IT-forensics, October 2006b.
-
-
-
-
19
-
-
34447517356
-
User data persistence in physical memory
-
Solomon J., Huebner E., Bem D., and Szezynska M. User data persistence in physical memory. Digital Investigation 4 2 (June 2007) 68-72
-
(2007)
Digital Investigation
, vol.4
, Issue.2
, pp. 68-72
-
-
Solomon, J.1
Huebner, E.2
Bem, D.3
Szezynska, M.4
-
20
-
-
48749109657
-
-
Urrea JM. An analysis of Linux RAM Forensics. Naval Post Graduate School thesis; March 2006.
-
Urrea JM. An analysis of Linux RAM Forensics. Naval Post Graduate School thesis; March 2006.
-
-
-
-
21
-
-
48749119665
-
The acquisition and analysis of Random Access Memory
-
Vidas T. The acquisition and analysis of Random Access Memory. Journal of Digital Forensic Practice 1 4 (December 2006) 315-323
-
(2006)
Journal of Digital Forensic Practice
, vol.1
, Issue.4
, pp. 315-323
-
-
Vidas, T.1
|