-
1
-
-
34447541281
-
-
Vancouver, BC, Canada
-
Becher, M., Dorsneif, M., and Klein, C.N., FireWire: all your memory are belong to us, CanSecWest, Vancouver, BC, Canada, 2005.
-
(2005)
FireWire: All Your Memory Are Belong to Us, CanSecWest
-
-
Becher, M.1
Dorsneif, M.2
Klein, C.N.3
-
3
-
-
34447541122
-
Low down and dirty: Anti-forensic rootkits
-
Security-Assessment.com
-
Bilby, Darren. Low down and dirty: Anti-forensic rootkits. In Proceedings of Ruxcon 2006. Security-Assessment.com, 2006.
-
(2006)
Proceedings of Ruxcon 2006
-
-
Bilby, D.1
-
5
-
-
42649122438
-
-
Las Vegas, NV, USA
-
Butler, Jamie, and Sparks, Sherry, "Shadow Walker" Raising the Bar for Rootkit Detection, BlackHat, Las Vegas, NV, USA, 2005. http://www.blackhat.com/presentations/bhjp-05/bh-jp-05-sparks-butler.pdf
-
(2005)
"Shadow Walker" Raising the Bar for Rootkit Detection
-
-
Butler, J.1
Sparks, S.2
-
6
-
-
3042731401
-
A Hardware-Based Memory Acquisition Procedure for Digital Investigations
-
Carrier, B.D. And Grand, J., A Hardware-Based Memory Acquisition Procedure for Digital Investigations, Digital Investigation, 1(1):50-60, 2004. http://www.grandideastudio.com/files/security/tribble/tribble-memory- acquisition.pdf.
-
(2004)
Digital Investigation
, vol.1
, Issue.1
, pp. 50-60
-
-
Carrier, B.D.1
Grand, J.2
-
8
-
-
51249086651
-
-
Combs, Gerald. Wireshark, 2007. http://www.wireshark.org
-
(2007)
Wireshark
-
-
Combs, G.1
-
11
-
-
77952274595
-
-
Downloaded January 24
-
Feldman, Mark, RealMem Memory Mode, http://www.nondot.org/sabre/os/files/ ProtectedMode/realmem.txt. Downloaded January 24, 2008.
-
(2008)
RealMem Memory Mode
-
-
Feldman, M.1
-
12
-
-
36448986657
-
When Malware Meets Rootkits
-
Florio, Elia, When Malware Meets Rootkits, Virus Bulletin, 2005. http://www.virusbtn.com/virusbulletin/archive/2005/12/vb20 0512-malware-meets- rootkits.dkb
-
(2005)
Virus Bulletin
-
-
Florio, E.1
-
13
-
-
77952281280
-
-
Free Software Foundation. 6.9 edition
-
Free Software Foundation. GNU core utilities, 6.9 edition, 2007. http://www.gnu.org/software/coreutils/
-
(2007)
GNU Core Utilities
-
-
-
15
-
-
74049091060
-
-
GMER, Stealth MBR rootkit, 2008. http://www2.gmer.net/mbr/
-
(2008)
Stealth MBR Rootkit
-
-
-
17
-
-
68749096140
-
-
GMG Systems Incorporated. KnTTools with KnTList, 2007. http://www.gmgsystemsinc.com/knttools/.
-
(2007)
KnTTools with KnTList
-
-
-
18
-
-
77952265750
-
-
GNU
-
GNU. NetCat, 2008. http://netcat.sourceforge.net/
-
(2008)
NetCat
-
-
-
19
-
-
0003278283
-
The Microarchitecture of the Pentium 4 Processor
-
Hinton, G., Sager, D., Upton, M., Boggs, D., Carmean, D., Kyker, A., Roussel, P., The Microarchitecture of the Pentium 4 Processor, Intel Technology Journal, 2001. http://www.intel.com/technology/itj/q12001/pdf/art-2.pdf
-
(2001)
Intel Technology Journal
-
-
Hinton, G.1
Sager, D.2
Upton, M.3
Boggs, D.4
Carmean, D.5
Kyker, A.6
Roussel, P.7
-
21
-
-
77952246616
-
-
Holy Father
-
Holy Father. Hacker Defender, 2005. http://www.megasecurity.org/trojans/ h/hackerdefender/Hackerdefender1.00r.html
-
(2005)
Hacker Defender
-
-
-
22
-
-
77952285149
-
-
Microsoft Corporation, May
-
Howard, Michael, Address Space Layout Randomization in Windows Vista. Microsoft Corporation, May 2006, http://blogs.msdn.com/michael-howard/archive/ 2006/05/26/address-space-layout-randomization-in-windows-vista.aspx
-
(2006)
Address Space Layout Randomization in Windows Vista
-
-
Howard, M.1
-
24
-
-
33847398384
-
Using Every Part of the Buffalo in Windows Memory Analysis
-
Kornblum, Jesse D., Using Every Part of the Buffalo in Windows Memory Analysis. Digital Investigation, 4(1):24-29, 2007. http://dx.doi.org/10.1016/j. diin.2006.12.002
-
(2007)
Digital Investigation
, vol.4
, Issue.1
, pp. 24-29
-
-
Kornblum, J.D.1
-
25
-
-
77952273512
-
-
Microsoft Corporation, Device\PhysicalMemory Object, 2007. http://technet2.microsoft.com/windowsserver/en/library/e0f862a3-cf16-4a48-bea5- f2004d12ce351033.mspx
-
(2007)
Device\PhysicalMemory Object
-
-
-
26
-
-
59249097647
-
Inside the Windows Vista Kernel: Part 3
-
April
-
Microsoft, Inside the Windows Vista Kernel: Part 3, Microsoft TechNet Magazine, April 2007. http://www.microsoft.com/technet/technetmag/issues/2007/ 04/VistaKernel/
-
(2007)
Microsoft TechNet Magazine
-
-
-
28
-
-
77952248906
-
-
Las Vegas, NV, USA
-
Permeh, Ryan, & Soeder, Derek, eEye BootRoot, BlackHat, Las Vegas, NV, USA, 2005.
-
(2005)
eEye BootRoot, BlackHat
-
-
Permeh, R.1
Soeder, D.2
-
29
-
-
33751342034
-
FATKit: A framework for the extraction and analysis of digital forensic data from volatile system memory
-
Petroni, J.N.L., Walters, A., Fraser, T., and Arbaugh, W.A., FATKit: A framework for the extraction and analysis of digital forensic data from volatile system memory, Digital Investigation, 3 (2006), pp.197-210.
-
(2006)
Digital Investigation
, vol.3
, pp. 197-210
-
-
Petroni, J.N.L.1
Walters, A.2
Fraser, T.3
Arbaugh, W.A.4
-
34
-
-
77952284901
-
-
Personal weblog
-
Schuster, Andreas. Reconstructing a Binary (1). Personal weblog, 2006. http://computer.forensikblog.de/en/2006/04/reconstructing-a-binary.html
-
(2006)
Reconstructing a Binary (1)
-
-
Schuster, A.1
-
35
-
-
33745993901
-
Searching for processes and threads in microsoft windows memory dumps
-
August
-
Schuster, Andreas. Searching for processes and threads in microsoft windows memory dumps. Digital Investigation, 3(S):10-16, August 2006. http://dfrws.org/2006/proceedings/2-Schuster.pdf.
-
(2006)
Digital Investigation
, vol.3
, Issue.S
, pp. 10-16
-
-
Schuster, A.1
-
36
-
-
14844328033
-
On the Effectiveness of Address-Space Randomization, Conference on Computer and Communications Security
-
Washington DC, USA
-
th ACM conference on Computer and communications security, pp. 298-307, Washington DC, USA, 2004. http://portal.acm.org/citation.cfm?id=1030124&dl=ACM&coll=&CFID= 15151515&CFTOKEN=6184618
-
(2004)
th ACM Conference on Computer and Communications Security
, pp. 298-307
-
-
Shacham, H.1
Page, M.2
Pfaff, B.3
Goh, E.4
Modadugu, N.5
Boneh, D.6
-
37
-
-
77952283779
-
-
& C.H.A.O.S.
-
Silberman, Peter & C.H.A.O.S., futo, 2007. http://www.uninformed.org/ ?v=3&a=7&t=sumry
-
(2007)
Futo
-
-
Silberman, P.1
-
41
-
-
84888374488
-
-
Volatile Systems. Volatility Framework, 2007. http://www.volatilesystems. com/VolatileWeb/volatility.gsp
-
(2007)
Volatility Framework
-
-
|