-
1
-
-
34547461216
-
A comparison of software and hardware techniques for x86 virtualization
-
In J.P. Shen (Ed.), New York, NY: ACM Press
-
Adams, K., & Algesen, O. (2006). A Comparison of Software and Hardware Techniques for x86 Virtualization, In J.P. Shen (Ed.), 12th International Conference on Architectural Supportfor Programming Languages and Operating Systems (pp. 2-13). New York, NY: ACM Press.
-
(2006)
12th International Conference on Architectural Supportfor Programming Languages and Operating Systems
, pp. 2-13
-
-
Adams, K.1
Algesen, O.2
-
2
-
-
65249161004
-
Hit by a bus: Physical access attacks with firewire
-
Retrieved September 20, 2008
-
th International Ruxcon Conference. Retrieved September 20, 2008, from http://www.ruxcon.orrg.au/files/2006/firewire-attacks.pdf
-
(2006)
th International Ruxcon Conference
-
-
Boileau, A.1
-
3
-
-
3042731401
-
A hardware- based memory acquisition procedure for digital investigations
-
Carrier, B., & Grand, J. (2004). A Hardware- Based Memory Acquisition Procedure for Digital Investigations. Digital Investigation, 1(1), 50-60.
-
(2004)
Digital Investigation
, vol.1
, Issue.1
, pp. 50-60
-
-
Carrier, B.1
Grand, J.2
-
5
-
-
85036781266
-
-
Retrieved September 20, 2008
-
Carrier, B. (2008). SleuthKit, Retrieved September 20, 2008, from http://www.sleuthkit.org/.
-
(2008)
-
-
Carrier, B.1
-
6
-
-
3142612259
-
Evidence dynamics: Locard's exchange principle and crime reconstruction
-
Chisum, W.J., & Turvey, B. (2000). Evidence Dynamics: Locard's Exchange Principle and Crime Reconstruction, Journal of Behavioral Profiling, 1(1).
-
(2000)
Journal of Behavioral Profiling
, vol.1
, Issue.1
-
-
Chisum, W.J.1
Turvey, B.2
-
8
-
-
85036782184
-
-
Encase Retrieved September 20, 2008
-
Encase (2008), Retrieved September 20, 2008, from http://www. guidancesoftware.com/.
-
(2008)
-
-
-
9
-
-
3042769757
-
-
Retrieved September 20, 2008
-
Garner, G. M. (2008). Forensic Acquisition Utilities. Retrieved September 20, 2008, from http://www.gmgsystemsinc.com/fau/.
-
(2008)
Forensic Acquisition Utilities
-
-
Garner, G.M.1
-
10
-
-
85077701725
-
Lest we remember: Cold boot attacks on encryption keys
-
San Jose, CA. Retrieved September20, 2008, from
-
th Usenix Security Symposium. San Jose, CA. Retrieved September20, 2008, from http://citp.princeton.edu/pub/coldboot.pdf
-
(2008)
th Usenix Security Symposium
-
-
Halderman, J.A.1
Schoen, S.D.2
Heninger, N.3
Clarkson, W.4
Paul, W.5
Calandrino, J.A.6
Feldman, A.J.7
Appelbaum, J.8
Felten, E.W.9
-
11
-
-
33847398384
-
Using every part of the buffalo in windows memory analysis
-
Kornblum, J. (2007). Using Every Part of the Buffalo in Windows Memory Analysis. Digital Investigation, 4(1), 24-29.
-
(2007)
Digital Investigation
, vol.4
, Issue.1
, pp. 24-29
-
-
Kornblum, J.1
-
12
-
-
52149113749
-
Windows page file collection and analysis for a live forensic context
-
Jeju Island, Korea: IEEE Computer Society
-
Lee, S., Savoldi, A., Lee, S., & Lim, J. (2007a). Windows Page file Collection and Analysis for a Live Forensic Context. In Future Generation Communication and Networking (pp. 97-101). Jeju Island, Korea: IEEE Computer Society.
-
(2007)
Future Generation Communication and Networking
, pp. 97-101
-
-
Lee, S.1
Savoldi, A.2
Lee, S.3
Lim, J.4
-
13
-
-
47349110877
-
Password recovery using an evidence collection tool and countermeasures
-
In B. Liao, J. Pan, L. Jain, M. Liao, H. Noda, & A. Ho (Eds.), Kaohsiung, TW: IEEE Computer Society
-
rd Intelligent Information Hiding and Multime- dia Signal Processing (pp. 93-97). Kaohsiung, TW: IEEE Computer Society.
-
(2007)
rd Intelligent Information Hiding and Multime- Dia Signal Processing
, pp. 93-97
-
-
Lee, S.1
Savoldi, A.2
Lee, S.3
Lim, J.4
-
14
-
-
0024771302
-
Memory coherence in shared virtual memory systems
-
DOI 10.1145/75104.75105
-
Li, K., & Hudak, P. (1989). Memory Coherence in Shared Virtual Memory System. ACM Transaction on Computer System, 7(4), 321-359. (Pubitemid 20637608)
-
(1989)
ACM Transactions on Computer Systems
, vol.7
, Issue.4
, pp. 321-359
-
-
Li Kai1
Hudak Paul2
-
16
-
-
33751342034
-
FATkit: A framework for the extraction and analysis of digital forensic data from volatile system memory
-
Petroni, N., Walters, A., Fraser, T., & Arbaugh, W. (2006). FATkit: A Framework for the Extraction and Analysis of Digital Forensic Data from Volatile System Memory. Digital Investigation, 3(4), 197-210.
-
(2006)
Digital Investigation
, vol.3
, Issue.4
, pp. 197-210
-
-
Petroni, N.1
Walters, A.2
Fraser, T.3
Arbaugh, W.4
-
18
-
-
77952255373
-
Beyond the CPU: Defeating hardware based RAM acquisition tools (Part I: AMD case)
-
Retrieved March 1, 2008
-
Rutkowska, J. (2007). Beyond The CPU: Defeating Hardware Based RAM Acquisition Tools (Part I: AMD case). Black Hat Conference. Retrieved March 1, 2008, from http://in-visiblethings.org/papers.html.
-
(2007)
Black Hat Conference
-
-
Rutkowska, J.1
-
19
-
-
34447528955
-
Bodysnatcher: Towards reliable volatile memory acquisition by software
-
In E. Casey (Ed.), Pittsburgh, PA: Elsevier
-
th Annual Digital Forensic Research Workshop (pp. 126-134). Pittsburgh, PA: Elsevier.
-
(2007)
th Annual Digital Forensic Research Workshop
, pp. 126-134
-
-
Schatz, B.1
-
20
-
-
33745993901
-
Searching for processes and threads in microsoft windows memory dumps
-
In E. Casey (Ed.), Lafayette, IN: Elsevier
-
th Annual Digital Forensic Research Workshop (pp. 10-16). Lafayette, IN: Elsevier.
-
(2006)
th Annual Digital Forensic Research Workshop
, pp. 10-16
-
-
Schuster, A.1
-
21
-
-
0004233425
-
-
Hoboken, NJ: John Wiley & Sons
-
Silberschatz, A., Galvin, P.B., & Gagne, G. (2007). Operating System Concepts. Hoboken, NJ: John Wiley & Sons.
-
(2007)
Operating System Concepts
-
-
Silberschatz, A.1
Galvin, P.B.2
Gagne, G.3
-
22
-
-
85036793472
-
-
Retrieved September 20, 2008, from
-
X-Ways Forensic (2008), Retrieved September 20, 2008, from http://www.x-ways.net/.
-
(2008)
-
-
|