메뉴 건너뛰기




Volumn , Issue , 2007, Pages

The VAD tree: A process-eye view of physical memory

Author keywords

Anti forensics; Digital forensics; Microsoft Windows; Virtual Address Descriptors; Volatile memory

Indexed keywords

ANTI-FORENSICS; DESCRIPTORS; DIGITAL FORENSIC; MICROSOFT WINDOWS; VOLATILE MEMORY;

EID: 84868338713     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1016/j.diin.2007.06.008     Document Type: Conference Paper
Times cited : (12)

References (15)
  • 3
    • 84868342000 scopus 로고    scopus 로고
    • Graphviz, 〈http://www.graphviz.org/〉.
  • 5
    • 34447569672 scopus 로고    scopus 로고
    • Santa Clara, CA, USA: Intel-Corporation
    • Intel-Corporation. Intel-64 and IA-32 architectures software developer's manual. Santa Clara, CA, USA: Intel-Corporation, 〈http://www.intel.com/ products/processor/manuals/index.htm〉; 2006.
    • (2006) Intel-64 and IA-32 Architectures Software Developer's Manual
  • 7
    • 33847398384 scopus 로고    scopus 로고
    • Using every part of the buffalo in Windows memory analysis
    • March
    • Kornblum J. Using every part of the buffalo in Windows memory analysis. Digit Investig J, 〈http://jessekornblum.com/research/papers/buffalo. pdf〉 March 2007.
    • (2007) Digit Investig J
    • Kornblum, J.1
  • 8
    • 33751342034 scopus 로고    scopus 로고
    • FATKit: A framework for the extraction and analysis of digital forensic data from volatile system memory
    • December
    • Petroni Jr NL, Walters A, Fraser T, Arbaugh WA. FATKit: a framework for the extraction and analysis of digital forensic data from volatile system memory. Digit Investig December 2006;3(4).
    • (2006) Digit Investig , vol.3 , Issue.4
    • Petroni Jr., N.L.1    Walters, A.2    Fraser, T.3    Arbaugh, W.A.4
  • 13
    • 84868342002 scopus 로고    scopus 로고
    • The FTimes project, 〈http://ftimes.sourceforge.net/FTimes/index. shtml〉.
  • 14
    • 33751349368 scopus 로고    scopus 로고
    • FATKit: Detecting malicious library injection and upping the "anti"
    • July
    • Walters A. FATKit: Detecting malicious library injection and upping the "anti". Technical report. 4TF Research Laboratories; July 2006.
    • (2006) Technical Report. 4TF Research Laboratories;
    • Walters, A.1
  • 15
    • 74049091891 scopus 로고    scopus 로고
    • Volatools: Integrating volatile memory forensics into the digital investigation process
    • Walters A, Petroni Jr NL. Volatools: integrating volatile memory forensics into the digital investigation process. In: Black Hat DC 2007; 2007.
    • (2007) Black Hat DC 2007
    • Walters, A.1    Petroni Jr., N.L.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.