메뉴 건너뛰기




Volumn , Issue , 2007, Pages

Forensic memory analysis: From stack and code to execution history

Author keywords

Cyber forensics; Physical memory; Process logic; Stack; Thread

Indexed keywords

CYBER FORENSICS; PHYSICAL MEMORY; PROCESS LOGIC; STACK; THREAD;

EID: 84868372495     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1016/j.diin.2007.06.010     Document Type: Conference Paper
Times cited : (8)

References (24)
  • 2
    • 77955406834 scopus 로고    scopus 로고
    • [Visited on May 22, 2007]
    • Betz C. MemParser, 〈http://www.dfrws.org/2005/challenge/memparser. html〉; 2005 [Visited on May 22, 2007].
    • (2005) MemParser
    • Betz, C.1
  • 4
    • 84869678325 scopus 로고    scopus 로고
    • [Visited on May 22, 2007]
    • Debugging tools for Windows,〈http://www.microsoft.com/whdc/devtools/ debugging/default.mspx〉 [Visited on May 22, 2007].
    • Debugging Tools for Windows
  • 6
    • 0037421015 scopus 로고    scopus 로고
    • A new logic for electronic commerce protocols
    • DOI 10.1016/S0304-3975(02)00364-X, PII S030439750200364X
    • Debbabi M, Adi K, Mejri M. A new logic for electronic commerce protocols. Int J Theor Comput Sci (TCS) 2003;291(3):223-83. (Pubitemid 35460172)
    • (2003) Theoretical Computer Science , vol.291 , Issue.3 , pp. 223-283
    • Adi, K.1    Debbabi, M.2    Mejri, M.3
  • 8
    • 3042854565 scopus 로고    scopus 로고
    • Finite state machine approach to digital event reconstruction
    • Gladyshev P, Patel A. Finite state machine approach to digital event reconstruction. Digit Investig J 2004;1(2).
    • (2004) Digit Investig J , vol.1 , Issue.2
    • Gladyshev, P.1    Patel, A.2
  • 9
    • 33745983277 scopus 로고    scopus 로고
    • Formalising event time bounding in digital investigations
    • Gladyshev P, Patel A. Formalising event time bounding in digital investigations. Digit Investig J 2005;4(2).
    • (2005) Digit Investig J , vol.4 , Issue.2
    • Gladyshev, P.1    Patel, A.2
  • 11
    • 34447518105 scopus 로고    scopus 로고
    • [Visited on May 22, 2007]
    • Hosmer C. Time lining computer evidence, 〈http://www.wetstonetech. com/f/timelining.pdf〉; 1998 [Visited on May 22, 2007].
    • (1998) Time Lining Computer Evidence
    • Hosmer, C.1
  • 13
    • 33847398384 scopus 로고    scopus 로고
    • Using every part of the buffalo in Windows memory analysis
    • January
    • Kornblum J. Using every part of the buffalo in Windows memory analysis. Digit Investig J January 2007.
    • (2007) Digit Investig J
    • Kornblum, J.1
  • 14
    • 34447521035 scopus 로고    scopus 로고
    • A formalization of digital forensics
    • Leigland R, Krings AW. A formalization of digital forensics. Digit Investig J 2004;3(2).
    • (2004) Digit Investig J , vol.3 , Issue.2
    • Leigland, R.1    Krings, A.W.2
  • 19
    • 84944715924 scopus 로고    scopus 로고
    • Automated analysis for digital forensic science: Semantic integrity checking
    • Las Vegas, NV, USA, December
    • Stallard T, Levitt K. Automated analysis for digital forensic science: semantic integrity checking. In: 19th annual computer security applications conference, Las Vegas, NV, USA, December 2003.
    • (2003) 19th Annual Computer Security Applications Conference
    • Stallard, T.1    Levitt, K.2
  • 20
    • 3042553947 scopus 로고    scopus 로고
    • Modeling of post-incident root cause analysis
    • Stephenson P. Modeling of post-incident root cause analysis. Int Digit Evid 2003;2(2).
    • (2003) Int Digit Evid , vol.2 , Issue.2
    • Stephenson, P.1
  • 24
    • 74049091891 scopus 로고    scopus 로고
    • Volatools: Integrating volatile memory forensics into the digital investigation process
    • February
    • Walters A, Petroni N. Volatools: integrating volatile memory forensics into the digital investigation process. Black Hat DC 2007; February 2007.
    • (2007) Black Hat DC 2007
    • Walters, A.1    Petroni, N.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.