-
2
-
-
10444252457
-
Mobile phone vulnerabilities: A new generation of malware
-
J. Jamaluddin, N. Zotou, R. Edwards, and P. Coulton, "Mobile phone vulnerabilities: a new generation of malware," in Consumer Electronics, 2004 IEEE International Symposium on, 2004, pp. 199-202.
-
(2004)
Consumer Electronics, 2004 IEEE International Symposium on
, pp. 199-202
-
-
Jamaluddin, J.1
Zotou, N.2
Edwards, R.3
Coulton, P.4
-
3
-
-
33750436929
-
About malicious software in smartphones
-
S. Tyssy and M. Helenius, "About malicious software in smartphones," Journal in Computer Virology, vol. 2, no. 2, pp. 109-119, 2006. [Online]. Available: http://dx.doi.org/10.1007/s11416-006-0022-0
-
(2006)
Journal in Computer Virology
, vol.2
, Issue.2
, pp. 109-119
-
-
Tyssy, S.1
Helenius, M.2
-
4
-
-
80755181021
-
A survey of mobile malware in the wild
-
ser. SPSM '11. New York, NY, USA: ACM
-
A. P. Felt, M. Finifter, E. Chin, S. Hanna, and D. Wagner, "A survey of mobile malware in the wild," in Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices, ser. SPSM '11. New York, NY, USA: ACM, 2011, pp. 3-14. [Online]. Available: http://doi.acm.org/10.1145/ 2046614.2046618
-
(2011)
Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices
, pp. 3-14
-
-
Felt, A.P.1
Finifter, M.2
Chin, E.3
Hanna, S.4
Wagner, D.5
-
5
-
-
85084161115
-
All your droid are belong to us: A survey of current android attacks
-
San Francisco, CA, Aug
-
T. Vidas, D. Votipka, and N. Christin, "All your droid are belong to us: A survey of current android attacks," in Proceedings of the 5th USENIX Workshop on Offensive Technologies (WOOT'11), San Francisco, CA, Aug. 2011.
-
(2011)
Proceedings of the 5th USENIX Workshop on Offensive Technologies (WOOT'11
-
-
Vidas, T.1
Votipka, D.2
Christin, N.3
-
7
-
-
48749115314
-
Face: Automated digital evidence discovery and correlation
-
the Proceedings of the Eighth Annual DFRWS Conference
-
A. Case, A. Cristina, L. Marziale, G. G. Richard, and V. Roussev, "Face: Automated digital evidence discovery and correlation," Digital Investigation, vol. 5, Supplement, no. 0, pp. S65-S75, 2008, the Proceedings of the Eighth Annual DFRWS Conference. [Online]. Available: http://www. sciencedirect.com/science/article/pii/S1742287608000340
-
(2008)
Digital Investigation
, vol.5
, Issue.SUPPL.0
-
-
Case, A.1
Cristina, A.2
Marziale, L.3
Richard, G.G.4
Roussev, V.5
-
8
-
-
77955353210
-
Treasure and tragedy in kmem cache mining for live forensics investigation
-
Supplement, the Proceedings of the Tenth Annual DFRWS Conference
-
A. Case, L. Marziale, C. Neckar, and G. G. Richard III, "Treasure and tragedy in kmem cache mining for live forensics investigation," Digital Investigation, vol. 7, Supplement, no. 0, pp. S41-S47, 2010, the Proceedings of the Tenth Annual DFRWS Conference. [Online]. Available: http://www. sciencedirect.com/science/article/pii/S1742287610000332
-
(2010)
Digital Investigation
, vol.7
, Issue.0
-
-
Case, A.1
Marziale, L.2
Neckar, C.3
Richard III, G.G.4
-
9
-
-
77955378024
-
Dynamic recreation of kernel data structures for live forensics
-
Supplement the Proceedings of the Tenth Annual DFRWS Conference
-
A. Case, L. Marziale, and G. G. Richard III, "Dynamic recreation of kernel data structures for live forensics," Digital Investigation, vol. 7, Supplement, no. 0, pp. S32-S40, 2010, the Proceedings of the Tenth Annual DFRWS Conference. [Online]. Available: http://www.sciencedirect.com/science/article/ pii/S1742287610000320
-
(2010)
Digital Investigation
, vol.7
, Issue.0
-
-
Case, A.1
Marziale, L.2
Richard III, G.G.3
-
10
-
-
79961089595
-
-
Master's thesis, Department of Software Engineering, Charles University, Prague
-
I. Kolĺar, "Forensic ram dump image analyser," Master's thesis, Department of Software Engineering, Charles University, Prague, 2010.
-
(2010)
Forensic Ram Dump Image Analyser
-
-
Kolĺar, I.1
-
11
-
-
84868546234
-
Live memory forensics of mobile phones
-
V. L. Thing, K.-Y. Ng, and E.-C. Chang, "Live memory forensics of mobile phones," digital investigation, vol. 7, pp. S74-S82, 2010.
-
(2010)
Digital Investigation
, vol.7
-
-
Thing, V.L.1
Ng, K.-Y.2
Chang, E.-C.3
-
12
-
-
84857917909
-
Acquisition and analysis of volatile memory from android devices
-
J. Sylve, A. Case, L. Marziale, and G. G. Richard, "Acquisition and analysis of volatile memory from android devices," Digital Investigation, vol. 8, no. 3, pp. 175-184, 2012.
-
(2012)
Digital Investigation
, vol.8
, Issue.3
, pp. 175-184
-
-
Sylve, J.1
Case, A.2
Marziale, L.3
Richard, G.G.4
-
14
-
-
84898408189
-
-
The volatility framework, access date: 10/07/2013
-
"The volatility framework," https://code.google.com/p/ volatility/, access date: 10/07/2013.
-
-
-
-
16
-
-
84891723338
-
-
Master's thesis, Friedrich-Alexander University Erlangen-Nuremberg, January
-
H. Macht, "Live memory forensics on android with volatility," Master's thesis, Friedrich-Alexander University Erlangen-Nuremberg, January 2013.
-
(2013)
Live Memory Forensics on Android with Volatility
-
-
Macht, H.1
-
17
-
-
84898485076
-
-
access date: 10/07/2013
-
"Processes and threads," http://developer.android.com/guide/ components /processes-and-threads.html, access date: 10/07/2013.
-
-
-
-
18
-
-
84898451533
-
-
c4droid homepage on google play website, access date: 10/07/2013
-
"c4droid homepage on google play website," https://play.google. com/store/apps/details?id=com.n0n3m4.droidc&hl=it, access date: 10/07/2013.
-
-
-
-
19
-
-
84898466540
-
-
Antutu benchmark, access date: 10/07/2013
-
"Antutu benchmark," https://play.google.com/store/apps/details? id=com.an tutu.ABenchMark&hl=it, access date: 10/07/2013.
-
-
-
|