[HTML][HTML] DFRWS EU 10-year review and future directions in Digital Forensic Research

F Breitinger, JN Hilgert, C Hargreaves… - Forensic Science …, 2024 - Elsevier
Conducting a systematic literature review and comprehensive analysis, this paper surveys
all 135 peer-reviewed articles published at the Digital Forensics Research Conference …

Live forensics of software attacks on cyber–physical systems

ZA Al-Sharif, MI Al-Saleh, LM Alawneh… - Future Generation …, 2020 - Elsevier
Abstract Increasingly, Cyber–physical Systems are expected to operate in different
environments and interconnect with a diverse set of systems, equipment, and networks. This …

{DroidScraper}: A Tool for Android {In-Memory} Object Recovery and Reconstruction

A Ali-Gombe, S Sudhakaran, A Case… - … on Research in Attacks …, 2019 - usenix.org
There is a growing need for post-mortem analysis in forensics investigations involving
mobile devices, particularly when application-specific behaviors must be analyzed. This is …

Memory forensics: Recovering chat messages and encryption master key

A Kazim, F Almaeeni, S Al Ali, F Iqbal… - … on Information and …, 2019 - ieeexplore.ieee.org
In this pervasive digital world, we are witnessing an era where cybercriminals are improving
their abilities in taking advantage of wide-spread digital devices to perform various malicious …

[HTML][HTML] Duck Hunt: Memory forensics of USB attack platforms

T Thomas, M Piscitelli, BA Nahar, I Baggili - Forensic Science International …, 2021 - Elsevier
To explore the memory forensic artifacts generated by USB-based attack platforms, we
analyzed two of the most popular commercially available devices, Hak5's USB Rubber …

[PDF][PDF] The Effects of Platforms and Languages on the Memory Footprint of the Executable Program: A Memory Forensic Approach.

ZA Al-Sharif, MI Al-Saleh, Y Jararweh, L Alawneh… - J. Univers. Comput …, 2019 - core.ac.uk
Identifying the software used in a cybercrime can play a key role in establishing the
evidence against the perpetrator in the court of law. This can be achieved by various means …

App-agnostic post-execution semantic analysis of Android in-memory forensics artifacts

A Ali-Gombe, A Tambaoan, A Gurfolino… - Proceedings of the 36th …, 2020 - dl.acm.org
Over the last decade, userland memory forensics techniques and algorithms have gained
popularity among practitioners, as they have proven to be useful in real forensics and …

[PDF][PDF] Android memory optimization

K Tasneem, A Siddiqui, A Liaquat - International Journal of …, 2019 - researchgate.net
Android is the most widely used smartphone OS, but it has always lacked behind iOS due to
poor memory management. Many memory management techniques have been proposed …

Evaluating the Reliability of Android Userland Memory Forensics

S Sudhakaran, A Ali-Gombe, A Case… - … Conference on Cyber …, 2022 - books.google.com
Memory Forensics is one of the most important emerging areas in computer forensics. In
memory forensics, analysis of userland memory is a technique that analyses per-process …

[PDF][PDF] Towards Carving-Based Post-Mortem Memory Forensics and the Applicability of Approximate Matching

L Liebler - 2021 - athene-forschung.rz.unibw …
Memory forensics is an important branch of digital forensics. Different concepts empower
practitioners to perform deep analysis of potentially compromised systems by dissecting the …