[HTML][HTML] DFRWS EU 10-year review and future directions in Digital Forensic Research
Conducting a systematic literature review and comprehensive analysis, this paper surveys
all 135 peer-reviewed articles published at the Digital Forensics Research Conference …
all 135 peer-reviewed articles published at the Digital Forensics Research Conference …
Live forensics of software attacks on cyber–physical systems
Abstract Increasingly, Cyber–physical Systems are expected to operate in different
environments and interconnect with a diverse set of systems, equipment, and networks. This …
environments and interconnect with a diverse set of systems, equipment, and networks. This …
{DroidScraper}: A Tool for Android {In-Memory} Object Recovery and Reconstruction
There is a growing need for post-mortem analysis in forensics investigations involving
mobile devices, particularly when application-specific behaviors must be analyzed. This is …
mobile devices, particularly when application-specific behaviors must be analyzed. This is …
Memory forensics: Recovering chat messages and encryption master key
A Kazim, F Almaeeni, S Al Ali, F Iqbal… - … on Information and …, 2019 - ieeexplore.ieee.org
In this pervasive digital world, we are witnessing an era where cybercriminals are improving
their abilities in taking advantage of wide-spread digital devices to perform various malicious …
their abilities in taking advantage of wide-spread digital devices to perform various malicious …
[HTML][HTML] Duck Hunt: Memory forensics of USB attack platforms
T Thomas, M Piscitelli, BA Nahar, I Baggili - Forensic Science International …, 2021 - Elsevier
To explore the memory forensic artifacts generated by USB-based attack platforms, we
analyzed two of the most popular commercially available devices, Hak5's USB Rubber …
analyzed two of the most popular commercially available devices, Hak5's USB Rubber …
[PDF][PDF] The Effects of Platforms and Languages on the Memory Footprint of the Executable Program: A Memory Forensic Approach.
Identifying the software used in a cybercrime can play a key role in establishing the
evidence against the perpetrator in the court of law. This can be achieved by various means …
evidence against the perpetrator in the court of law. This can be achieved by various means …
App-agnostic post-execution semantic analysis of Android in-memory forensics artifacts
A Ali-Gombe, A Tambaoan, A Gurfolino… - Proceedings of the 36th …, 2020 - dl.acm.org
Over the last decade, userland memory forensics techniques and algorithms have gained
popularity among practitioners, as they have proven to be useful in real forensics and …
popularity among practitioners, as they have proven to be useful in real forensics and …
[PDF][PDF] Android memory optimization
K Tasneem, A Siddiqui, A Liaquat - International Journal of …, 2019 - researchgate.net
Android is the most widely used smartphone OS, but it has always lacked behind iOS due to
poor memory management. Many memory management techniques have been proposed …
poor memory management. Many memory management techniques have been proposed …
Evaluating the Reliability of Android Userland Memory Forensics
Memory Forensics is one of the most important emerging areas in computer forensics. In
memory forensics, analysis of userland memory is a technique that analyses per-process …
memory forensics, analysis of userland memory is a technique that analyses per-process …
[PDF][PDF] Towards Carving-Based Post-Mortem Memory Forensics and the Applicability of Approximate Matching
L Liebler - 2021 - athene-forschung.rz.unibw …
Memory forensics is an important branch of digital forensics. Different concepts empower
practitioners to perform deep analysis of potentially compromised systems by dissecting the …
practitioners to perform deep analysis of potentially compromised systems by dissecting the …