File system design with assured delete

R Perlman - Third IEEE International Security in Storage …, 2005 - ieeexplore.ieee.org
This paper describes a system that supports high availability of data, until the data should be
expunged, at which time the system makes it impossible to recover the data. This design …

A survey of main memory acquisition and analysis techniques for the windows operating system

S Vömel, FC Freiling - Digital Investigation, 2011 - Elsevier
Traditional, persistent data-oriented approaches in computer forensics face some limitations
regarding a number of technological developments, eg, rapidly increasing storage …

Detecting environment-sensitive malware

M Lindorfer, C Kolbitsch… - Recent Advances in …, 2011 - Springer
The execution of malware in an instrumented sandbox is a widespread approach for the
analysis of malicious code, largely because it sidesteps the difficulties involved in the static …

A large-scale study of web password habits

D Florencio, C Herley - Proceedings of the 16th international conference …, 2007 - dl.acm.org
We report the results of a large scale study of password use andpassword re-use habits. The
study involved half a million users over athree month period. A client component on users' …

Malware investigation by analyzing computer memory

M Peinado, W Cui - US Patent 8,566,944, 2013 - Google Patents
Technology is described for malware investigation by analyZ ing computer memory in a
computing device. The method can include performing static analysis on code for a software …

Dynamic analysis of malicious code

U Bayer, A Moser, C Kruegel, E Kirda - Journal in Computer Virology, 2006 - Springer
Malware analysis is the process of determining the purpose and functionality of a given
malware sample (such as a virus, worm, or Trojan horse). This process is a necessary step …

[PDF][PDF] XFI: Software guards for system address spaces

U Erlingsson, M Abadi, M Vrable, M Budiu… - Proceedings of the 7th …, 2006 - usenix.org
XFI is a comprehensive protection system that offers both flexible access control and
fundamental integrity guarantees, at any privilege level and even for legacy code in …

Secure and flexible monitoring of virtual machines

BD Payne, DPA Martim, W Lee - Twenty-Third Annual …, 2007 - ieeexplore.ieee.org
The monitoring of virtual machines has many applications in areas such as security and
systems management. A monitoring technique known as introspection has received …

[PDF][PDF] TTAnalyze: A tool for analyzing malware

U Bayer - 2005 - repositum.tuwien.at
This thesis describes TTAnalyze: a tool for analyzing the behavior of Windows PE-
executables with special focus on the analysis of malware. Execution of TTAnalyze results in …

ELI: Bare-metal performance for I/O virtualization

A Gordon, N Amit, N Har'El, M Ben-Yehuda… - ACM SIGPLAN …, 2012 - dl.acm.org
Direct device assignment enhances the performance of guest virtual machines by allowing
them to communicate with I/O devices without host involvement. But even with device …