File system design with assured delete
R Perlman - Third IEEE International Security in Storage …, 2005 - ieeexplore.ieee.org
This paper describes a system that supports high availability of data, until the data should be
expunged, at which time the system makes it impossible to recover the data. This design …
expunged, at which time the system makes it impossible to recover the data. This design …
A survey of main memory acquisition and analysis techniques for the windows operating system
S Vömel, FC Freiling - Digital Investigation, 2011 - Elsevier
Traditional, persistent data-oriented approaches in computer forensics face some limitations
regarding a number of technological developments, eg, rapidly increasing storage …
regarding a number of technological developments, eg, rapidly increasing storage …
Detecting environment-sensitive malware
M Lindorfer, C Kolbitsch… - Recent Advances in …, 2011 - Springer
The execution of malware in an instrumented sandbox is a widespread approach for the
analysis of malicious code, largely because it sidesteps the difficulties involved in the static …
analysis of malicious code, largely because it sidesteps the difficulties involved in the static …
A large-scale study of web password habits
D Florencio, C Herley - Proceedings of the 16th international conference …, 2007 - dl.acm.org
We report the results of a large scale study of password use andpassword re-use habits. The
study involved half a million users over athree month period. A client component on users' …
study involved half a million users over athree month period. A client component on users' …
Malware investigation by analyzing computer memory
M Peinado, W Cui - US Patent 8,566,944, 2013 - Google Patents
Technology is described for malware investigation by analyZ ing computer memory in a
computing device. The method can include performing static analysis on code for a software …
computing device. The method can include performing static analysis on code for a software …
Dynamic analysis of malicious code
Malware analysis is the process of determining the purpose and functionality of a given
malware sample (such as a virus, worm, or Trojan horse). This process is a necessary step …
malware sample (such as a virus, worm, or Trojan horse). This process is a necessary step …
[PDF][PDF] XFI: Software guards for system address spaces
U Erlingsson, M Abadi, M Vrable, M Budiu… - Proceedings of the 7th …, 2006 - usenix.org
XFI is a comprehensive protection system that offers both flexible access control and
fundamental integrity guarantees, at any privilege level and even for legacy code in …
fundamental integrity guarantees, at any privilege level and even for legacy code in …
Secure and flexible monitoring of virtual machines
BD Payne, DPA Martim, W Lee - Twenty-Third Annual …, 2007 - ieeexplore.ieee.org
The monitoring of virtual machines has many applications in areas such as security and
systems management. A monitoring technique known as introspection has received …
systems management. A monitoring technique known as introspection has received …
[PDF][PDF] TTAnalyze: A tool for analyzing malware
U Bayer - 2005 - repositum.tuwien.at
This thesis describes TTAnalyze: a tool for analyzing the behavior of Windows PE-
executables with special focus on the analysis of malware. Execution of TTAnalyze results in …
executables with special focus on the analysis of malware. Execution of TTAnalyze results in …
ELI: Bare-metal performance for I/O virtualization
Direct device assignment enhances the performance of guest virtual machines by allowing
them to communicate with I/O devices without host involvement. But even with device …
them to communicate with I/O devices without host involvement. But even with device …