A study on malicious software behaviour analysis and detection techniques: Taxonomy, current trends and challenges

P Maniriho, AN Mahmood, MJM Chowdhury - Future Generation Computer …, 2022 - Elsevier
There has been an increasing trend of malware release, which raises the alarm for security
professionals worldwide. It is often challenging to stay on top of different types of malware …

Acquisition and analysis of volatile memory from android devices

J Sylve, A Case, L Marziale, GG Richard - Digital Investigation, 2012 - Elsevier
The Android operating system for mobile phones, which is still relatively new, is rapidly
gaining market share, with dozens of smartphones and tablets either released or set to be …

Leveraging malicious behavior traces from volatile memory using machine learning methods for trusted unknown malware detection in Linux cloud environments

T Panker, N Nissim - Knowledge-Based Systems, 2021 - Elsevier
Most organizations today use cloud-computing environments and virtualization technology.
Linux-based clouds are the most popular cloud environments among organizations, and …

Comparative analysis of volatile memory forensics: live response vs. memory imaging

A Aljaedi, D Lindskog, P Zavarsky… - 2011 IEEE Third …, 2011 - ieeexplore.ieee.org
Traditionally, incident responders and digital forensic examiners have predominantly relied
on live response for volatile data acquisition. While this approach is popular, memory …

Introducing the temporal dimension to memory forensics

F Pagani, O Fedorov, D Balzarotti - ACM Transactions on Privacy and …, 2019 - dl.acm.org
Kickstarted by the Digital Forensic Research Workshop (DFRWS) conference in 2005,
modern memory analysis is now one of most active areas of computer forensics and it mostly …

[HTML][HTML] Linux memory forensics: Dissecting the user space process heap

F Block, A Dewald - Digital Investigation, 2017 - Elsevier
The analysis of memory during a forensic investigation is often an important step to
reconstruct events. While prior work in this field has mostly concentrated on information …

Efficient temporal join processing using indices

D Zhang, VJ Tsotras, B Seeger - … 18th International Conference …, 2002 - ieeexplore.ieee.org
We examine the problem of processing temporal joins in the presence of indexing schemes.
Previous work on temporal joins has concentrated on non-indexed relations which were fully …

MinCloud: Trusted and transferable MinHash-based framework for unknown malware detection for Linux cloud environments

T Panker, A Cohen, T Landman, C Bery… - Journal of Information …, 2024 - Elsevier
Linux clouds have become an attractive target for cyber-attacks. However, existing detection
solutions for Linux clouds have variety of limitations. Some of the solutions are untrusted …

[HTML][HTML] In lieu of swap: Analyzing compressed RAM in Mac OS X and Linux

GG Richard III, A Case - Digital Investigation, 2014 - Elsevier
The forensics community is increasingly embracing the use of memory analysis to enhance
traditional storage-based forensics techniques, because memory analysis yields a wealth of …

Data-in-use leakages from Android memory—Test and analysis

P Stirparo, IN Fovino, I Kounelis - 2013 IEEE 9th International …, 2013 - ieeexplore.ieee.org
Due to their increasing pervasiveness, smartphones and more in general mobile devices
are becoming the citizen's companions in the daily life activities. Smartphones are today the …