[HTML][HTML] Availability of datasets for digital forensics–and what is missing

C Grajeda, F Breitinger, I Baggili - Digital Investigation, 2017 - Elsevier
This paper targets two main goals. First, we want to provide an overview of available
datasets that can be used by researchers and where to find them. Second, we want to stress …

Kernel-level rootkit detection, prevention and behavior profiling: a taxonomy and survey

M Nadim, W Lee, D Akopian - arXiv preprint arXiv:2304.00473, 2023 - arxiv.org
One of the most elusive types of malware in recent times that pose significant challenges in
the computer security system is the kernel-level rootkits. The kernel-level rootkits can hide its …

Intelligent OS X malware threat detection with code inspection

HH Pajouh, A Dehghantanha, R Khayami… - Journal of Computer …, 2018 - Springer
With the increasing market share of Mac OS X operating system, there is a corresponding
increase in the number of malicious programs (malware) designed to exploit vulnerabilities …

TKRD: Trusted kernel rootkit detection for cybersecurity of VMs based on machine learning and memory forensic analysis

X Wang, J Zhang, A Zhang… - Mathematical Biosciences …, 2019 - strathprints.strath.ac.uk
The promotion of cloud computing makes the virtual machine (VM) increasingly a target of
malware attacks in cybersecurity such as those by kernel rootkits. Memory forensic, which …

[HTML][HTML] Detecting objective-C malware through memory forensics

A Case, GG Richard III - Digital Investigation, 2016 - Elsevier
Major advances in memory forensics in the past decade now allow investigators to efficiently
detect and analyze many types of sophisticated kernel-level malware. With operating …

{BoKASAN}: Binary-only Kernel Address Sanitizer for Effective Kernel Fuzzing

M Cho, D An, H Jin, T Kwon - 32nd USENIX Security Symposium …, 2023 - usenix.org
Kernel Address Sanitizer (KASAN), an invaluable tool for finding use-after-free and out-of-
bounds bugs in the Linux kernel, needs the kernel source for compile-time instrumentation …

Kernel-level rootkits features to train learning models against namespace attacks on containers

W Lee, M Nadim - 2020 7th IEEE International Conference on …, 2020 - ieeexplore.ieee.org
The container-based cloud computing service is increasingly adopted by many service
providers for its efficiency and flexibility. Containers isolated by namespaces share OS …

Mac-A-Mal: macOS malware analysis framework resistant to anti evasion techniques

DP Pham, DL Vu, F Massacci - Journal of Computer Virology and Hacking …, 2019 - Springer
With macOS increasing popularity, the number, and variety of macOS malware are rising as
well. Yet, very few tools exist for dynamic analysis of macOS malware. In this paper, we …

App-agnostic post-execution semantic analysis of Android in-memory forensics artifacts

A Ali-Gombe, A Tambaoan, A Gurfolino… - Proceedings of the 36th …, 2020 - dl.acm.org
Over the last decade, userland memory forensics techniques and algorithms have gained
popularity among practitioners, as they have proven to be useful in real forensics and …

A method for malware detection in virtualization environment

D Tank, A Aggarwal, N Chaubey - … , COMS2 2020, Gujarat, India, March 26 …, 2020 - Springer
Abstract Security of Virtual Machines (VMs) is a major concern with the virtualization
environment. Virtual machines are a primary target for an adversary to acquire unethical …