Research trends, challenges, and emerging topics in digital forensics: A review of reviews

F Casino, TK Dasaklis, GP Spathoulas… - IEEE …, 2022 - ieeexplore.ieee.org
Due to its critical role in cybersecurity, digital forensics has received significant attention from
researchers and practitioners alike. The ever increasing sophistication of modern …

Memory forensics tools: a comparative analysis

M Daghmehchi Firoozjaei… - Journal of Cyber …, 2022 - Taylor & Francis
As part of the incident response process, the memory forensics tools extract forensic artifacts
and display them. Many memory forensics analysis tools are being developed to address …

Memory forensics analysis for investigation of online crime-a review

A Chetry, U Sharma - 2019 6th International Conference on …, 2019 - ieeexplore.ieee.org
Advancement of technology not only coercing our society to depend on technology but it
also attracting criminals towards this technical world or cyberspace, and also providing the …

Framework for the retrieval of social media and instant messaging evidence from volatile memory

RD Thantilage, NA Le Khac - … On Trust, Security And Privacy In …, 2019 - ieeexplore.ieee.org
The human society today has had to be confronted by the threat posed by criminals who are
taking the advantages of social media and instant-messaging apps to conduct their criminal …

Volatile Memory Extraction-Based Approach for Level 0‐1 CPS Forensics

RA Awad, J Lopez, M Rogers - 2019 IEEE International …, 2019 - ieeexplore.ieee.org
Most security analyzers operate on system state that is far removed from end-point
components in cyber-physical systems (CPS) identified as level 0‐1 in the Purdue …

Volatile memory forensics acquisition efficacy: A comparative study towards analysing firmware-based rootkits

J Taylor, B Turnbull, G Creech - … of the 13th International Conference on …, 2018 - dl.acm.org
Firmware-based malware is an emerging threat with few obvious mechanisms for detection.
There have been multiple cases where the presence of firmware-based malware has been …

Memory Malware Analysis: Detecting Malicious Signatures In Memory By VolatilityPlugin's

KK Reddy, T Bhattacharya, S Reddy - 2023 - researchsquare.com
Memory forensics is used to implement and investigate malware that is executed or stored in
RAM. Whether it is static malware analysis or dynamic malware analysis, each time the …

A Comprehensive Literature Review on Volatile Memory Forensics.

I Hamid, MM Rahman - Electronics (2079-9292), 2024 - search.ebscohost.com
Through a systematic literature review, which is considered the most comprehensive way to
analyze the field of memory forensics, this paper investigates its development through past …

[PDF][PDF] Topics in Digital Forensics: A Review of Reviews

M ANAGNOSTOPOULOS, A GHOSAL, IBORO CZ… - vbn.aau.dk
Due to its critical role in cybersecurity, digital forensics has received significant attention from
researchers and practitioners alike. The ever increasing sophistication of modern …

[引用][C] 内存取证研究与进展

张瑜, 刘庆中, 李涛, 吴丽华, 石春 - 软件学报, 2015