Current and future trends in mobile device forensics: A survey

K Barmpatsalou, T Cruz, E Monteiro… - ACM Computing Surveys …, 2018 - dl.acm.org
Contemporary mobile devices are the result of an evolution process, during which
computational and networking capabilities have been continuously pushed to keep pace …

Sok: History is a vast early warning system: Auditing the provenance of system intrusions

MA Inam, Y Chen, A Goyal, J Liu, J Mink… - … IEEE Symposium on …, 2023 - ieeexplore.ieee.org
Auditing, a central pillar of operating system security, has only recently come into its own as
an active area of public research. This resurgent interest is due in large part to the notion of …

Monet: a user-oriented behavior-based malware variants detection system for android

M Sun, X Li, JCS Lui, RTB Ma… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
Android, the most popular mobile OS, has around 78% of the mobile market share. Due to its
popularity, it attracts many malware attacks. In fact, people have discovered around 1 million …

Deepmem: Learning graph neural network models for fast and robust memory forensic analysis

W Song, H Yin, C Liu, D Song - Proceedings of the 2018 ACM SIGSAC …, 2018 - dl.acm.org
Kernel data structure detection is an important task in memory forensics that aims at
identifying semantically important kernel data structures from raw memory dumps. It is …

{AI} Psychiatry: Forensic Investigation of Deep Learning Networks in Memory Images

D Oygenblik, C Yagemann, J Zhang, A Mastali… - 33rd USENIX Security …, 2024 - usenix.org
Online learning is widely used in production to refine model parameters after initial
deployment. This opens several vectors for covertly launching attacks against deployed …

[PDF][PDF] Ginseng: Keeping Secrets in Registers When You Distrust the Operating System.

MH Yun, L Zhong - NDSS, 2019 - ndss-symposium.org
Ginseng: Keeping Secrets in Registers When You Distrust the Operating System Page 1
Ginseng: Keeping Secrets in Registers When You Distrust the Operating System Min Hong Yun …

Forecasting malware capabilities from cyber attack memory images

O Alrawi, M Ike, M Pruett, RP Kasturi, S Barua… - 30th USENIX security …, 2021 - usenix.org
The remediation of ongoing cyber attacks relies upon timely malware analysis, which aims
to uncover malicious functionalities that have not yet executed. Unfortunately, this requires …

[PDF][PDF] Securing input data of deep learning inference systems via partitioned enclave execution

Z Gu, H Huang, J Zhang, D Su, A Lamba… - arXiv preprint arXiv …, 2018 - researchgate.net
Deep learning systems have been widely deployed as backend engines of artificial
intelligence (AI) services for their approaching-human performance in cognitive tasks …

Truz-droid: Integrating trustzone with mobile operating system

K Ying, A Ahlawat, B Alsharifi, Y Jiang… - Proceedings of the 16th …, 2018 - dl.acm.org
Mobile devices today provide a hardware-protected mode called Trusted Execution
Environment (TEE) to help protect users from a compromised OS and hypervisor. Today TEE …

Introducing the temporal dimension to memory forensics

F Pagani, O Fedorov, D Balzarotti - ACM Transactions on Privacy and …, 2019 - dl.acm.org
Kickstarted by the Digital Forensic Research Workshop (DFRWS) conference in 2005,
modern memory analysis is now one of most active areas of computer forensics and it mostly …