Acquisition and analysis of volatile memory from android devices

J Sylve, A Case, L Marziale, GG Richard - Digital Investigation, 2012 - Elsevier
The Android operating system for mobile phones, which is still relatively new, is rapidly
gaining market share, with dozens of smartphones and tablets either released or set to be …

The design and implementation of hyperupcalls

N Amit, M Wei - 2018 USENIX Annual Technical Conference (USENIX …, 2018 - usenix.org
The virtual machine abstraction provides a wide variety of benefits which have undeniably
enabled cloud computing. Virtual machines, however, are a double-edged sword as …

Comparative analysis of volatile memory forensics: live response vs. memory imaging

A Aljaedi, D Lindskog, P Zavarsky… - 2011 IEEE Third …, 2011 - ieeexplore.ieee.org
Traditionally, incident responders and digital forensic examiners have predominantly relied
on live response for volatile data acquisition. While this approach is popular, memory …

Autoprofile: Towards automated profile generation for memory analysis

F Pagani, D Balzarotti - ACM Transactions on Privacy and Security, 2021 - dl.acm.org
Despite a considerable number of approaches that have been proposed to protect computer
systems, cyber-criminal activities are on the rise and forensic analysis of compromised …

Leveraging virtual machine introspection with memory forensics to detect and characterize unknown malware using machine learning techniques at hypervisor

MAA Kumara, CD Jaidhar - Digital Investigation, 2017 - Elsevier
Abstract The Virtual Machine Introspection (VMI) has emerged as a fine-grained, out-of-VM
security solution that detects malware by introspecting and reconstructing the volatile …

Automated multi-level malware detection system based on reconstructed semantic view of executables using machine learning techniques at VMM

A Kumara, CD Jaidhar - Future Generation Computer Systems, 2018 - Elsevier
In order to fulfill the requirements like stringent timing restraints and demand on resources,
Cyber–Physical System (CPS) must deploy on the virtualized environment such as cloud …

Cybersecurity: Past, present and future

S Alam - arXiv preprint arXiv:2207.01227, 2022 - arxiv.org
The digital transformation has created a new digital space known as cyberspace. This new
cyberspace has improved the workings of businesses, organizations, governments, society …

Memory foreshadow: memory forensics of hardware cryptocurrency wallets–a tool and visualization framework

T Thomas, M Piscitelli, I Shavrov, I Baggili - Forensic Science International …, 2020 - Elsevier
Abstract We present Memory FORESHADOW: Memory FOREnSics of HArDware
cryptOcurrency Wallets. To the best of our knowledge, this is the primary account of …

Exploring vm introspection: Techniques and trade-offs

S Suneja, C Isci, E De Lara, V Bala - Acm Sigplan Notices, 2015 - dl.acm.org
While there are a variety of existing virtual machine introspection (VMI) techniques, their
latency, overhead, complexity and consistency trade-offs are not clear. In this work, we …

A survey on digital forensics trends

M Damshenas, A Dehghantanha… - International Journal of …, 2014 - go.gale.com
Digital forensic has evolved from addressing minor computer crimes to investigation of
complex international cases with massive effect on the world. This paper studies the …