Memory forensics: The path forward

A Case, GG Richard III - Digital investigation, 2017 - Elsevier
Traditionally, digital forensics focused on artifacts located on the storage devices of
computer systems, mobile phones, digital cameras, and other electronic devices. In the past …

[图书][B] The cybersecurity dilemma: Hacking, trust, and fear between nations

B Buchanan - 2016 - books.google.com
Why do nations break into one another's most important computer networks? There is an
obvious answer: to steal valuable information or to attack. But this isn't the full story. This …

Sok: History is a vast early warning system: Auditing the provenance of system intrusions

MA Inam, Y Chen, A Goyal, J Liu, J Mink… - … IEEE Symposium on …, 2023 - ieeexplore.ieee.org
Auditing, a central pillar of operating system security, has only recently come into its own as
an active area of public research. This resurgent interest is due in large part to the notion of …

The evolution of volatile memory forensics

H Nyholm, K Monteith, S Lyles, M Gallegos… - … of Cybersecurity and …, 2022 - mdpi.com
The collection and analysis of volatile memory is a vibrant area of research in the
cybersecurity community. The ever-evolving and growing threat landscape is trending …

[HTML][HTML] Availability of datasets for digital forensics–and what is missing

C Grajeda, F Breitinger, I Baggili - Digital Investigation, 2017 - Elsevier
This paper targets two main goals. First, we want to provide an overview of available
datasets that can be used by researchers and where to find them. Second, we want to stress …

Leveraging malicious behavior traces from volatile memory using machine learning methods for trusted unknown malware detection in Linux cloud environments

T Panker, N Nissim - Knowledge-Based Systems, 2021 - Elsevier
Most organizations today use cloud-computing environments and virtualization technology.
Linux-based clouds are the most popular cloud environments among organizations, and …

[图书][B] Fundamentals of digital forensics

J Kävrestad - 2020 - Springer
Fundamentals of Digital Forensics: A Guide to Theory, Research and Applications presents
and discusses the fundamental building blocks of computer forensics in a practical and …

Automated malware detection using artifacts in forensic memory images

R Mosli, R Li, B Yuan, Y Pan - 2016 IEEE Symposium on …, 2016 - ieeexplore.ieee.org
Malware is one of the greatest and most rapidly growing threats to the digital world.
Traditional signature-based detection is no longer adequate to detect new variants and …

Evaluation of live forensic techniques in ransomware attack mitigation

SR Davies, R Macfarlane, WJ Buchanan - Forensic Science International …, 2020 - Elsevier
Ransomware continues to grow in both scale, cost, complexity and impact since its initial
discovery nearly 30 years ago. Security practitioners are engaged in a continual “arms race” …

Design of evaluation system for digital education operational skill competition based on blockchain

B Wu, Y Li - 2018 IEEE 15th international conference on e …, 2018 - ieeexplore.ieee.org
By letting students simulate operations and games on a digital education operation system,
schools are able to inspect learning achievement and teaching quality. In digital education …