Digital forensic tools: Recent advances and enhancing the status quo

T Wu, F Breitinger, S O'Shaughnessy - Forensic Science International …, 2020 - Elsevier
Publications in the digital forensics domain frequently come with tools–a small piece of
functional software. These tools are often released to the public for others to reproduce …

Hooktracer: Automatic detection and analysis of keystroke loggers using memory forensics

A Case, RD Maggio, M Firoz-Ul-Amin, MM Jalalzai… - Computers & …, 2020 - Elsevier
Advances in malware development have led to the widespread use of attacker toolkits that
do not leave any trace in the local filesystem. This negatively impacts traditional investigative …

Keylogger Detection: A Systematic Review

C Ekele Victoria, A Adebiyi Ayodele… - … and Business for …, 2023 - ieeexplore.ieee.org
Keyloggers are a form of spyware that monitors the activities carried out on a computer
system and stores sensitive information such as the keystrokes made by the user and stores …

Enabling the forensic study of application-level encrypted data in Android via a Frida-based decryption framework

C Anglano, M Canonico, A Cepollina… - Proceedings of the 18th …, 2023 - dl.acm.org
The forensic study of mobile apps that use application-level encryption requires the
decryption of the data they generate. Such a decryption requires the knowledge of the …

Designing robust API monitoring solutions

DC D'Elia, S Nicchi, M Mariani… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Tracing the sequence of library calls and system calls that a program makes is very helpful
to characterize its interactions with the surrounding environment and, ultimately, its …

Juicing V8: A primary account for the memory forensics of the V8 JavaScript engine

E Wang, S Zurowski, O Duffy, T Thomas… - Forensic Science …, 2022 - Elsevier
V8 is the open source interpreter developed by Google to enable JavaScript (JS)
functionality in Chrome and power other software. Malicious threat actors abuse the usage …

Android encryption database forensic analysis based on static analysis

Y Zhang, B Li, Y Sun - Proceedings of the 4th International Conference …, 2020 - dl.acm.org
Forensic analysis of mobile applications plays a crucial part in gathering evidence against
criminals. Because the evidence data obtained may often be stored in an encrypted local …

[HTML][HTML] Windows memory forensics: Identification of (malicious) modifications in memory-mapped image files

F Block - Forensic Science International: Digital Investigation, 2023 - Elsevier
Memory forensics plays a crucial role for the analysis of sophisticated malware, especially
with memory-only variants, and has in the past extended its capabilities for detecting various …

App-agnostic post-execution semantic analysis of Android in-memory forensics artifacts

A Ali-Gombe, A Tambaoan, A Gurfolino… - Proceedings of the 36th …, 2020 - dl.acm.org
Over the last decade, userland memory forensics techniques and algorithms have gained
popularity among practitioners, as they have proven to be useful in real forensics and …

Multi-model deep learning ensemble approach for detection of malicious executables

ME Alzahrani - The Islamic University Journal of Applied Sciences …, 2023 - jesc.iu.edu.sa
Due to the growing significance of the Internet in many facets of our lives, the World Wide
Web, which end-users access via web browsers, is evolving into the next platform for those …