Title
Memory Forensic Challenges Under Misused Architectural Features.
Abstract
With increasingly complex cyber attacks occurring every day, memory-based forensic techniques are becoming instrumental in digital investigations. Forensic examiners can unravel what happened on a system by acquiring and inspecting in-memory data. However, the foundation of this analysis can be invalidated if the memory acquisition has been altered. In this paper, we study the feasibility of malic...
Year
DOI
Venue
2018
10.1109/TIFS.2018.2819119
IEEE Transactions on Information Forensics and Security
Keywords
Field
DocType
Forensics,Registers,Layout,Random access memory,Malware,Operating systems,Tools
Address space,Computer vision,x86,Northbridge,Memory forensics,Physical address,Computer science,Computer security,Artificial intelligence,Processor register,Malware,Translation lookaside buffer
Journal
Volume
Issue
ISSN
13
9
1556-6013
Citations 
PageRank 
References 
1
0.35
0
Authors
6
Name
Order
Citations
PageRank
Ning Zhang1739.60
Ruide Zhang222.74
Kun Sun314212.80
Wenjing Lou47822328.18
Yiwei Thomas Hou52825169.32
Sushil Jajodia693751839.16