Abstract | ||
---|---|---|
With increasingly complex cyber attacks occurring every day, memory-based forensic techniques are becoming instrumental in digital investigations. Forensic examiners can unravel what happened on a system by acquiring and inspecting in-memory data. However, the foundation of this analysis can be invalidated if the memory acquisition has been altered. In this paper, we study the feasibility of malic... |
Year | DOI | Venue |
---|---|---|
2018 | 10.1109/TIFS.2018.2819119 | IEEE Transactions on Information Forensics and Security |
Keywords | Field | DocType |
Forensics,Registers,Layout,Random access memory,Malware,Operating systems,Tools | Address space,Computer vision,x86,Northbridge,Memory forensics,Physical address,Computer science,Computer security,Artificial intelligence,Processor register,Malware,Translation lookaside buffer | Journal |
Volume | Issue | ISSN |
13 | 9 | 1556-6013 |
Citations | PageRank | References |
1 | 0.35 | 0 |
Authors | ||
6 |
Name | Order | Citations | PageRank |
---|---|---|---|
Ning Zhang | 1 | 73 | 9.60 |
Ruide Zhang | 2 | 2 | 2.74 |
Kun Sun | 3 | 142 | 12.80 |
Wenjing Lou | 4 | 7822 | 328.18 |
Yiwei Thomas Hou | 5 | 2825 | 169.32 |
Sushil Jajodia | 6 | 9375 | 1839.16 |