GUITAR: Piecing Together Android App GUIs from Memory Images
暂无分享,去创建一个
Zhongshu Gu | Xiangyu Zhang | Rohit Bhatia | Dongyan Xu | Brendan Saltaformaggio | X. Zhang | Dongyan Xu | Zhongshu Gu | Brendan Saltaformaggio | R. Bhatia
[1] H. Marshall Jarrett,et al. Searching and Seizing Computers and Obtaining Electronic Evidence in Criminal Investigations , 1979 .
[2] Joe Grand,et al. A hardware-based memory acquisition procedure for digital investigations , 2004, Digit. Investig..
[3] Paul Movall,et al. Linux Physical Memory Analysis , 2005, USENIX Annual Technical Conference, FREENIX Track.
[4] Frank Adelstein,et al. Live forensics: diagnosing your system without killing it first , 2006, CACM.
[5] Brian D. Carrier. Risks of live digital forensic analysis , 2006, CACM.
[6] Andreas Schuster,et al. Searching for processes and threads in Microsoft Windows memory dumps , 2006, Digit. Investig..
[7] William A. Arbaugh,et al. FATKit: A framework for the extraction and analysis of digital forensic data from volatile system memory , 2006, Digit. Investig..
[8] Yiannis S. Boutalis,et al. CEDD: Color and Edge Directivity Descriptor: A Compact Descriptor for Image Indexing and Retrieval , 2008, ICVS.
[9] Golden G. Richard,et al. FACE: Automated digital evidence discovery and correlation , 2008, Digit. Investig..
[10] Mathias Lux,et al. Lire: lucene image retrieval: an extensible java CBIR library , 2008, ACM Multimedia.
[11] Xuxian Jiang,et al. Mapping kernel objects to enable systematic integrity checking , 2009, CCS.
[12] Abhinav Srivastava,et al. Robust signatures for kernel data structures , 2009, CCS.
[13] Vrizlynn L. L. Thing,et al. Live memory forensics of mobile phones , 2010, Digit. Investig..
[14] Xiangyu Zhang,et al. Automatic Reverse Engineering of Data Structures from Binary Execution , 2010, NDSS.
[15] Herbert Bos,et al. Howard: A Dynamic Excavator for Reverse Engineering Data Structures , 2011, NDSS.
[16] Xuxian Jiang,et al. SigGraph: Brute Force Scanning of Kernel Data Structure Instances Using Graph-based Signatures , 2011, NDSS.
[17] Mathias Lux,et al. Content based image retrieval with LIRe , 2011, ACM Multimedia.
[18] Brian Neil Levine,et al. Forensic Triage for Mobile Phones with DEC0DE , 2011, USENIX Security Symposium.
[19] David Brumley,et al. TIE: Principled Reverse Engineering of Types in Binary Programs , 2011, NDSS.
[20] Brendan Saltaformaggio. Forensic Carving of Wireless Network Information from the Android Linux Kernel , 2012 .
[21] Golden G. Richard,et al. Acquisition and analysis of volatile memory from android devices , 2012, Digit. Investig..
[22] Chao Wu,et al. Discovering Semantic Data of Interest from Un-mappable Memory with Confidence , 2012, NDSS.
[23] Christoforos Ntantogian,et al. Discovering Authentication Credentials in Volatile Memory of Android Mobile Devices , 2013, I3E.
[24] Xiangyu Zhang,et al. Obfuscation resilient binary code reuse through trace-oriented programming , 2013, CCS.
[25] Zhongshu Gu,et al. DSCRETE: Automatic Rendering of Forensic Information from Memory Images via Application Logic Reuse , 2014, USENIX Security Symposium.
[26] Tilo Müller,et al. Post-Mortem Memory Analysis of Cold-Booted Android Devices , 2014, 2014 Eighth International Conference on IT Security Incident Management & IT Forensics.
[27] Sarah V. Hart,et al. Forensic Examination of Digital Evidence: A Guide for Law Enforcement , 2014 .
[28] Panagiota Polymeropoulou. Book Review: Graves, Michael W. Digital Archaeology: The Art and Science of Digital Forensics , 2014, Inf. Secur. J. A Glob. Perspect..
[29] Sushil Jajodia,et al. TrustDump: Reliable Memory Acquisition on Smartphones , 2014, ESORICS.
[30] Zhongshu Gu,et al. VCR: App-Agnostic Recovery of Photographic Evidence from Android Device Memory Images , 2015, CCS.