Extracting Forensic Artifacts from Windows O/S Memory
暂无分享,去创建一个
[1] Andreas Schuster,et al. Searching for processes and threads in Microsoft Windows memory dumps , 2006, Digit. Investig..
[2] James S. Okolica,et al. Windows operating systems agnostic memory analysis , 2010 .
[3] James S. Okolica,et al. A Compiled Memory Analysis Tool , 2010, IFIP Int. Conf. Digital Forensics.
[4] James S. Okolica,et al. Windows driver memory analysis: A reverse engineering methodology , 2011, Comput. Secur..
[5] James S. Okolica,et al. Simulating windows-based cyber attacks using live virtual machine introspection , 2010, SummerSim.
[6] Sven B. Schreiber. Undocumented Windows 2000 Secrets: A Programmer's Cookbook , 2001 .
[7] James S. Okolica,et al. Extracting the windows clipboard from physical memory , 2011 .
[8] Brendan Dolan-Gavitt,et al. Forensic analysis of the Windows registry in memory , 2008, Digit. Investig..
[9] Eoghan Casey,et al. Extracting Windows command line details from physical memory , 2010 .
[10] Nick L. Petroni,et al. Volatools : Integrating Volatile Memory Forensics into the Digital Investigation Process , 2007 .