Forensic analysis of the Windows registry in memory
暂无分享,去创建一个
[1] Ryan D. Pittman,et al. Windows Forensic Analysis , 2010 .
[2] William A. Arbaugh,et al. An Architecture for Specification-Based Detection of Semantic Integrity Violations in Kernel Dynamic Data , 2006, USENIX Security Symposium.
[3] Andreas Schuster,et al. Searching for processes and threads in Microsoft Windows memory dumps , 2006, Digit. Investig..
[4] Timothy Grance,et al. Guide to Integrating Forensic Techniques into Incident Response , 2006 .
[5] Nick L. Petroni,et al. Volatools : Integrating Volatile Memory Forensics into the Digital Investigation Process , 2007 .
[6] Derrick J. Farmer. A FORENSIC ANALYSIS OF THE WINDOWS REGISTRY , 2007 .
[7] Brendan Dolan-Gavitt,et al. The VAD tree: A process-eye view of physical memory , 2007, Digit. Investig..
[8] Harlan Carvey. The Windows Registry as a forensic resource , 2005, Digit. Investig..
[9] Mark Russinovich,et al. Microsoft Windows Internals, Fourth Edition: Microsoft Windows Server(TM) 2003, Windows XP, and Windows 2000 (Pro-Developer) , 2004 .