Identifying Volatile Data from Multiple Memory Dumps in Live Forensics
暂无分享,去创建一个
Siu-Ming Yiu | Wing-Kai Hon | K. P. Chow | Michael Y. K. Kwan | Pierre K. Y. Lai | Frank Y. W. Law | Lucas Chi Kwong Hui | Benjamin Tang | Patrick P. F. Chan | Ricci S. C. Ieong | L. Hui | S. Yiu | M. Kwan | K. Chow | W. Hon | R. Ieong | F. Law | P. Lai | B. Tang
[1] Ali Reza Arasteh,et al. Forensic memory analysis: From stack and code to execution history , 2007, Digit. Investig..
[2] Frans Henskens,et al. Persistent systems techniques in forensic acquisition of memory , 2007, Digit. Investig..
[3] Dan Farmer,et al. Forensic Discovery , 2004 .
[4] K. P. Chow,et al. Consistency Issue on Live Systems Forensics , 2007, Future Generation Communication and Networking (FGCN 2007).
[5] W. Alink,et al. Forensic memory analysis: Files mapped in memory , 2008, Digit. Investig..
[6] Gabriela Limon Garcia,et al. Forensic physical memory analysis : an overview of tools and techniques , 2007 .
[7] Thomas W. Reps,et al. Improved Memory-Access Analysis for x86 Executables , 2008, CC.
[8] Theodore Tryfonas,et al. Acquiring volatile operating system data tools and techniques , 2008, OPSR.
[9] Thomas W. Reps,et al. Analyzing Memory Accesses in x86 Executables , 2004, CC.
[10] William A. Arbaugh,et al. FATKit: A framework for the extraction and analysis of digital forensic data from volatile system memory , 2006, Digit. Investig..
[11] Andreas Schuster,et al. Searching for processes and threads in Microsoft Windows memory dumps , 2006, Digit. Investig..
[12] D CarrierBrian,et al. A hardware-based memory acquisition procedure for digital investigations , 2004 .
[13] Joe Grand,et al. A hardware-based memory acquisition procedure for digital investigations , 2004, Digit. Investig..