Visualization in testing a volatile memory forensic tool
暂无分享,去创建一个
[1] Ariel J. Feldman,et al. Lest we remember: cold-boot attacks on encryption keys , 2008, CACM.
[2] James R. Lyle. If error rate is such a simple concept, why don't I have one for my forensic tool yet? , 2010 .
[3] Ivor Kollár. Forensic RAM dump image analyzer , 2009 .
[4] Gregory J. Conti,et al. Visual Reverse Engineering of Binary and Data Files , 2008, VizSEC.
[5] James L. Lyle,et al. NIST CFTT: Testing Disk Imaging Tools , 2002, Int. J. Digit. EVid..
[6] Amit Singh,et al. Mac OS X Internals , 2006 .
[7] Sang-Jin Lee,et al. Research on Mac OS X Physical Memory Analysis , 2011 .
[8] Kenneth Ward Church,et al. Dotplot : a program for exploring self-similarity in millions of lines of text and code , 1993 .
[9] Amit Singh,et al. Mac OS X Internals: A Systems Approach , 2006 .
[10] James R. Lyle,et al. Issues with imaging drives containing faulty sectors , 2007 .
[11] Rob Williams,et al. Linux device drivers , 2006 .