Research and development of memory forensics

被引:0
|
作者
Zhang, Yu [1 ]
Liu, Qing-Zhong [2 ]
Li, Tao [3 ]
Wu, Li-Hua [1 ]
Shi, Chun [1 ]
机构
[1] Department of Computer Science, Hainan Normal University, Haikou,571158, China
[2] Department of Computer Science, Sam Houston State University, Sam Houston State, United States
[3] College of Computer Science, Sichuan University, Chengdu,610065, China
来源
Ruan Jian Xue Bao/Journal of Software | 2015年 / 26卷 / 05期
关键词
D O I
10.13328/j.cnki.jos.004821
中图分类号
学科分类号
摘要
109
引用
收藏
页码:1151 / 1172
相关论文
共 50 条
  • [21] Fileless malware threats: Recent advances, analysis approach through memory forensics and research challenges
    Kara, Ilker
    EXPERT SYSTEMS WITH APPLICATIONS, 2023, 214
  • [22] Pupils: Experimental Research on Development of Memory
    Netschajeff, Alexander
    ZEITSCHRIFT FUR PSYCHOLOGIE UND PHYSIOLOGIE DER SINNESORGANE, 1900, 24 : 321 - 351
  • [23] Research and Development on Deep Memory Network
    Liu, Jian-Wei
    Wang, Yuan-Fang
    Luo, Xiong-Lin
    Jisuanji Xuebao/Chinese Journal of Computers, 2021, 44 (08): : 1549 - 1589
  • [24] Digital Forensics Research on Cloud Computing: An investigation of Cloud Forensics Solutions
    Morioka, Erni
    Sharbaf, Mehrdad S.
    2016 IEEE SYMPOSIUM ON TECHNOLOGIES FOR HOMELAND SECURITY (HST), 2016,
  • [25] Evaluating the Reliability of Android Userland Memory Forensics
    Sudhakaran, Sneha
    Ali-Gombe, Aisha
    Case, Andrew
    Richard, Golden G., III
    PROCEEDINGS OF THE 17TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2022), 2022, : 423 - 433
  • [26] Towards the Memory Forensics of OOP Execution Behavior
    Al-Sharif, Ziad A.
    Al-Saleh, Mohammad I.
    Alawneh, Luay
    2017 8TH INTERNATIONAL CONFERENCE ON INFORMATION, INTELLIGENCE, SYSTEMS & APPLICATIONS (IISA), 2017, : 19 - 24
  • [27] Detecting Malware and Rootkit via Memory Forensics
    Hua, Qiang
    Zhang, Yang
    2015 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND MECHANICAL AUTOMATION (CSMA), 2015, : 92 - 96
  • [28] Visualizing Indicators of Rootkit Infections in Memory Forensics
    Voemel, Stefan
    Lenz, Hermann
    2013 SEVENTH INTERNATIONAL CONFERENCE ON IT SECURITY INCIDENT MANAGEMENT AND IT FORENSICS (IMF 2013), 2013, : 122 - 139
  • [29] Live Memory Forensics Investigations: A Comparative Analysis
    Syamsuddin, Irfan
    Syamsuar, Dedy
    JOURNAL OF ADVANCES IN INFORMATION TECHNOLOGY, 2023, 14 (05) : 950 - 959
  • [30] Volatile memory forensics of privacy aware browsers
    Mistry, Nilay R.
    Gajjar, Krupa
    Junare, S. O.
    INTERNATIONAL JOURNAL OF INFORMATION AND COMPUTER SECURITY, 2022, 18 (3-4) : 313 - 326