[HTML][HTML] Anti-forensic resilient memory acquisition

J Stüttgen, M Cohen - Digital investigation, 2013 - Elsevier
Memory analysis has gained popularity in recent years proving to be an effective technique
for uncovering malware in compromised computer systems. The process of memory …

Leveraging virtual machine introspection with memory forensics to detect and characterize unknown malware using machine learning techniques at hypervisor

MAA Kumara, CD Jaidhar - Digital Investigation, 2017 - Elsevier
Abstract The Virtual Machine Introspection (VMI) has emerged as a fine-grained, out-of-VM
security solution that detects malware by introspecting and reconstructing the volatile …

Automated multi-level malware detection system based on reconstructed semantic view of executables using machine learning techniques at VMM

A Kumara, CD Jaidhar - Future Generation Computer Systems, 2018 - Elsevier
In order to fulfill the requirements like stringent timing restraints and demand on resources,
Cyber–Physical System (CPS) must deploy on the virtualized environment such as cloud …

ForenVisor: A tool for acquiring and preserving reliable data in cloud live forensics

Z Qi, C **ang, R Ma, J Li, H Guan… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
Live forensics is an important technique in cloud security but is facing the challenge of
reliability. Most of the live forensic tools in cloud computing run either in the target Operating …

Memory forensic challenges under misused architectural features

N Zhang, R Zhang, K Sun, W Lou… - IEEE Transactions …, 2018 - ieeexplore.ieee.org
With increasingly complex cyber attacks occurring every day, memory-based forensic
techniques are becoming instrumental in digital investigations. Forensic examiners can …

Now you see me: Hide and seek in physical address space

N Zhang, K Sun, W Lou, YT Hou, S Jajodia - Proceedings of the 10th …, 2015 - dl.acm.org
With the growing complexity of computing systems, memory based forensic techniques are
becoming instrumental in digital investigations. Digital forensic examiners can unravel what …

A virtualization based monitoring system for mini-intrusive live forensics

X Zhong, C **ang, M Yu, Z Qi, H Guan - International Journal of Parallel …, 2015 - Springer
Digital evidences hold great significance for governing cybercrime. Unfortunately, previous
acquisition tools were troubled by either the shortage of suspending the target system's …

Secure Virtual Machine for Real Time Forensic Tools on Commodity Workstations

D Luţaş, A Coleşa, S Lukács, A Luţaş - … June 9-10, 2016, Revised Selected …, 2016 - Springer
Forensic analysis of volatile memory is a crucial part in the Incident Response process.
Traditionally, it requires acquiring and transferring a memory dump from the affected …

Attack and Defense with Hardware-Aided Security

N Zhang - 2016 - vtechworks.lib.vt.edu
Riding on recent advances in computing and networking, our society is now experiencing
the evolution into the age of information. While the development of these technologies …