Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
An os-agnostic approach to memory forensics
The analysis of memory dumps presents unique challenges, as operating systems use a
variety of (often undocumented) ways to represent data in memory. To solve this problem …
variety of (often undocumented) ways to represent data in memory. To solve this problem …
Katana: Robust, automated, binary-only forensic analysis of linux memory snapshots
F Franzen, T Holl, M Andreas, J Kirsch… - Proceedings of the 25th …, 2022 - dl.acm.org
The development and research of tools for forensically analyzing Linux memory snapshots
have stalled in recent years as they cannot deal with the high degree of configurability and …
have stalled in recent years as they cannot deal with the high degree of configurability and …
{00SEVen}–Re-enabling Virtual Machine Forensics: Introspecting Confidential {VMs} Using Privileged {in-VM} Agents
The security guarantees of confidential VMs (eg, AMD's SEV) are a double-edged sword:
Their protection against undesired VM inspection by malicious or compromised cloud …
Their protection against undesired VM inspection by malicious or compromised cloud …
CrypTody: Cryptographic Misuse Analysis of IoT Firmware via Data-flow Reasoning
Cryptographic techniques form the foundation of the security and privacy of computing
solutions. However, if cryptographic APIs are not invoked correctly, they can result in …
solutions. However, if cryptographic APIs are not invoked correctly, they can result in …
[HTML][HTML] Chracer: memory analysis of chromium-based browsers
The web browsing activities of a user provide useful evidence for digital forensic
investigations. However, existing analysis techniques that aim to analyze local artifacts (eg …
investigations. However, existing analysis techniques that aim to analyze local artifacts (eg …
Abusing trust: Mobile kernel subversion via TrustZone rootkits
The Arm TrustZone is the de facto standard for hardware-backed Trusted Execution
Environments (TEEs) on mobile devices, providing isolation for secure computations to be …
Environments (TEEs) on mobile devices, providing isolation for secure computations to be …
RandCompile: Removing Forensic Gadgets from the Linux Kernel to Combat its Analysis
Recently proposed tools such as LogicMem, Katana, and AutoProfile enable a fine-grained
inspection of the operating system's memory. They provide insights that were previously only …
inspection of the operating system's memory. They provide insights that were previously only …
Future of Kernel Object-Based Memory Forensics
There are various techniques (String Search, Signature, List Traversal, Kernel Object, etc.) to
perform memory forensics. Among them, Kernel Object-based memory forensics techniques …
perform memory forensics. Among them, Kernel Object-based memory forensics techniques …
A Zero-Knowledge Approach to Memory Forensics
A Oliveri - 2023 - theses.hal.science
The rapid increase of embedded devices and IoT objects is leading to a multiplication of
operating systems and processor architectures, which are generally not supported by …
operating systems and processor architectures, which are generally not supported by …
TEE-based designs for network gateways, web authentication, and VM introspection
FF Schwarz - 2024 - publikationen.sulb.uni-saarland.de
Over the last decades, the complexity of client, server, and network devices has drastically
increased---and so has the number of sophisticated attacks against them. New …
increased---and so has the number of sophisticated attacks against them. New …