{DroidScraper}: A Tool for Android {In-Memory} Object Recovery and Reconstruction

A Ali-Gombe, S Sudhakaran, A Case… - … on Research in Attacks …, 2019 - usenix.org
There is a growing need for post-mortem analysis in forensics investigations involving
mobile devices, particularly when application-specific behaviors must be analyzed. This is …

Lessons Learned and Challenges of Deploying Control Flow Integrity in Complex Software: the Case of OpenJDK's Java Virtual Machine

S Houy, A Bartel - 2024 IEEE Secure Development Conference …, 2024 - ieeexplore.ieee.org
This research explores integrating LLVM's Control Flow Integrity (CFI) into the OpenJDK
Java Virtual Machine (JVM) to mitigate memory corruption vulnerabilities. We present a …

[PDF][PDF] Total Recall: Persistence of Passwords in Android.

J Lee, A Chen, DS Wallach - NDSS, 2019 - cs.uwaterloo.ca
A good security practice for handling sensitive data, such as passwords, is to overwrite the
data buffers with zeros once the data is no longer in use. This protects against attackers who …

Picking up the trash: Exploiting generational GC for memory analysis

A Pridgen, S Garfinkel, DS Wallach - Digital Investigation, 2017 - Elsevier
Memory analysis is slowly moving up the software stack. Early analysis efforts focused on
core OS structures and services. As this field evolves, more information becomes accessible …

Securing Sensitive Data in Java Virtual Machines

L Deng, B Wei, J Guo, M Benke… - 2022 IEEE/ACIS …, 2022 - ieeexplore.ieee.org
Java-based applications are widely used by companies, government agencies, and
financial institutions. Every day, these applications process a considerable amount of …

[PDF][PDF] Removing Secrets from Android's TLS.

J Lee, DS Wallach - NDSS, 2018 - cs.rice.edu
Cryptographic libraries that implement Transport Layer Security (TLS) have a responsibility
to delete cryptographic keys once they're no longer in use. Any key that's left in memory can …

Identifying and mitigating misuse of secrets in Android with dynamic analysis techniques

J Lee - 2019 - search.proquest.com
Mobile phones have been completely changing the way people think and behave, making
our lives convenient. At the same time, this accelerated growth has brought with it …

[PDF][PDF] Exploiting Generational Garbage Collection: Using Data Remnants to Improve Memory Analysis and Digital Forensics

AT Pridgen - 2017 - academia.edu
Digital forensics focuses on recovering artifacts and evidence for the purposes of
reconstructing events. The information gathered comes from several places like; network …

Exploiting Java Stack Forensics for Runtime Monitoring of IoT Services

Y Mao, Y Zhang, J Chen, K Zhao - ICC 2019-2019 IEEE …, 2019 - ieeexplore.ieee.org
Internet of Things (IoT) services play an increasingly important role in modern society with
the more deployment in critical infrastructures. Ensuring IoT systems operating in a secure …

[CITATION][C] Picking up the Trash: Exploiting Generational Garbage Collection in the HotSpot JVM