{DroidScraper}: A Tool for Android {In-Memory} Object Recovery and Reconstruction
There is a growing need for post-mortem analysis in forensics investigations involving
mobile devices, particularly when application-specific behaviors must be analyzed. This is …
mobile devices, particularly when application-specific behaviors must be analyzed. This is …
Lessons Learned and Challenges of Deploying Control Flow Integrity in Complex Software: the Case of OpenJDK's Java Virtual Machine
S Houy, A Bartel - 2024 IEEE Secure Development Conference …, 2024 - ieeexplore.ieee.org
This research explores integrating LLVM's Control Flow Integrity (CFI) into the OpenJDK
Java Virtual Machine (JVM) to mitigate memory corruption vulnerabilities. We present a …
Java Virtual Machine (JVM) to mitigate memory corruption vulnerabilities. We present a …
[PDF][PDF] Total Recall: Persistence of Passwords in Android.
A good security practice for handling sensitive data, such as passwords, is to overwrite the
data buffers with zeros once the data is no longer in use. This protects against attackers who …
data buffers with zeros once the data is no longer in use. This protects against attackers who …
Picking up the trash: Exploiting generational GC for memory analysis
Memory analysis is slowly moving up the software stack. Early analysis efforts focused on
core OS structures and services. As this field evolves, more information becomes accessible …
core OS structures and services. As this field evolves, more information becomes accessible …
Securing Sensitive Data in Java Virtual Machines
Java-based applications are widely used by companies, government agencies, and
financial institutions. Every day, these applications process a considerable amount of …
financial institutions. Every day, these applications process a considerable amount of …
[PDF][PDF] Removing Secrets from Android's TLS.
J Lee, DS Wallach - NDSS, 2018 - cs.rice.edu
Cryptographic libraries that implement Transport Layer Security (TLS) have a responsibility
to delete cryptographic keys once they're no longer in use. Any key that's left in memory can …
to delete cryptographic keys once they're no longer in use. Any key that's left in memory can …
Identifying and mitigating misuse of secrets in Android with dynamic analysis techniques
J Lee - 2019 - search.proquest.com
Mobile phones have been completely changing the way people think and behave, making
our lives convenient. At the same time, this accelerated growth has brought with it …
our lives convenient. At the same time, this accelerated growth has brought with it …
[PDF][PDF] Exploiting Generational Garbage Collection: Using Data Remnants to Improve Memory Analysis and Digital Forensics
AT Pridgen - 2017 - academia.edu
Digital forensics focuses on recovering artifacts and evidence for the purposes of
reconstructing events. The information gathered comes from several places like; network …
reconstructing events. The information gathered comes from several places like; network …
Exploiting Java Stack Forensics for Runtime Monitoring of IoT Services
Y Mao, Y Zhang, J Chen, K Zhao - ICC 2019-2019 IEEE …, 2019 - ieeexplore.ieee.org
Internet of Things (IoT) services play an increasingly important role in modern society with
the more deployment in critical infrastructures. Ensuring IoT systems operating in a secure …
the more deployment in critical infrastructures. Ensuring IoT systems operating in a secure …