Learn More
Keywords: Android Memory forensics Memory analysis Linux Mobile device forensics a b s t r a c t The Android operating system for mobile phones, which is still relatively new, is rapidly gaining market share, with dozens of smartphones and tablets either released or set to be released. In this paper, we present the first methodology and toolset for(More)
Research and theory on the intervening variables that enable individuals who experience marginalization and oppression to achieve well-being have historically relied on an individual level of analysis. Yet, there is a growing body of literature that highlights the roles that contexts play in facilitating processes that result in wellness among marginalized(More)
—Digital forensic tools are being developed at a brisk pace in response to the ever increasing variety of forensic targets. Most tools are created for specific tasks–file system analysis, memory analysis, network analysis, etc.–and make little effort to interoperate with one another. This makes it difficult and extremely time-consuming for an investigator(More)
This paper presents the first deep investigation of the kmem_cache facility in Linux from a forensics perspective. The kmem_cache is used by the Linux kernel to quickly allocate and deallocate kernel structures associated with processes, files, and the network stack. Our focus is on deallocated information that remains in the cache and the major(More)
Keywords: Memory analysis Live forensics Compressed RAM Virtual memory Digital forensics a b s t r a c t The forensics community is increasingly embracing the use of memory analysis to enhance traditional storage-based forensics techniques, because memory analysis yields a wealth of information not available on non-volatile storage. Memory analysis involves(More)
Keywords: Memory analysis Rootkits Kernel level malware Digital forensics Incident response a b s t r a c t In the last few years there has been a sharp increase in the use of Mac OS X systems in professional settings. This has led to increased activity in the development of malware and attack toolkits focused specifically on OS X systems, and(More)
Historically, consumers of mental health services have not been given meaningful roles in research and change efforts related to the services they use. This is quickly changing as scholars and a growing number of funding bodies now call for greater consumer involvement in mental health services research and improvement. Amidst these calls, community-based(More)
Memory forensics is increasingly used to detect and analyze sophisticated malware. In the last decade, major advances in memory forensics have made analysis of kernel-level mal-ware straightforward. Kernel-level malware has been favored by attackers because it essentially provides complete control over a machine. This has changed recently as operating(More)