Learn More
Keywords: Android Memory forensics Memory analysis Linux Mobile device forensics a b s t r a c t The Android operating system for mobile phones, which is still relatively new, is rapidly gaining market share, with dozens of smartphones and tablets either released or set to be released. In this paper, we present the first methodology and toolset for(More)
Research and theory on the intervening variables that enable individuals who experience marginalization and oppression to achieve well-being have historically relied on an individual level of analysis. Yet, there is a growing body of literature that highlights the roles that contexts play in facilitating processes that result in wellness among marginalized(More)
—Digital forensic tools are being developed at a brisk pace in response to the ever increasing variety of forensic targets. Most tools are created for specific tasks–file system analysis, memory analysis, network analysis, etc.–and make little effort to interoperate with one another. This makes it difficult and extremely time-consuming for an investigator(More)
This paper presents the first deep investigation of the kmem_cache facility in Linux from a forensics perspective. The kmem_cache is used by the Linux kernel to quickly allocate and deallocate kernel structures associated with processes, files, and the network stack. Our focus is on deallocated information that remains in the cache and the major(More)
Community psychology recognizes the need for research methods that illuminate context, culture, diversity, and process. One such method, ethnography, has crossed into multiple disciplines from anthropology, and indeed, community psychologists are becoming community ethnographers. Ethnographic work stands at the intersection of bridging universal questions(More)
Keywords: Memory analysis Live forensics Compressed RAM Virtual memory Digital forensics a b s t r a c t The forensics community is increasingly embracing the use of memory analysis to enhance traditional storage-based forensics techniques, because memory analysis yields a wealth of information not available on non-volatile storage. Memory analysis involves(More)
Keywords: Memory analysis Rootkits Kernel level malware Digital forensics Incident response a b s t r a c t In the last few years there has been a sharp increase in the use of Mac OS X systems in professional settings. This has led to increased activity in the development of malware and attack toolkits focused specifically on OS X systems, and(More)
Historically, consumers of mental health services have not been given meaningful roles in research and change efforts related to the services they use. This is quickly changing as scholars and a growing number of funding bodies now call for greater consumer involvement in mental health services research and improvement. Amidst these calls, community-based(More)
Four-wave mixing in a saturated gain medium has been modeled numerically, and the predictions for the reflectivity have been compared with experiments carried out in the laser-pumped dye Rhodamine 6G. It is demonstrated that the saturable absorption of the inversion laser pump has a dramatic influence on the intensity dependence of the four-wave-mixing(More)