Learn More
The Android operating system for mobile phones, which is still relatively new, is rapidly gaining market share, with dozens of smartphones and tablets either released or set to be released. In this paper, we present the first methodology and toolset for acquisition and deep analysis of volatile physical memory from Android devices. The paper discusses some(More)
Digital forensic tools are being developed at a brisk pace in response to the ever increasing variety of forensic targets. Most tools are created for specific tasks–file system analysis, memory analysis, network analysis, etc.–and make little effort to interoperate with one another. This makes it difficult and extremely time-consuming for an investigator to(More)
Research and theory on the intervening variables that enable individuals who experience marginalization and oppression to achieve well-being have historically relied on an individual level of analysis. Yet, there is a growing body of literature that highlights the roles that contexts play in facilitating processes that result in wellness among marginalized(More)
This paper presents the first deep investigation of the kmem_cache facility in Linux from a forensics perspective. The kmem_cache is used by the Linux kernel to quickly allocate and deallocate kernel structures associated with processes, files, and the network stack. Our focus is on deallocated information that remains in the cache and the major(More)
Community psychology recognizes the need for research methods that illuminate context, culture, diversity, and process. One such method, ethnography, has crossed into multiple disciplines from anthropology, and indeed, community psychologists are becoming community ethnographers. Ethnographic work stands at the intersection of bridging universal questions(More)
The forensics community is increasingly embracing the use of memory analysis to enhance traditional storage-based forensics techniques, because memory analysis yields a wealth of information not available on non-volatile storage. Memory analysis involves capture of a system's physical memory so that the live state of a system can be investigated, including(More)
In the last few years there has been a sharp increase in the use of Mac OS X systems in professional settings. This has led to increased activity in the development of malware and attack toolkits focused specifically on OS X systems, and unfortunately, these increasingly powerful offensive capabilities have not (yet) resulted in better defensive research.(More)
A new coaxial plasma gun is described. The long term objective is to accelerate 100-200 microg of plasma with density above 10(17) cm(-3) to greater than 200 km/s with a Mach number above 10. Such high velocity dense plasma jets have a number of potential fusion applications, including plasma refueling, magnetized target fusion, injection of angular(More)
Minority youths who experience adversity in the forms of concentrated poverty, neighborhood violence, and social marginalization are at increased risk for delinquency. Yet, traditional approaches to reducing delinquency do not typically account for these social-structural risk factors. This article proposes a model of intervening that was developed to(More)