Skip to search formSkip to main contentSkip to account menu

Memory forensics

Memory forensics is forensic analysis of a computer's memory dump. Its primary application is investigation of advanced computer attacks which are… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
In this paper, a new method of usage forensics memory analysis for compromising the carrier-lock algorithm was proposed. The… 
2018
2018
This is very true for the Windows operating system (OS) used by government and private organizations. With Windows, the closed… 
2017
2017
We have heard of Cyber Espionage where a spy was able to hide data and go unnoticed virtually. Using some forensics frameworks we… 
2017
2017
Digital forensics education faces numerous challenges that hinder effective knowledge transfer to students. For instance, FAT… 
2017
2017
Perpetrators might employ computer programs (software) to perform their offenses or to cover their wrongdoings. Program's source… 
2015
2015
Mobile devices, like tablets and smartphones, are common place in everyday life. Thus, the degree of security these devices can… 
2015
2015
Cloud computing is attracting large base of users and organisations. However, lack of trust in public cloud providers, especially… 
2010
2010
The IEEE 1394 “FireWire” interface provides a means for acquiring direct memory access. We discuss how this can be used to… 
2009
2009
When investigators are faced with a target system, they want to find sensitive information such as userID and password… 
2009
2009
This paper is an introduction to flash memory forensics with a special focus on completeness of evidence acquired from mobile…