Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 226,294,600 papers from all fields of science
Search
Sign In
Create Free Account
Memory forensics
Memory forensics is forensic analysis of a computer's memory dump. Its primary application is investigation of advanced computer attacks which are…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
13 relations
BlueHat
Computer
Core dump
Crash (computing)
Expand
Broader (1)
Computer forensics
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Method of Forensic Analysis for Compromising Carrier-lock Algorithm on 3G Modem Firmware
V. Zhukovskyy
,
N. Zhukovska
,
A. Vlasyuk
,
Andrii Safonyk
IEEE 2nd Ukraine Conference on Electrical and…
2019
Corpus ID: 204863008
In this paper, a new method of usage forensics memory analysis for compromising the carrier-lock algorithm was proposed. The…
Expand
2017
2017
Disk memory forensics: Analysis of memory forensics frameworks flow
T. Prem
,
V. P. Selwin
,
A. K. Mohan
Innovations in Power and Advanced Computing…
2017
Corpus ID: 21266724
We have heard of Cyber Espionage where a spy was able to hide data and go unnoticed virtually. Using some forensics frameworks we…
Expand
2017
2017
Towards Digital Forensics Pedagogical Framework
Sari Sultan
,
A. Salman
2017
Corpus ID: 31523494
Digital forensics education faces numerous challenges that hinder effective knowledge transfer to students. For instance, FAT…
Expand
2017
2017
Towards the memory forensics of OOP execution behavior
Ziad Al-Sharif
,
Mohammed I. Al-Saleh
,
Luay Alawneh
International Conference on Information…
2017
Corpus ID: 3932764
Perpetrators might employ computer programs (software) to perform their offenses or to cover their wrongdoings. Program's source…
Expand
2016
2016
Memory Forensics: Tools and Techniques
S. Gaur
,
R. Chhikara
2016
Corpus ID: 63459116
Objectives: To evaluate the performance of different tools that acquire, analyze and recover the evidences of crime from volatile…
Expand
2015
2015
A Lightweight Framework for Cold Boot Based Forensics on Mobile Devices
Benjamin Taubmann
,
Manuel Huber
,
Sascha Wessel
,
Lukas Heim
,
Hans P. Reiser
,
G. Sigl
ARES
2015
Corpus ID: 16291469
Mobile devices, like tablets and smartphones, are common place in everyday life. Thus, the degree of security these devices can…
Expand
2010
2010
On-line Hot Topic Recommendation Using Tolerance Rough Set Based Topic Clustering
Yonghui Wu
,
Yuxin Ding
,
Xiaolong Wang
,
Jun Xu
Journal of Computers
2010
Corpus ID: 7196826
In this paper we present our research of online hot topic detection and label extraction method for our hot topic recommendation…
Expand
2010
2010
Memory Forensics over the IEEE 1394 Interface
F. Witherden
2010
Corpus ID: 12968135
The IEEE 1394 “FireWire” interface provides a means for acquiring direct memory access. We discuss how this can be used to…
Expand
2009
2009
Collecting Sensitive Information from Windows Physical Memory
Qiang Zhao
,
Tianjie Cao
Journal of Computers
2009
Corpus ID: 18303090
When investigators are faced with a target system, they want to find sensitive information such as userID and password…
Expand
2009
2009
Theory and practice of flash memory mobile forensics
Salvatore Fiorillo
2009
Corpus ID: 7668219
This paper is an introduction to flash memory forensics with a special focus on completeness of evidence acquired from mobile…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE