Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Safety, Risk, Reliability and Quality,Information Systems,Software
Reference67 articles.
1. Abadi, M., Budiu, M., Erlingsson, Ú., Ligatti, J.: Control-flow integrity principles, implementations, and applications. ACM Trans. Inf. Syst. Secur. (TISSEC) 13(1), 4 (2009)
2. Anderson, D.: Crash (2008). https://people.redhat.com/anderson/crash_whitepaper/. Accessed 26 Nov 2019
3. Betz, C.: Memparser (2005). http://www.dfrws.org/2005/challenge/memparser.shtml
4. Bletsch, T., Jiang, X., Freeh, V.W., Liang, Z.: Jump-oriented programming: a new class of code-reuse attack. In: Proceedings of the 6th ACM symposium on information, computer and communications security, pp. 30–40. ACM (2011)
5. Block, F., Dewald, A.: Linux memory forensics: dissecting the user space process heap. Digit. Investig. 22, S66–S75 (2017)
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Forensic Analysis and Detection of Spoofing Based Email Attack Using Memory Forensics and Machine Learning;Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering;2023
2. SAM: A Mechanism to Facilitate Smear-Aware Forensic Analysis of Volatile System Memory;Journal of Applied Security Research;2022-12-30
3. Analyzing PTM attack traces through PageDumper: A case study;2022 IEEE 7th International conference for Convergence in Technology (I2CT);2022-04-07
4. Quantifying Paging on Recoverable Data from Windows User-Space Modules;Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering;2022