Author:
Latzo Tobias,Brost Julian,Freiling Felix
Funder
Federal Ministry of Education and Research
Deutsche Forschungsgemeinschaft
Reference32 articles.
1. Common BMC Vulnerabilities and How to Avoid Repeating Them;Altherr,2019
2. A hardware-based memory acquisition procedure for digital investigations;Carrier;Digit. Invest.,2004
3. Integrated Dell remote access controller;Dell Inc,2014
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. A Detailed Study of Advancements in Digital Forensics;Lecture Notes in Electrical Engineering;2024
2. PCIE-Based Shared Memory Technology between BMC and CPU;Proceedings of the 2nd International Conference on Signal Processing, Computer Networks and Communications;2023-12-08
3. FIMAR: Fast incremental memory acquisition and restoration system for temporal-dimension forensic analysis;Forensic Science International: Digital Investigation;2023-09
4. Secure and Efficient BMC-Based Centralized Management Method for Large-Scale Data Centers;2022 IEEE 24th Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, Cloud & Big Data Systems & Application (HPCC/DSS/SmartCity/DependSys);2022-12
5. NASCENT: A Non-Invasive Solution for Detecting Utilization of Servers in Bare-Metal Cloud;IEEE Access;2022