Author:
Xiao Jidong,Lu Lei,Wang Haining,Zhu Xiaoyun
Cited by
11 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. RandCompile: Removing Forensic Gadgets from the Linux Kernel to Combat its Analysis;Annual Computer Security Applications Conference;2023-12-04
2. Volatile Kernel Rootkit hidden process detection in cloud computing;Journal of Cloud Computing;2023-11-25
3. WSL2 Forensics: Detection, Analysis & Revirtualization;Proceedings of the 17th International Conference on Availability, Reliability and Security;2022-08-23
4. MemInspect2: OS-Independent Memory Forensics for IoT Devices in Cybercrime Investigations;2022 IEEE/ACIS 22nd International Conference on Computer and Information Science (ICIS);2022-06-26
5. Abusing Trust: Mobile Kernel Subversion via TrustZone Rootkits;2022 IEEE Security and Privacy Workshops (SPW);2022-05