Memory forensics

Results: 29



#Item
11Disk encryption / Core dump / Database management systems / Digital forensics / Computing / Computer memory

Volatools: Integrating Volatile Memory Forensics into the Digital Investigation Process AAron Walters Nick L. Petroni, Jr. Komoku, Inc.

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2015-05-28 15:51:25
12Computing / Unified Extensible Firmware Interface / Advanced Configuration and Power Interface / Rootkit / System Management Mode / Firmware / PCI configuration space / Option ROM / Booting / BIOS / System software / Computer hardware

Acquisition and Analysis of Compromised Firmware Using Memory Forensics Johannes Stüttgen, Stefan Voemel and Michael Denzel

Add to Reading List

Source URL: www.dfrws.org

Language: English - Date: 2015-03-31 11:50:18
13Computer security / Denial-of-service attack / Vulnerability / Attack / Malware / Cross-site scripting / Windows / Firefox / Cyberwarfare / Software / Computer network security

Infrastructure Security 1. Infrastructure Security Forward Secrecy In this report, we discuss points to note regarding memory forensics for devices equipped with large amounts

Add to Reading List

Source URL: www.iij.ad.jp

Language: English - Date: 2014-03-27 22:27:18
14Computing / System software / Anti-computer forensics / Digital forensics / Rootkit / Memory-mapped file / Data remanence / Computer virus / Paging / Computer security / Virtual memory / Computer forensics

Physical Memory Forensics Mariusz Burdach Overview • •

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:36
15Forensic science / Acquisition / Android / Computer security / Software / Digital forensics / Computing / Global Information Assurance Certification

Android Mind Reading: Memory Acquisition and Analysis with DMD and Volatility Joe Sylve [removed] @jtsylve

Add to Reading List

Source URL: www.shmoocon.org

Language: English - Date: 2012-01-29 17:34:01
16SCSI / Acquisition / Computer forensics / Booting / Computer memory / Computing / Computer architecture / Information technology audit / Ethernet / ISCSI

E103: Live Forensics & Incident Response (Featuring Helix3 Pro) Intermediate Level Course 2-Day Syllabus This course provides students with the knowledge and skills necessary to begin a computer-based investigation. Stud

Add to Reading List

Source URL: www.e-fense.com

Language: English - Date: 2010-09-10 12:55:26
17Computer memory / Digital forensics / Information technology audit / Computer forensics / Acquisition

Helix3 Pro Live Forensics 1-Day Online Course Syllabus This course provides students with the knowledge and skills necessary to begin a computer-based investigation using Helix3 Pro. Students will hear lectures regarding

Add to Reading List

Source URL: www.e-fense.com

Language: English - Date: 2010-09-10 12:55:19
18Computer storage media / Non-volatile memory / Computer memory / Digital forensics / Data management / Data recovery / Solid-state drive / Hard disk drive / USB flash drive / Computer hardware / Computing / Information

Microsoft Word - JDFSL-V5N3-cover-proofreprint - Bell.doc

Add to Reading List

Source URL: web.archive.org

Language: English
19Digital forensics / Computer forensics / Malware / Rootkit / Operating system / Computer memory / Core dump / Disk formatting / The Sleuth Kit / Computing / System software / Computer security

Chapter | 1 Linux Malware Incident Response 5

Add to Reading List

Source URL: cdn.ttgtmedia.com

Language: English - Date: 2014-02-21 16:19:04
20Dump / Computing / System software / Software / Windows Registry

Microsoft Word - Memory Forensics Cheat Sheet v1_2.docx

Add to Reading List

Source URL: digital-forensics.sans.org

Language: English - Date: 2014-03-21 11:17:19
UPDATE