Back to Results
First PageMeta Content
Xen / Hardware virtualization / Hypervisor / Hyper-V / Virtualization / Rootkit / Page table / Kernel / OpenVZ / System software / Software / Virtual machines


Trail of Bytes: Efficient Support for Forensic Analysis Srinivas Krishnan Kevin Snow Fabian Monrose
Add to Reading List

Document Date: 2014-09-05 15:38:44


Open Document

File Size: 688,97 KB

Share Result on Facebook

City

Chicago / Hypervisor / Virtualization / /

Company

Amazon / E. On / Intel / Microsoft / Table / /

Country

United States / /

Currency

USD / /

/

Facility

Chapel Hill Dept. / Chapel Hill / Computer Science University of North Carolina / Trail of Bytes / /

IndustryTerm

block devices / public network / invasive software / communications security / secure systems / hypervisor technologies / Internet Explorer password caches / social-networking websites / concurrent applications / Internet Miscreants / copy-onwrite solution / info stealer info stealer info stealer installer installer / proof-of-concept forensic tool / illicit applications / forensic tool / file-systems / installer installer installer installer / proof-of-concept tool / physical memory and hardware / /

NaturalFeature

Chapel Hill / /

OperatingSystem

BSD / Windows XP / Linux / Microsoft Windows / /

Organization

National Science Foundation / University of North Carolina / /

Person

Srinivas Krishnan Kevin Snow Fabian Monrose / /

Position

aide / King / system administrator / security analyst / forensic analyst / Farmer / malware analyst / text editor / administrator / first author for more information on obtaining the software / analyst / second author / logging and recovery General / /

Product

IOMeter / Franklin / Snort / /

ProgrammingLanguage

AutoIt / /

ProvinceOrState

Manitoba / Illinois / /

PublishedMedium

Communications of the ACM / /

Technology

virtual machine / Linux / http / hypervisor technologies / virtual memory / operating system / shared memory / operating systems / disk cache / /

SocialTag