default search action
Digital Investigation, Volume 18 Supplement
Volume 18 Supplement, August 2016
- Andrew Case, Golden G. Richard III:
Detecting objective-C malware through memory forensics. S3-S10 - Saed Alrabaee, Lingyu Wang, Mourad Debbabi:
BinGold: Towards robust binary analysis by extracting the semantics of binary code as semantic flow graphs (SFGs). S11-S22 - Kyoungho Lee, Hyunuk Hwang, Kibom Kim, BongNam Noh:
Robust bootstrapping memory analysis against anti-forensics. S23-S32 - ElMouatez Billah Karbab, Mourad Debbabi, Djedjiga Mouheb:
Fingerprinting Android packaging: Generating DNAs for malware detection. S33-S45 - Mark D. Guido, Jonathan Buttner, Justin Grover:
Rapid differential forensic imaging of mobile devices. S46-S54 - Mike Mabey, Adam Doupé, Ziming Zhao, Gail-Joon Ahn:
dbling: Identifying extensions installed on encrypted web thin clients. S55-S65 - Kevin J. Conlan, Ibrahim M. Baggili, Frank Breitinger:
Anti-forensics: Furthering digital forensic science through a new extended, granular taxonomy. S66-S75 - Sebastian Neuner, Artemios G. Voyiatzis, Martin Schmiedecker, Stefan Brunthaler, Stefan Katzenbeisser, Edgar R. Weippl:
Time is on my side: Steganography in filesystem metadata. S76-S86 - Christopher Meffert, Ibrahim M. Baggili, Frank Breitinger:
Deleting collected digital evidence by exploiting a widely adopted hardware write blocker. S87-S96 - James Wagner, Alexander Rasin, Jonathan Grier:
Database image content explorer: Carving data that does not officially exist. S97-S107 - Yanbin Tang, Junbin Fang, Kam-Pui Chow, Siu-Ming Yiu, Jun Xu, Bo Feng, Qiong Li, Qi Han:
Recovery of heavily fragmented JPEG files. S108-S117 - Jeonghyeon Kim, Aran Park, Sangjin Lee:
Recovery method of deleted records and tables from ESE database. S118-S124 - Vikram S. Harichandran, Daniel Walnycky, Ibrahim M. Baggili, Frank Breitinger:
CuFA: A more formal definition for digital forensic artifacts. S125-S137 - Jay Koven, Enrico Bertini, R. Luke DuBois, Nasir D. Memon:
InVEST: Intelligent visual email search and triage. S138-S148 - Sebastian Neuner, Martin Schmiedecker, Edgar R. Weippl:
PeekaTorrent: Leveraging P2P hash values for digital forensics. S149-S156 - Niall McGrath:
Forensically extracting file encrypted contents on OS X using HFS+ journal file. S157
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.