top of page

Sampling: 

2018 Taking Memory Forensics to the Next Level

2015  Forensic Focus Interview

2013  Every Step You Take: Profiling the System

2012  Reconstructing the MBR and MFT from Memory

2011  Time is on My Side

2010  Red Hat Crash Memory Forensics, Into the Boxes

2014 The Art of Memory Forensics, 

        Michael Ligh, Andrew Case, Jamie Levy, AAron Walters

2009   Using a Secure Permutational Covert Channel to Detect Local and Wide Area Interposition Attacks

2008   Superimposing Permutational Covert Channels onto Reliable Stream Protocols

2007   Hiding Your Wares: Transparently Retrofitting Memory Confidentiality into Legacy Applications

Whitepapers / Presentations / Articles
Academic Publications / Books

PUBLICATIONS

bottom of page