top of page
Sampling:
2018 Taking Memory Forensics to the Next Level
2013 Every Step You Take: Profiling the System
2012 Reconstructing the MBR and MFT from Memory
2011 Time is on My Side
2010 Red Hat Crash Memory Forensics, Into the Boxes
2014 The Art of Memory Forensics,
Michael Ligh, Andrew Case, Jamie Levy, AAron Walters
2009 Using a Secure Permutational Covert Channel to Detect Local and Wide Area Interposition Attacks
2008 Superimposing Permutational Covert Channels onto Reliable Stream Protocols
2007 Hiding Your Wares: Transparently Retrofitting Memory Confidentiality into Legacy Applications
Whitepapers / Presentations / Articles
Academic Publications / Books
PUBLICATIONS
bottom of page