155 results on '"Freiling, Felix"'
Search Results
2. Key extraction-based lawful access to encrypted data: Taxonomy and survey
3. In the time loop: Data remanence in main memory of virtual machines
4. Beyond timestamps: Integrating implicit timing information into digital forensic timelines
5. Grand theft API: A forensic analysis of vehicle cloud data
6. Contamination of digital evidence: Understanding an underexposed risk
7. Foundations of cybercriminalistics: From general process models to case-specific concretizations in cybercrime investigations
8. Ambiguous file system partitions
9. Prudent design principles for digital tampering experiments
10. Towards GDPR-compliant data processing in modern SIEM systems
11. Unifying Metadata-Based Storage Reconstruction and Carving with LAYR
12. Tampering with Digital Evidence is Hard: The Case of Main Memory Images
13. BMCLeech: Introducing Stealthy Memory Forensics to BMC
14. Towards Open-Set Forensic Source Grouping on JPEG Header Information
15. Forensic source identification using JPEG image headers: The case of smartphones
16. A universal taxonomy and survey of forensic memory acquisition techniques
17. A standardized corpus for SQLite database forensics
18. Styx: Countering robust memory acquisition
19. Controlled experiments in digital evidence tampering
20. Characterizing loss of digital evidence due to abstraction layers
21. Do digital investigators have to program? A controlled experiment in digital investigation
22. Evaluating atomicity, and integrity of correct memory acquisition methods
23. Lest we forget: Cold-boot attacks on scrambled DDR3 memory
24. As if Time Had Stopped -- Checking Memory Dumps for Quasi-Instantaneous Consistency
25. An Experimental Assessment of Inconsistencies in Memory Forensics.
26. Secure garbage collection: Preventing malicious data harvesting from deallocated Java objects inside the Dalvik VM
27. Stark : Tamperproof Authentication to Resist Keylogging
28. TreVisor : OS-Independent Software-Based Full Disk Encryption Secure against Main Memory Attacks
29. LAVA: Log Authentication and Verification Algorithm.
30. A Functional Classification of Forensic Access to Storage and its Legal Implications.
31. Correctness, atomicity, and integrity: Defining criteria for forensically-sound memory acquisition
32. Defining Atomicity (and Integrity) for Snapshots of Storage in Forensic Computing
33. A survey of main memory acquisition and analysis techniques for the windows operating system
34. Proceedings of the 2022 Joint Workshop of the German Research Training Groups in Computer Science
35. Invasives Rechnen
36. 5.-8. April 2022
37. A Comparison of Cloud Storage Technologies as Sources of Digital Evidence
38. Selective Imaging of File System Data on Live Systems
39. Safe termination detection in an asynchronous distributed system when processes may crash and recover
40. LAVA: Log Authentication and Verification Algorithm
41. Unified Representation of Log Files for Correlation and Visualization
42. On the Feasibility of Secure Logging for Industrial Control Systems Using Blockchain.
43. Achieving Consistency of Software Updates against Strong Attackers.
44. A framework for probabilistic, authentic aggregation in wireless sensor networks
45. DiOS: Dynamic Privacy Analysis of iOS Applications
46. From Computer Forensics to Forensic Computing: Investigators Investigate, Scientists Associate
47. Measurements and mitigation of peer-to-peer-based botnets: a case study on storm wor
48. Forensic Computing (Dagstuhl Seminar 13482)
49. Usability vs. Security: The Everlasting Trade-Off in the Context of Apple iOS Mobile Hotspots
50. Hardware-Based Trusted Computing Architectures for Isolation and Attestation.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.