Author of the publication

Memory FORESHADOW: Memory FOREnSics of HArDware CryptOcurrency wallets - A Tool and Visualization Framework.

, , , and . Digit. Investig., (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Research Trends in Digital Forensic Science: An Empirical Analysis of Published Research., , , and . ICDF2C, volume 114 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 144-157. Springer, (2012)Computer Profiling for Preliminary Forensic Examination., , and . ICDF2C, volume 132 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 207-220. Springer, (2013)Testing the forensic soundness of forensic examination environments on bootable media., , , and . Digit. Investig., 11 (Supplement 2): S22-S29 (2014)Forensicast: A Non-intrusive Approach & Tool For Logical Forensic Acquisition & Analysis of The Google Chromecast TV., , and . ARES, page 50:1-50:12. ACM, (2021)If I Had a Million Cryptos: Cryptowallet Application Analysis and a Trojan Proof-of-Concept., , and . ICDF2C, volume 259 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 45-65. Springer, (2018)AndroParse - An Android Feature Extraction Framework and Dataset., , and . ICDF2C, volume 259 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 66-88. Springer, (2018)Forensic State Acquisition from Internet of Things (FSAIoT): A general framework and practical approach for IoT forensics through IoT device state acquisition., , , and . ARES, page 56:1-56:11. ACM, (2017)Cybercrime, Censorship, Perception and Bypassing Controls: An Exploratory Study., , , and . ICDF2C, volume 114 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 91-108. Springer, (2012)Map My Murder: A Digital Forensic Study of Mobile Health and Fitness Applications., , , and . ARES, page 42:1-42:12. ACM, (2019)Amazon Kindle Fire HD Forensics., , , and . ICDF2C, volume 132 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 39-50. Springer, (2013)