2016
DOI: 10.1016/j.diin.2016.01.005
|View full text |Cite
|
Sign up to set email alerts
|

Pool tag quick scanning for windows memory analysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(2 citation statements)
references
References 2 publications
0
2
0
Order By: Relevance
“…To acquire memory [15], Hargreaves and Chivers proposed a method for recovering the decryption keys from the memory using linear scan [28]. Sylve et al proposed a novel technique for locating kernel object allocations with quick pool tag scanning [17], which has a good performance in the large memory space. Taubmann et al presented TLSkex which can extract the master key of a TLS connection at runtime from the virtual machine's memory.…”
Section: Memory Forensicsmentioning
confidence: 99%
See 1 more Smart Citation
“…To acquire memory [15], Hargreaves and Chivers proposed a method for recovering the decryption keys from the memory using linear scan [28]. Sylve et al proposed a novel technique for locating kernel object allocations with quick pool tag scanning [17], which has a good performance in the large memory space. Taubmann et al presented TLSkex which can extract the master key of a TLS connection at runtime from the virtual machine's memory.…”
Section: Memory Forensicsmentioning
confidence: 99%
“…Malware such as Qadars [1] and Lurk [2] can steal the banking information from the memory. In the field of memory forensics, much research has been done on memory data analysis and thus produced many practical results [15][16][17][18], such as the open source Volatility Framework [19]. On the other hand, some researches aim at process memory data protection [20,21] but failed to carry 2 Security and Communication Networks out large-scale deployment.…”
Section: Introductionmentioning
confidence: 99%