Author of the publication

Introducing the Temporal Dimension to Memory Forensics.

, , and . ACM Trans. Priv. Secur., 22 (2): 9:1-9:21 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Introducing the Temporal Dimension to Memory Forensics., , and . ACM Trans. Priv. Secur., 22 (2): 9:1-9:21 (2019)Let Me Unwind That For You: Exceptions to Backward-Edge Protection., , , , and . NDSS, The Internet Society, (2023)Toss a Fault to Your Witcher: Applying Grey-box Coverage-Guided Mutational Fuzzing to Detect SQL and Command Injection Vulnerabilities., , , , , , , , , and . SP, page 2658-2675. IEEE, (2023)AutoProfile: Towards Automated Profile Generation for Memory Analysis., and . ACM Trans. Priv. Secur., 25 (1): 6:1-6:26 (2022)Advances in memory forensics. (Progrés dans l'investigation forensique de la mémoire volatile).. Sorbonne University, France, (2019)Back to the Whiteboard: a Principled Approach for the Assessment and Design of Memory Forensic Techniques., and . USENIX Security Symposium, page 1751-1768. USENIX Association, (2019)Beyond Precision and Recall: Understanding Uses (and Misuses) of Similarity Hashes in Binary Analysis., , and . CODASPY, page 354-365. ACM, (2018)Decomperson: How Humans Decompile and What We Can Learn From It., , , and . USENIX Security Symposium, page 2765-2782. USENIX Association, (2022)When hardware meets software: a bulletproof solution to forensic memory acquisition., , , , and . ACSAC, page 79-88. ACM, (2012)Measuring the Role of Greylisting and Nolisting in Fighting Spam., , , , and . DSN, page 562-571. IEEE Computer Society, (2016)