2022
DOI: 10.1007/978-3-031-08530-7_44
|View full text |Cite
|
Sign up to set email alerts
|

Detection of Anti-forensics and Malware Applications in Volatile Memory Acquisition

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 22 publications
0
1
0
Order By: Relevance
“…1.1.4 Malware Distribution: Some phishing attacks may also involve the distribution of malware. Clicking on a malicious link or downloading an attachment from a phishing email can infect the user's device with malware, which can then steal data or take control of the device [10].…”
Section: Information Collectionmentioning
confidence: 99%
“…1.1.4 Malware Distribution: Some phishing attacks may also involve the distribution of malware. Clicking on a malicious link or downloading an attachment from a phishing email can infect the user's device with malware, which can then steal data or take control of the device [10].…”
Section: Information Collectionmentioning
confidence: 99%
“…Anti-forensics and Malware 7 [19,[215][216][217][218][219][220] Authors such us I. You et al [215] discuss the anti-forensic aspect of obfuscation as applied to malware.…”
Section: Anti-forensics and Malware Number Of Studies Referencesmentioning
confidence: 99%
“…Ratcliffe et al [217] bring together anti-forensic techniques and malware on the same level when explaining how to detect malware in RAM.…”
Section: Anti-forensics and Malware Number Of Studies Referencesmentioning
confidence: 99%
See 1 more Smart Citation