2021 International Conference on COMmunication Systems &Amp; NETworkS (COMSNETS) 2021
DOI: 10.1109/comsnets51098.2021.9352935
|View full text |Cite
|
Sign up to set email alerts
|

Evading DoH via Live Memory Forensics for Phishing Detection and Content Filtering

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 8 publications
0
4
0
Order By: Relevance
“…When an e-mail is transmitted, it contains the source, content, actual sender and recipient information, date/time, protocols, and server information. E-mail forensics is the process of collecting evidence from e-mails, as e-mail is an electronic communication over the internet that carries messages to deliver files, documents, and other transaction items [42]. It can be an e-mail service, a webmail, or a local mailbox [43], [44].…”
Section: E-mail Forensic Analysismentioning
confidence: 99%
“…When an e-mail is transmitted, it contains the source, content, actual sender and recipient information, date/time, protocols, and server information. E-mail forensics is the process of collecting evidence from e-mails, as e-mail is an electronic communication over the internet that carries messages to deliver files, documents, and other transaction items [42]. It can be an e-mail service, a webmail, or a local mailbox [43], [44].…”
Section: E-mail Forensic Analysismentioning
confidence: 99%
“…[78]. RAM allows accessing data in such a way to produce transparent information, which could not be possible otherwise [79], [80]. This can help to reveal hidden processes, malware trying to hide information, toolkits.…”
Section: B File System Forensicsmentioning
confidence: 99%
“…A few years back, digital forensics procedures were mainly based on Static analysis of the system. The typical step to perform static analysis was "pulling the plug" so that information on the disk does not change [121], [80]. With the advancement of technology (i.e., the increased storage capacity of the disk, etc.)…”
Section: ) Live Memory Forensicsmentioning
confidence: 99%
“…In addition to profiling the user behaviors by analyzing encrypted DNS traffic on the network, G. Varshney et al [112] showed that how they can obtain DoH lookups before they get encrypted by passively monitoring the RAM usage on the client devices. Although it provides an opportunity for organizations to reinforce their security measures leveraging DNS content inspection, malicious actors can also utilize this method to violate user privacy which is assumed to be well protected by DNS encryption.…”
Section: Profiling User Activity By Analyzing Encrypted Dns Trafficmentioning
confidence: 99%