Zobrazeno 1 - 10
of 23
pro vyhledávání: '"Andreas Dewald"'
Autor:
Jan Gerrit Göbel, Andreas Dewald
With the increasing resilience of operating systems towards automated attacks, the application layer has come into the focus of criminals. Specially prepared websites in the World Wide Web compromise visitors by exploiting vulnerabilities in web brow
Autor:
Andreas Dewald, Frank Block
Publikováno v:
Digital Investigation. 29:S3-S12
Malware utilizes code injection techniques to either manipulate other processes (e.g. done by banking trojans) or hide its existence. With some exceptions, such as ROP gadgets, the injected code needs to be executable by the CPU (at least at some poi
Autor:
Andreas Dewald, Florian Hantke
Publikováno v:
EuroS&P Workshops
The use of Internet of Things devices is continuously increasing: People buy devices to make their lives more comfortable by using smart assistants or track sports activities and assess them. Moreover, these devices can sup-port digital investigators
Autor:
Andreas Dewald, Frank Block
Publikováno v:
Digital Investigation. 22:S66-S75
The analysis of memory during a forensic investigation is often an important step to reconstruct events. While prior work in this field has mostly concentrated on information residing in the kernel space (process lists, network connections, and so on
Autor:
Andreas Dewald, Sabine Seufert
Publikováno v:
Digital Investigation. 20:S83-S91
In forensic computing, especially in the field of postmortem file system forensics, the reconstruction of lost or deleted files plays a major role. The techniques that can be applied to this end strongly depend on the specifics of the file system in
Publikováno v:
Digital Investigation. 16:S44-S54
RAIDs (Redundant Array of Independent Disks) are widely used in storage systems to prevent data loss in case of hardware defects on a hard disk and to improve I/O performance. In case the RAID controller fails or in the context of a forensic investig
Autor:
Andreas Dewald
Publikováno v:
IMF
With the ever increasing number of crimes in which computers or other digital devices are used, digital forensics plays an increasingly important role in today's jurisdiction. The acquisition and investigation of the devices is done by forensic exper
Publikováno v:
Forensic Science International: Digital Investigation. 32:300915
ReFS is a modern file system that is developed by Microsoft and its internal structures and behavior is not officially documented. Even so there exist some analysis efforts in deciphering its data structures, some of these findings have yet become de
Autor:
Andreas Dewald, Jonas Plum
Publikováno v:
ARES
In forensic computing, especially in the field of postmortem file system forensics, the reconstruction of lost or deleted files plays a major role. The techniques that can be applied to this end strongly depend on the specifics of the file system in
Publikováno v:
2018 11th International Conference on IT Security Incident Management & IT Forensics (IMF).
The field of memory forensics is getting more important in forensic investigations for obtaining valuable data of a running system. Besides kernel artifacts, there might be also plenty of interesting data in the heap of a user space process, but unfo