共 17 条
- [1] ALICIA F, ALASTAIR N., Forensic analysis and data recovery from water-submerged hard drives, International Journal of Electronic Security and Digital Forensics, 13, 2, pp. 219-231, (2020)
- [2] ZOLLNER S, CHOO K R, LE-KHAC N, Et al., An automated live forensic and postmortem analysis tool for bitcoin on windows systems, IEEE Access, 7, pp. 158250-158263, (2019)
- [3] DIOGO B, TIAGO B, DAVID D, Et al., Forensic analysis of communication records of messaging applications from physical memory, Computers and Security, 86, pp. 484-497, (2019)
- [4] ZHANG Yu, LIU Qingzhong, LI Tao, Et al., Research and development of memory forensics, Journal of Software, 26, 5, pp. 1151-1172, (2015)
- [5] ZHAI Jiqiang, XIAO Yajun, YANG Hailu, Et al., Object scanning of Windows kernel driver based on pool tag quick scanning, Journal of Northwestern Polytechnical University, 37, 5, pp. 1044-1052, (2019)
- [6] CHEN Zhifeng, LI Qingbao, ZHANG Ping, Et al., Kernel integrity measurement method based on memory forensic, Journal of Software, 27, 9, pp. 2443-2458, (2016)
- [7] AKABANE S, MIWA T, OKAMOTO T., An EAF guard driver to prevent shellcode from removing guard pages, Procedia Computer Science, 159, pp. 2432-2439, (2019)
- [8] YU Yongbin, YU Wenjian, MO Jiehong, Et al., Research on detection of dynamic link library injected by static modifying import table of portable executable file, Journal of University of Electronic Science and Technology of China, 49, 6, pp. 854-859, (2020)
- [9] GAVITT D., The VAD tree: a process-eye view of physical memory, Digital Investigation, 4, pp. 62-64, (2007)
- [10] WHITE A, SCHATZ B, FOO E., Surveying the user space through user allocations, Digital Investigation, 9, pp. 3-12, (2012)