OS X provides a password-rich environment in which passwords protect OS X resources and perhaps many other resources accessed through OS X. Every password an investigator discovers in an OS X environment has the potential for use in discovering other such passwords, and any discovered passwords may also be useful in other aspects of an investigation, not directly related to the OS X environment. This research advises the use of multiple attack vectors in approaching the password problem in an OS X system, including the more generally applicable non-OS X-specific techniques such as social engineering or well-known password cracking techniques such as John the Ripper or other versions of dictionary attacks and Rainbow table attacks. In some s...
Abstract—When it comes to security risks, especially malware, Mac OS X has the questionable reputati...
Passwords, particularly text-based, are the most common authentication mechanisms across all platfor...
Full disk encryption (FDE) is used to protect a computer system against data theft by physical acces...
OS X provides a password-rich environment in which passwords protect OS X resources and perhaps many...
Kernel level malware Digital forensics Incident response a b s t r a c t In the last few years there...
This paper appeared in the Proceedings of the 9th EAI International Conference on Digital Forensics ...
The computer operating systems and applications we use today have often evolved over many years, dec...
AbstractIn the last few years there has been a sharp increase in the use of Mac OS X systems in prof...
This paper describes procedures for conducting forensic examinations of Apple Macs running Mac OS X....
Various hostile applets were developed as part of this research to study the effects of hostile appl...
This paper describes procedures for conducting forensic examinations of Apple Macs running Mac OS X....
The emergence of Apple’s Macintosh computers’ popularity introduces new threats and challenges for t...
AbstractMajor advances in memory forensics in the past decade now allow investigators to efficiently...
This master thesis deals with ways to store passwords in current operating systems. Specifically, th...
Memory acquisition is essential to defeat anti-forensic operating-system features and investigate cy...
Abstract—When it comes to security risks, especially malware, Mac OS X has the questionable reputati...
Passwords, particularly text-based, are the most common authentication mechanisms across all platfor...
Full disk encryption (FDE) is used to protect a computer system against data theft by physical acces...
OS X provides a password-rich environment in which passwords protect OS X resources and perhaps many...
Kernel level malware Digital forensics Incident response a b s t r a c t In the last few years there...
This paper appeared in the Proceedings of the 9th EAI International Conference on Digital Forensics ...
The computer operating systems and applications we use today have often evolved over many years, dec...
AbstractIn the last few years there has been a sharp increase in the use of Mac OS X systems in prof...
This paper describes procedures for conducting forensic examinations of Apple Macs running Mac OS X....
Various hostile applets were developed as part of this research to study the effects of hostile appl...
This paper describes procedures for conducting forensic examinations of Apple Macs running Mac OS X....
The emergence of Apple’s Macintosh computers’ popularity introduces new threats and challenges for t...
AbstractMajor advances in memory forensics in the past decade now allow investigators to efficiently...
This master thesis deals with ways to store passwords in current operating systems. Specifically, th...
Memory acquisition is essential to defeat anti-forensic operating-system features and investigate cy...
Abstract—When it comes to security risks, especially malware, Mac OS X has the questionable reputati...
Passwords, particularly text-based, are the most common authentication mechanisms across all platfor...
Full disk encryption (FDE) is used to protect a computer system against data theft by physical acces...