Malware is a growing concern that not only affects large businesses but the basic consumer as well. As a result, there is a need to develop tools that can identify the malicious activities of malware authors. A useful technique to achieve this is memory forensics. Memory forensics is the study of volatile data and its structures in Random Access Memory (RAM). It can be utilized to pinpoint what actions have occurred on a computer system. This dissertation utilizes memory forensics to extract relationships between objects and supervised machine learning as a novel method for identifying malicious processes in a system memory dump. In this work, the Object Association Extractor (OAE) was created to extract objects in a memory dump and label t...
Volatile memory dump and its analysis is an essential part of digital forensics. Among a number of v...
Forensics from volatile memory plays an important role in the investigation of cyber crime. The acqu...
Despite efforts to mitigate the malware threat, the proliferation of malware continues, with record-...
Memory forensics is an important tool in the hands of investigators. However, determining if a compu...
Increasingly complex malware continues to evade detection, stealing information, taking systems offl...
The continued increase in the use of computer systems in recent times has led to a significant rise ...
With the increasing prevalence and sophistication of malware, there is an urgent need for effective ...
The growth of digital technology spawns both positive and negative effects. Cybercrimes rise with th...
Malicious software (malware) causes increasingly devastating social and financial losses each year. ...
This project aims to present the functionality and accuracy of five different machine learning algor...
The opportunity for potential attackers to use more advanced techniques to exploit more people who a...
Malicious software (malware) has become a prominent fixture in computing. There have been many metho...
The emerging techniques in volatile memory acquisition and analysis are ideally suited to malware an...
The massive growth of computer usage has led to an increase in the related security concerns. Malwar...
In the realm of modern technology, malware has become a paramount concern. Defined as any software d...
Volatile memory dump and its analysis is an essential part of digital forensics. Among a number of v...
Forensics from volatile memory plays an important role in the investigation of cyber crime. The acqu...
Despite efforts to mitigate the malware threat, the proliferation of malware continues, with record-...
Memory forensics is an important tool in the hands of investigators. However, determining if a compu...
Increasingly complex malware continues to evade detection, stealing information, taking systems offl...
The continued increase in the use of computer systems in recent times has led to a significant rise ...
With the increasing prevalence and sophistication of malware, there is an urgent need for effective ...
The growth of digital technology spawns both positive and negative effects. Cybercrimes rise with th...
Malicious software (malware) causes increasingly devastating social and financial losses each year. ...
This project aims to present the functionality and accuracy of five different machine learning algor...
The opportunity for potential attackers to use more advanced techniques to exploit more people who a...
Malicious software (malware) has become a prominent fixture in computing. There have been many metho...
The emerging techniques in volatile memory acquisition and analysis are ideally suited to malware an...
The massive growth of computer usage has led to an increase in the related security concerns. Malwar...
In the realm of modern technology, malware has become a paramount concern. Defined as any software d...
Volatile memory dump and its analysis is an essential part of digital forensics. Among a number of v...
Forensics from volatile memory plays an important role in the investigation of cyber crime. The acqu...
Despite efforts to mitigate the malware threat, the proliferation of malware continues, with record-...