As malware continues to evolve, infection mechanisms that can only be seen in memory are increasingly commonplace. These techniques evade traditional forensic analysis, requiring the use of memory forensics. Memory forensics allows for the recovery of historical data created by running malware, including information that it tries to hide. Memory analysis capabilities have lagged behind on Apple\u27s new M1 architecture while the number of malicious programs only grows. To make matters worse, Apple has developed Rosetta 2, the translation layer for running x86_64 binaries on an M1 Mac. As a result, all malware compiled for Intel Macs is theoretically functional on M1 machines. In this paper, malware will be executed through the Rosetta 2 tra...
Increasingly complex malware continues to evade detection, stealing information, taking systems offl...
Abstract—When it comes to security risks, especially malware, Mac OS X has the questionable reputati...
AbstractIn the last few years there has been a sharp increase in the use of Mac OS X systems in prof...
Malware threats are rapidly evolving to use more sophisticated attacks. By abusing rich application ...
Memory forensics allows an investigator to get a full picture of what is occurring on-device at the ...
Memory forensics has become a powerful tool for the detection and analysis of malicious software. It...
The continued increase in the use of computer systems in recent times has led to a significant rise ...
This paper appeared in the Proceedings of the 9th EAI International Conference on Digital Forensics ...
AbstractMajor advances in memory forensics in the past decade now allow investigators to efficiently...
A shortened version of this paper appeared in the Proceedings of the Ninth EAI International Confere...
Kernel level malware Digital forensics Incident response a b s t r a c t In the last few years there...
The emergence of Apple’s Macintosh computers’ popularity introduces new threats and challenges for t...
An important area for forensic investigations is live memory analysis captured from a running machin...
This paper describes procedures for conducting forensic examinations of Apple Macs running Mac OS X....
This paper describes procedures for conducting forensic examinations of Apple Macs running Mac OS X....
Increasingly complex malware continues to evade detection, stealing information, taking systems offl...
Abstract—When it comes to security risks, especially malware, Mac OS X has the questionable reputati...
AbstractIn the last few years there has been a sharp increase in the use of Mac OS X systems in prof...
Malware threats are rapidly evolving to use more sophisticated attacks. By abusing rich application ...
Memory forensics allows an investigator to get a full picture of what is occurring on-device at the ...
Memory forensics has become a powerful tool for the detection and analysis of malicious software. It...
The continued increase in the use of computer systems in recent times has led to a significant rise ...
This paper appeared in the Proceedings of the 9th EAI International Conference on Digital Forensics ...
AbstractMajor advances in memory forensics in the past decade now allow investigators to efficiently...
A shortened version of this paper appeared in the Proceedings of the Ninth EAI International Confere...
Kernel level malware Digital forensics Incident response a b s t r a c t In the last few years there...
The emergence of Apple’s Macintosh computers’ popularity introduces new threats and challenges for t...
An important area for forensic investigations is live memory analysis captured from a running machin...
This paper describes procedures for conducting forensic examinations of Apple Macs running Mac OS X....
This paper describes procedures for conducting forensic examinations of Apple Macs running Mac OS X....
Increasingly complex malware continues to evade detection, stealing information, taking systems offl...
Abstract—When it comes to security risks, especially malware, Mac OS X has the questionable reputati...
AbstractIn the last few years there has been a sharp increase in the use of Mac OS X systems in prof...