The hard disk drive stores data the user is creating, modifying, and deleting while a firmware facilitates communication between the drive and the operating system. The firmware tells the device and machine how to communicate with each other and will share useful information such as, disk size and information on any bad sectors. Current research shows that exploits exist that can manipulate these outputs. As an attacker, you can change the size of the disk displayed to the operating system to hide data in, likewise by marking an area of the disk as bad. Users may not be aware of these changes as the operating system will accept the readings from the firmware. However, although the data is not reachable via the operating system this paper lo...
In today’s interconnected world, malware, such as worms and viruses, can cause havoc. A malware dete...
In this paper obfuscation techniques used by novel malwares presented and compared. IAT smashing, st...
Data in digital form is considered one of the most valuable assets. Digital data may pertain to fina...
The hard disk drive stores data the user is creating, modifying, and deleting while a firmware facil...
The most common form of storage media utilized in both commercial and domestic systems is the hard d...
<p class="JDFSLParagraph">The hard disk drive is probably the predominant form of storage media and ...
AbstractTo a great degree, research in memory forensics concentrates on the acquisition and analysis...
User equipment (UE), such as smartphones, notebooks, laptops, and the like, require protection from ...
AbstractIn this primary work we call for the importance of integrating security testing into the pro...
Abstract: Computer Forensic Tools (CFTs) allow investigators to recover deleted files, reconstruct a...
Cyber-crime is becoming more widespread every day, and hackers are hitting organizations' IT infrast...
Criminals who use computers to commit crimes often hide the fruits of the commission of those crimes...
Modern workstations and servers implicitly trust hard disks to act as well-behaved block devices. Th...
Modern workstations and servers implicitly trust hard disks to act as well-behaved block devices. Th...
Unauthorized data destruction results in a loss of digital information and services, a devastating i...
In today’s interconnected world, malware, such as worms and viruses, can cause havoc. A malware dete...
In this paper obfuscation techniques used by novel malwares presented and compared. IAT smashing, st...
Data in digital form is considered one of the most valuable assets. Digital data may pertain to fina...
The hard disk drive stores data the user is creating, modifying, and deleting while a firmware facil...
The most common form of storage media utilized in both commercial and domestic systems is the hard d...
<p class="JDFSLParagraph">The hard disk drive is probably the predominant form of storage media and ...
AbstractTo a great degree, research in memory forensics concentrates on the acquisition and analysis...
User equipment (UE), such as smartphones, notebooks, laptops, and the like, require protection from ...
AbstractIn this primary work we call for the importance of integrating security testing into the pro...
Abstract: Computer Forensic Tools (CFTs) allow investigators to recover deleted files, reconstruct a...
Cyber-crime is becoming more widespread every day, and hackers are hitting organizations' IT infrast...
Criminals who use computers to commit crimes often hide the fruits of the commission of those crimes...
Modern workstations and servers implicitly trust hard disks to act as well-behaved block devices. Th...
Modern workstations and servers implicitly trust hard disks to act as well-behaved block devices. Th...
Unauthorized data destruction results in a loss of digital information and services, a devastating i...
In today’s interconnected world, malware, such as worms and viruses, can cause havoc. A malware dete...
In this paper obfuscation techniques used by novel malwares presented and compared. IAT smashing, st...
Data in digital form is considered one of the most valuable assets. Digital data may pertain to fina...