Recent Papers
- A. Ali-Gombe, S. Sudhakaran, R. Vijayakanthan G. G. Richard III, "RGB Mem: At the
Intersection of Memory Forensics and Machine Learning," Proceedings of the 2023 Digital
Forensics Research Conference (DFRWS 2023), July 2023.
- L. Pace, L. Salmon, C. Bowen, I. Baggili. G. G. Richard III, "Every Step You Take,
I'll be Tracking You: Forensic Analysis of the Tile Tracker Application," Proceedings of the 2023 Digital Forensics Research Conference (DFRWS 2023), July 2023.
- A. Case, G. Moreira, A. Sellers, G. G. Richard III, "New Memory Forensics Techniques
to Defeat Device Monitoring Malware," Blackhat USA 2022, August 2022, Las Vegas.
- M. Manna, A. Case, A. Ali-Gombe, G. G. Richard III, "Memory Analysis of .NET and .Net
Core Applications," Proceedings of the 2022 Digital Forensics Research Conference (DFRWS), July 2022, virtual.
- S. Sudhakaran, A. Ali-Gombe, A. Case, G. G. Richard III, "Evaluating the Reliability
of Android Userland Memory Forensics," Proceedings of the International Conference on Cyber Warfare and Security, 2022.
- A. Case, G. G. Richard III, "Fixing a Memory Forensics Blind Spot: Linux Kernel Tracing," Blackhat USA 2021, August 2021, Las Vegas.
- M. Manna, A. Case, A. Ali-Gombe, G. G. Richard III, "Modern macOS Userland Runtime
Analysis," Forensic Science International: Digital Investigation, Vol. 38, September
2021.
- M. Jalalzai, C. Feng, C. Busch, G. G. Richard III, J. Niu, "The Hermes BFT for Blockchains,"
IEEE Transactions on Dependable and Secure Computing, 2021.
- R. Maggio, A. Case, A. Ali-Gombe, G. G. Richard III, "Seance: Divination of Tool-Breaking
Changes in Forensically Important Binaries," Proceedings of the 2021 Digital Forensics
Research Conference (DFRWS), Best Paper Award, July 2021, virtual.
- A. Ali-Gombe, G. G. Richard III, "The Recreation and Visualization of Runtime Objects
Relationship from Process Memory Images," Proceedings of the 73rd Annual Meeting of
the American Academy of Forensic Sciences (AAFS), February 2021, Virtual Meeting.
- M. Manna, A. Case, G. G. Richard III, "Performing Mac Memory Analysis Using Objective-C
and Swift Data Structures," Proceedings of the 73rd Annual Meeting of the American
Academy of Forensic Sciences (AAFS), February 2021, Virtual Meeting.
- S. Sudhakaran, A. Ali-Gombe, G. G. Richard III, "Examining the Impact of Garbage Collection
and Process States in Userland Memory Forensics," Proceedings of the 73rd Annual Meeting
of the American Academy of Forensic Sciences (AAFS), February 2021, Virtual Meeting.
- A. Orgah, G. G. Richard III, A. Case, "MemForC: Memory Forensics Corpus Creation for
Malware Analysis," Proceedings of the 16th International Conference on Cyber Warfare
and Security, 2021.
- G. G. Richard III, A. Case, M. Modhuparna, E. Hahne, Aisha Ali-Gombe, Digital Investigation
and the Trojan Defense, Revisited. In: Ijeh AC, Curran K, editors. Crime Science and
Digital Forensics: A Holistic View, Science Publishers, an imprint of CRC press (Taylor
and Francis Group), Boca Raton, FL, USA. 2020.
- S. Sudhakaran, A. Ali-Gombe, A. Orgah, A. Case, G. G. Richard III, "AmpleDroid Recovering
Large Object Files from Android Application Memory," Proceedings of the IEEE International
Workshop on Information Forensics and Security, 2020.
- A. Ali-Gombe, A. Tambaoan, A. Gurfolino, G. G. Richard III, "App-Agnostic Post-Execution
Semantic Analysis of Android In-Memory Forensics Artifacts," Proceedings of the Annual
Computer Security Applications Conference (ACSAC), 2020.
- S. Paruchuri, A. Case, G. G. Richard III, "Gaslight Revisited: Efficient and Powerful
Fuzzing of Digital Forensics Tools," Computers and Security, vol. 97, 2020.
- A. Case, R. Maggio, M. Firoz-Ul-Amin, M. Jalalzai, A. Ali-Gombe, M. Sun, G. G. Richard
III, "Hooktracer: Automatic Detection and Analysis of Keystroke Loggers Using Memory
Forensics", Computers and Security, vol. 96, 2020.
- A. Case, R. Maggio, M. Manna, G. G. Richard III, "Memory Analysis of macOS Page Queues,"
Proceedings of the 2020 Digital Forensics Research Conference (DFRWS), July 2020,
Memphis, TN.
- A. Ali-Gombe, S. Sudhakaran, A. Case, G. G. Richard III, "DroidScraper: A Tool for
Android In-Memory Object Recovery and Reconstruction," Proceedings of the 22nd International
Symposium on Research in Attacks, Intrusions and Defenses (RAID 2019), Beijing, China,
2019.
- M. Jalalzai, C. Busch, G. G. Richard III, "Proteus: Proteus: A Scalable BFT Consensus
Protocol for Blockchains," Proceedings of the 2nd IEEE International Conference on
Blockchain (Blockchain-2019), Atlanta, GA, 2019.
- M. Jalalzai, C. Busch, G. G. Richard III, "An Experimental Evaluation of BFT Protocols
for Blockchains," Proceedings of the 2019 International Conference on Blockchain (ICBC
2019), San Diego, CA, 2019.
- A. Case, M. Jalalzai, M Firoz-Ul-Amin, R. Maggio, A. Ali-Gombe, M. Sun, G. G. Richard
III, "HookTracer: A System for Automated and Accessible API Hooks Analysis," Proceedings
of the 2019 Digital Forensics Research Conference (DFRWS), July 2019, Portland, OR.
- C. Weems, I. Ahmed, G. G. Richard III, J. Russell, E. Neil, "Susceptibility and Resilience
to Cyber Threat: Findings from a Scenario Decision Program to Measure Secure and Insecure
Computing Behavior," PLOS ONE, 2018.
- N. Lewis, A. Case, A. Ali-Gombe, G. G. Richard III, "Memory Forensics and the Windows
Subsystem for Linux," Proceedings of the 2018 Digital Forensics Research Conference
(DFRWS), Best Student Paper Award, July 2018, Providence RI.
- R. Bhatia, B. Saltaformaggio, S. J. Yang, A. Ali-Gombe, X. Zhang, D. Xu, G. G. Richard
III, "Tipped Off by Your Memory Allocator: Device-Wide User Activity Sequencing from
Android Memory Images," Proceedings of the 2018 Network and Distributed System Security
Symposium (NDSS 2018), February 2018, San Diego, CA.
- A. Ali-Gombe, B. Saltaformaggio, R. Ramanujam, D. Xu, G. G. Richard III, "Towards
a More Dependable Hybrid Analysis of Android Malware Using Aspect-Oriented Programming,"
Computers and Security (COSE), vol. 73, March 2018.
- A. Case, A. Das, S-J Park, R. Ramanujam, G. G. Richard III, "Gaslight: A Comprehensive
Fuzzing Architecture for Memory Forensics Frameworks," Proceedings of the 2017 Digital
Forensics Research Conference (DFRWS), August 2017, Austin, TX.
- J. D. Russell, C. F. Weems, I. Ahmed, G. G. Richard III, "Self-reported Secure and
Insecure Cyber Behavior: Factor Structure and Associations with Personality Factors,"
Journal of Cyber Security Technology. DOI:10.1080/23742917.2017.1345271.
- A. Case, G. G. Richard III, “Memory Forensics: The Path Forward,” Journal of Digital
Investigation, (20)3, pp. 23-33, 2017.
|