Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
Linux
biblio
Not-So-Random Numbers in Virtualized Linux and the Whirlwind RNG
Submitted by BrandonB on Tue, 05/05/2015 - 9:54am
random number generator
Whirlwind RNG
VM snapshots
VM boots
virtualized Linux
virtualized environments
Virtualization
virtual machines
virtual machine
software-based random number generators
cryptographic secrets
not-so-random numbers
Linux RNG systems
Linux
Kernel
Instruments
Hardware
entropy sources
Entropy
Cryptography
biblio
Post-Mortem Memory Analysis of Cold-Booted Android Devices
Submitted by BrandonB on Mon, 05/04/2015 - 1:11pm
forensic memory dumps
Volatility Plugins
tablet PCs
smart phones
Random access memory
post-mortem memory analysis
Post-mortem Analysis
open-source volatility plugins
mobile computing
Memory Analysis
Linux
Kernel
full disk encryption
FROST tool
Forensics
Android Forensics
DRAM remanence effect
DRAM chips
digital investigation process
Digital Forensics
Dalvik VM memory structures
Dalvik VM
Cryptography
cold-booted Android devices
cold boot attacks
Cold Boot Attack
application level memory
Androids
Android-driven smartphones
Android memory structures
biblio
Multi-Aspect, Robust, and Memory Exclusive Guest OS Fingerprinting
Submitted by BrandonB on Thu, 04/30/2015 - 12:41pm
Linux
Virtual machining
virtual machine introspection
physical memory dump
OS-SOMMELIER
operating system precise fingerprinting
Operating system fingerprinting
multiaspect memory exclusive approach
Memory Forensics
memory exclusive guest OS fingerprinting
Linux kernels
Cloud Computing
kernel data signature
kernel code aspect
Forensics
Fingerprint recognition
digital signatures
Digital Forensics
data structures
computer security
code signature approach
code hash based approach
« first
‹ previous
…
7
8
9
10
11
12
13
14
15