A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2021; you can also visit the original URL.
The file type is application/pdf
.
On Challenges in Verifying Trusted Executable Files in Memory Forensics
2020
Forensic Science International: Digital Investigation
Memory forensics is a fundamental step in any security incident response process, especially in computer systems where malware may be present. The memory of the system is acquired and then analyzed, looking for facts about the security incident. To remain stealthy and undetected in computer systems, malware are abusing the code signing technology, which helps to establish trust in computer software. Intuitively, a memory forensic analyst can think of code signing as a preliminary step to
doi:10.1016/j.fsidi.2020.300917
fatcat:v7s7luvx45aoxdwhkvtba6jrye