Andreas Dewald

According to our database1, Andreas Dewald authored at least 27 papers between 2010 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2020
Forensic Analysis of the Resilient File System (ReFS) Version 3.4.
Digit. Investig., 2020

How can data from fitness trackers be obtained and analyzed with a forensic approach?
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2020

2019
Windows Memory Forensics: Detecting (Un)Intentionally Hidden Injected Code by Examining Page Table Entries.
Digit. Investig., 2019

2018
Forensic APFS File Recovery.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

2017
A Forensic Email Analysis Tool Using Dynamic Visualization.
J. Digit. Forensics Secur. Law, 2017

AFEIC: Advanced forensic Ext4 inode carving.
Digit. Investig., 2017

Linux memory forensics: Dissecting the user space process heap.
Digit. Investig., 2017

2016
Generic RAID reassembly using block-level entropy.
Digit. Investig., 2016

Information leakage behind the curtain: Abusing anti-EMI features for covert communication.
Proceedings of the 2016 IEEE International Symposium on Hardware Oriented Security and Trust, 2016

2015
Characteristic evidence, counter evidence and reconstruction problems in forensic computing.
it Inf. Technol., 2015

Privacy-preserving email forensics.
Digit. Investig., 2015

2014
Forensic Zero-Knowledge Event Reconstruction on Filesystem Metadata.
Proceedings of the Sicherheit 2014: Sicherheit, 2014

Drei Jahre Master Online Digitale Forensik: Ergebnisse und Erfahrungen.
Proceedings of the Sicherheit 2014: Sicherheit, 2014

2013
Selective Imaging Revisited.
Proceedings of the Seventh International Conference on IT Security Incident Management and IT Forensics, 2013

Forensic Application-Fingerprinting Based on File System Metadata.
Proceedings of the Seventh International Conference on IT Security Incident Management and IT Forensics, 2013

Systematische Probleme und Grenzen der forensischen Informatik.
Proceedings of the Jenseits von 1984, 2013

2012
Formalisierung digitaler Spuren und ihre Einbettung in die Forensische Informatik.
PhD thesis, 2012

Kriterien für die Priorisierung bei der Sicherung und Analyse digitaler Spuren.
Datenschutz und Datensicherheit, 2012

Analyse und Vergleich von BckR2D2-I und II.
Proceedings of the Sicherheit 2012: Sicherheit, 2012

2011
TRESOR Runs Encryption Securely Outside RAM.
Proceedings of the 20th USENIX Security Symposium, 2011

Design and Implementation of a Documentation Tool for Interactive Commandline Sessions.
Proceedings of the Sixth International Conference on IT Security Incident Management and IT Forensics, 2011


Forensische Informatik.
Books on Demand GmbH, ISBN: 978-3-8423-7947-3, 2011

Client-Honeypots - Exploring Malicious Websites.
Oldenbourg, ISBN: 978-3-486-70526-3, 2011

2010
ADSandbox: sandboxing JavaScript to fight malicious websites.
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010

AESSE: a cold-boot resistant implementation of AES.
Proceedings of the Third European Workshop on System Security, 2010

Cujo: efficient detection and prevention of drive-by-download attacks.
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010


  Loading...