Andrew Case

Orcid: 0000-0002-1557-044X

According to our database1, Andrew Case authored at least 21 papers between 2008 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Assessing the threat of Rosetta 2 on Apple Silicon devices.
Forensic Sci. Int. Digit. Investig., September, 2023

2022
Memory analysis of .NET and .Net Core applications.
Digit. Investig., 2022

A Reverse Engineering Education Needs Analysis Survey.
CoRR, 2022

2021
Modern macOS userland runtime analysis.
Digit. Investig., 2021

Seance: Divination of tool-breaking changes in forensically important binaries.
Digit. Investig., 2021

2020
Memory Analysis of macOS Page Queues.
Digit. Investig., 2020

Gaslight revisited: Efficient and powerful fuzzing of digital forensics tools.
Comput. Secur., 2020

Hooktracer: Automatic Detection and Analysis of Keystroke Loggers Using Memory Forensics.
Comput. Secur., 2020

AmpleDroid Recovering Large Object Files from Android Application Memory.
Proceedings of the 12th IEEE International Workshop on Information Forensics and Security, 2020

2019
HookTracer: A System for Automated and Accessible API Hooks Analysis.
Digit. Investig., 2019

DroidScraper: A Tool for Android In-Memory Object Recovery and Reconstruction.
Proceedings of the 22nd International Symposium on Research in Attacks, 2019

2018
Memory forensics and the Windows Subsystem for Linux.
Digit. Investig., 2018

2017
Memory forensics: The path forward.
Digit. Investig., 2017

Gaslight: A comprehensive fuzzing architecture for memory forensics frameworks.
Digit. Investig., 2017

2016
Detecting objective-C malware through memory forensics.
Digit. Investig., 2016

2015
Advancing Mac OS X rootkit detection.
Digit. Investig., 2015

2014
In lieu of swap: Analyzing compressed RAM in Mac OS X and Linux.
Digit. Investig., 2014

2012
Acquisition and analysis of volatile memory from android devices.
Digit. Investig., 2012

2010
Dynamic recreation of kernel data structures for live forensics.
Digit. Investig., 2010

Treasure and tragedy in <i>kmem_cache</i> mining for live forensics investigation.
Digit. Investig., 2010

2008
FACE: Automated digital evidence discovery and correlation.
Digit. Investig., 2008


  Loading...