Show simple item record

dc.contributor.authorSaltaformaggio, Brendan
dc.date.accessioned2018-02-05T16:29:27Z
dc.date.available2018-02-05T16:29:27Z
dc.date.issued2018-01-19
dc.identifier.urihttp://hdl.handle.net/1853/59327
dc.descriptionPresented on January 19, 2018 at 12:00 p.m. in the Klaus Advanced Computing Building, room 2447.en_US
dc.descriptionBrendan Saltaformaggio leads the CyFi Lab as assistant professor in the School of Electrical and Computer Engineering at the Georgia Institute of Technology with a courtesy appointment in the School of Computer Science. His research interests are computer systems security and cyber forensics, including memory forensics, binary analysis and instrumentation, vetting of untrusted software, and mobile/IoT security.en_US
dc.descriptionRuntime: 48:08 minutesen_US
dc.description.abstractMemory forensics is becoming a crucial capability in modern cyber forensic investigations. In particular, memory forensics can reveal "up to the minute" evidence of a device's usage, often without requiring a suspect's password to unlock the device, and it is oblivious to any persistent storage encryption schemes. Prior to my work, researchers and investigators alike considered raw data-structure recovery the ultimate goal of memory forensics. This, however, was far from sufficient as investigators were still largely unable to understand the content of the recovered evidence; hence, unlocking the true potential of such evidence in memory images remained an open research challenge. In this talk, I will focus on my research efforts which break from traditional data-recovery-oriented forensics and instead leverage program analysis to automatically locate, reconstruct, and render spatial-temporal evidence from memory images. I will describe the evolution of this work, starting with the reuse of binary program components to overcome the burden of recovering and understanding highly probative data structures, e.g., photos, chat contents, and edited documents. Then, shifting away from the recovery of data structures, I will introduce spatial-temporal evidence recovery, culminating in the instrumentation of program executions to recreate full sequences of previous smartphone app screens, all from only a single snapshot of a device's memory. Finally, to highlight the role of memory forensics in my overall research agenda, I will briefly present my ongoing and future work in integrated cyber/cyber-physical attack defense and forensics.en_US
dc.format.extent48:08 minutes
dc.language.isoen_USen_US
dc.publisherGeorgia Institute of Technologyen_US
dc.relation.ispartofseriesCybersecurity Lecture Seriesen_US
dc.subjectAndroiden_US
dc.subjectCyber forensicsen_US
dc.subjectMemory forensicsen_US
dc.titleConvicted by Memory: Recovering Spatial-Temporal Digital Evidence from Memory Imagesen_US
dc.typeLectureen_US
dc.typeVideoen_US
dc.contributor.corporatenameGeorgia Institute of Technology. Institute for Information Security & Privacyen_US
dc.contributor.corporatenameGeorgia Institute of Technology. School of Computer Scienceen_US
dc.contributor.corporatenameGeorgia Institute of Technology. School of Electrical and Computer Engineeringen_US


Files in this item

This item appears in the following Collection(s)

Show simple item record