Follow
Andrew Case
Andrew Case
Volexity, Volatility Foundation, Louisiana State University, University of New Orleans
Verified email at dfir.org - Homepage
Title
Cited by
Cited by
Year
The art of memory forensics: detecting malware and threats in windows, linux, and Mac memory
MH Ligh, A Case, J Levy, A Walters
John Wiley & Sons, 2014
3772014
The art of memory forensics
MH Ligh, A Case, J Levy, A Walters
Indianapolis, ID: Wiley, 2014
377*2014
Acquisition and analysis of volatile memory from android devices
J Sylve, A Case, L Marziale, GG Richard
Digital Investigation 8 (3), 175-184, 2012
1942012
FACE: automated digital evidence discovery and correlation. Digit. Investig. 5
A Case, A Cristina, L Marziale, GG Richard, V Roussev
S65–S75, 2008
168*2008
FACE: Automated digital evidence discovery and correlation
A Case, A Cristina, L Marziale, GG Richard, V Roussev
digital investigation 5, S65-S75, 2008
1602008
Memory forensics: The path forward
A Case, GG Richard
Digital Investigation 20, 23-33, 2017
1352017
Dynamic recreation of kernel data structures for live forensics
A Case, L Marziale, GG Richard
Digital Investigation 7, S32-S40, 2010
592010
Detecting objective-C malware through memory forensics
A Case, GG Richard
Digital Investigation 18, S3-S10, 2016
362016
In lieu of swap: Analyzing compressed RAM in Mac OS X and Linux
GG Richard, A Case
Digital Investigation 11, S3-S12, 2014
322014
Memory forensics and the windows subsystem for linux
N Lewis, A Case, A Ali-Gombe, GG Richard III
Digital Investigation 26, S3-S11, 2018
262018
{DroidScraper}: A Tool for Android {In-Memory} Object Recovery and Reconstruction
A Ali-Gombe, S Sudhakaran, A Case, GG Richard III
22nd International Symposium on Research in Attacks, Intrusions and Defenses …, 2019
242019
Treasure and tragedy in kmem_cache mining for live forensics investigation
A Case, L Marziale, C Neckar, GG Richard
digital investigation 7, S41-S47, 2010
232010
Advancing Mac OS X rootkit detection
A Case, GG Richard
Digital Investigation 14, S25-S33, 2015
212015
Hooktracer: Automatic detection and analysis of keystroke loggers using memory forensics
A Case, RD Maggio, M Firoz-Ul-Amin, MM Jalalzai, A Ali-Gombe, M Sun, ...
Computers & Security 96, 101872, 2020
182020
HookTracer: a system for automated and accessible API hooks analysis
A Case, MM Jalalzai, M Firoz-Ul-Amin, RD Maggio, A Ali-Gombe, M Sun, ...
Digital Investigation 29, S104-S112, 2019
182019
Gaslight: A comprehensive fuzzing architecture for memory forensics frameworks
A Case, AK Das, SJ Park, JR Ramanujam, GG Richard
Digital Investigation 22, S86-S93, 2017
172017
Memory analysis of the dalvik (android) virtual machine
A Case
Retrieved from, 2011
132011
Memory analysis of macos page queues
A Case, RD Maggio, M Manna, GG Richard III
Forensic Science International: Digital Investigation 33, 301004, 2020
102020
Modern macOS userland runtime analysis
M Manna, A Case, A Ali-Gombe, GG Richard III
Forensic Science International: Digital Investigation 38, 301221, 2021
82021
MemForC: Memory Forensics Corpus Creation for Malware Analysis
A Orgah, G Richard III, A Case
ICCWS 2021 16th International Conference on Cyber Warfare and Security, 249, 2021
42021
The system can't perform the operation now. Try again later.
Articles 1–20