Hardware Device

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 66600 Experts worldwide ranked by ideXlab platform

Sujeet Shenoi - One of the best experts on this subject based on the ideXlab platform.

  • IFIP Int. Conf. Digital Forensics - Retrofitting Mobile Devices for Capturing Memory-Resident Malware Based on System Side-Effects
    Advances in Digital Forensics XV, 2019
    Co-Authors: Zachary Grimmett, Jason Staggs, Sujeet Shenoi
    Abstract:

    Sophisticated memory-resident malware that target mobile phone platforms can be extremely difficult to detect and capture. However, triggering volatile memory captures based on observable system side-effects exhibited by malware can harvest live memory that contains memory-resident malware. This chapter describes a novel approach for capturing memory-resident malware on an Android Device for future analysis. The approach is demonstrated by making modifications to the Android debuggerd daemon to capture memory while a vulnerable process is being exploited on a Google Nexus 5 phone. The implementation employs an external Hardware Device to store a memory capture after successful exfiltration from the compromised mobile Device.

  • Retrofitting Mobile Devices for Capturing Memory-Resident Malware Based on System Side-Effects
    2019
    Co-Authors: Zachary Grimmett, Jason Staggs, Sujeet Shenoi
    Abstract:

    Sophisticated memory-resident malware that target mobile phone platforms can be extremely difficult to detect and capture. However, triggering volatile memory captures based on observable system side-effects exhibited by malware can harvest live memory that contains memory-resident malware. This chapter describes a novel approach for capturing memory-resident malware on an Android Device for future analysis. The approach is demonstrated by making modifications to the Android debuggerd daemon to capture memory while a vulnerable process is being exploited on a Google Nexus 5 phone. The implementation employs an external Hardware Device to store a memory capture after successful exfiltration from the compromised mobile Device.

Zachary Grimmett - One of the best experts on this subject based on the ideXlab platform.

  • IFIP Int. Conf. Digital Forensics - Retrofitting Mobile Devices for Capturing Memory-Resident Malware Based on System Side-Effects
    Advances in Digital Forensics XV, 2019
    Co-Authors: Zachary Grimmett, Jason Staggs, Sujeet Shenoi
    Abstract:

    Sophisticated memory-resident malware that target mobile phone platforms can be extremely difficult to detect and capture. However, triggering volatile memory captures based on observable system side-effects exhibited by malware can harvest live memory that contains memory-resident malware. This chapter describes a novel approach for capturing memory-resident malware on an Android Device for future analysis. The approach is demonstrated by making modifications to the Android debuggerd daemon to capture memory while a vulnerable process is being exploited on a Google Nexus 5 phone. The implementation employs an external Hardware Device to store a memory capture after successful exfiltration from the compromised mobile Device.

  • Retrofitting Mobile Devices for Capturing Memory-Resident Malware Based on System Side-Effects
    2019
    Co-Authors: Zachary Grimmett, Jason Staggs, Sujeet Shenoi
    Abstract:

    Sophisticated memory-resident malware that target mobile phone platforms can be extremely difficult to detect and capture. However, triggering volatile memory captures based on observable system side-effects exhibited by malware can harvest live memory that contains memory-resident malware. This chapter describes a novel approach for capturing memory-resident malware on an Android Device for future analysis. The approach is demonstrated by making modifications to the Android debuggerd daemon to capture memory while a vulnerable process is being exploited on a Google Nexus 5 phone. The implementation employs an external Hardware Device to store a memory capture after successful exfiltration from the compromised mobile Device.

Jason Staggs - One of the best experts on this subject based on the ideXlab platform.

  • IFIP Int. Conf. Digital Forensics - Retrofitting Mobile Devices for Capturing Memory-Resident Malware Based on System Side-Effects
    Advances in Digital Forensics XV, 2019
    Co-Authors: Zachary Grimmett, Jason Staggs, Sujeet Shenoi
    Abstract:

    Sophisticated memory-resident malware that target mobile phone platforms can be extremely difficult to detect and capture. However, triggering volatile memory captures based on observable system side-effects exhibited by malware can harvest live memory that contains memory-resident malware. This chapter describes a novel approach for capturing memory-resident malware on an Android Device for future analysis. The approach is demonstrated by making modifications to the Android debuggerd daemon to capture memory while a vulnerable process is being exploited on a Google Nexus 5 phone. The implementation employs an external Hardware Device to store a memory capture after successful exfiltration from the compromised mobile Device.

  • Retrofitting Mobile Devices for Capturing Memory-Resident Malware Based on System Side-Effects
    2019
    Co-Authors: Zachary Grimmett, Jason Staggs, Sujeet Shenoi
    Abstract:

    Sophisticated memory-resident malware that target mobile phone platforms can be extremely difficult to detect and capture. However, triggering volatile memory captures based on observable system side-effects exhibited by malware can harvest live memory that contains memory-resident malware. This chapter describes a novel approach for capturing memory-resident malware on an Android Device for future analysis. The approach is demonstrated by making modifications to the Android debuggerd daemon to capture memory while a vulnerable process is being exploited on a Google Nexus 5 phone. The implementation employs an external Hardware Device to store a memory capture after successful exfiltration from the compromised mobile Device.

Ken Morley - One of the best experts on this subject based on the ideXlab platform.

Nikita Chauhan - One of the best experts on this subject based on the ideXlab platform.

  • a virtual instrument oscilloscope for signal measurements
    2015
    Co-Authors: Nikita Chauhan
    Abstract:

    In this paper, we discuss about the LabVIEW based graphical applications for the measurements of signal. A virtual instrument is designed in order to serve the purpose of oscilloscope with a user friendly interface at the front panel. The designed oscilloscope is derived from a Hardware instrument named Digital Phosphor Oscilloscope TDS 5104B.Firstly the original Hardware Device functions are examined, then a labview based VI is designed holding all the similar features like TDS 5104B.Front panel is user defined with user specific controls resulting in easy, compact and cost effective system. It is proved that the virtual instrument results in a powerful, productive, efficient, power saving and a precise measuring instrument. It provides wide range of application in future and proves to be a practical yet manipulative Device.