Stack Forensics Based on Meta Data and Instruction Flow of 64-bit Windows
To solve the omission in the stack forensics built without slack frame pointers and debugging symbols and the misstatement in the stack forensics built without meta data by the existing tools for dump files containing malicious processes in 64-bit Windows environment, a method to ll-ace stacks from...
Saved in:
| Main Authors: | ZHAI Ji-qiang, XU Xiao, CHEN Pan, YANG Hai-Lu |
|---|---|
| Format: | Article |
| Language: | zho |
| Published: |
Harbin University of Science and Technology Publications
2021-10-01
|
| Series: | Journal of Harbin University of Science and Technology |
| Subjects: | |
| Online Access: | https://hlgxb.hrbust.edu.cn/#/digest?ArticleID=2015 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Detect Windows Code Injection by Cross-validating Stack and VAD Information
by: ZHAI Jiqiang, et al.
Published: (2024-04-01) -
IPv6 Dynamic Address Tunnel Model Based on the Sliding Address Window
by: Zichuan Ma, et al.
Published: (2015-10-01) -
Security Mechanism for Dual Stack Network Accessing of Home Gateway
by: Zhonghua Chen
Published: (2014-12-01) -
Enhancing the Capacitive Memory Window of HZO FeCap Through Nanolaminate Stack Design
by: Mostafa Habibi, et al.
Published: (2025-06-01) -
LIFO-STACK SIZE DETERMINATION FOR GROWING OF THE IMAGE REGIONS
by: V. Yu. Tsviatkou
Published: (2020-03-01)