Golden G. Richard III
Louisiana State University
H-index: 29
North America-United States
Top articles of Golden G. Richard III
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
Every step you take, I'll be tracking you: forensic analysis of the tile tracker application | Forensic science international: digital investigation | Lauren R Pace LaSean A Salmon Christopher J Bowen Ibrahim Baggili Golden G Richard III | 2023/7/1 |
cRGB_Mem: At the intersection of memory forensics and machine learning | Forensic Science International: Digital Investigation | Aisha Ali-Gombe Sneha Sudhakaran Ramyapandian Vijayakanthan Golden G Richard III | 2023/7/1 |
Catch Me if You Can: Analysis of Digital Devices and Artifacts Used in Murder Cases | John Jankura Hannah Catallo-Stooks Ibrahim Baggili Golden Richard | 2023/11/30 | |
Assessing the threat of Rosetta 2 on Apple Silicon devices | Forensic Science International: Digital Investigation | Raphaela Mettig Charles Glass Andrew Case Golden G Richard III | 2023/9/1 |
Memory forensics of the OpenDaylight software-defined networking (SDN) controller | Abdullah Alshaya Adam Kardorff Christian Facundus Ibrahim Baggili Golden Richard III | 2023/8/29 | |
Evaluating the Reliability of Android Userland Memory Forensics | International Conference on Cyber Warfare and Security | Sneha Sudhakaran Aisha Ali-Gombe Andrew Case Golden G Richard III | 2022/3/2 |
A Reverse Engineering Education Needs Analysis Survey | arXiv preprint arXiv:2212.07531 | Charles R Barone IV Robert Serafin Ilya Shavrov Ibrahim Baggili Aisha Ali-Gombe | 2022/12/14 |
Checkmate'22: Research on offensive and defensive techniques in the context of Man At The End (MATE) attacks | Golden G Richard III Tim Blazytko | 2022/11/7 | |
Memory analysis of. net and. net core applications | Forensic Science International: Digital Investigation | Modhuparna Manna Andrew Case Aisha Ali-Gombe Golden G Richard III | 2022/7/1 |
MemForC: Memory Forensics Corpus Creation for Malware Analysis | Proceedings of the International Conference on Cyber Warfare and Security | Augustine Orgah Golden Richard III Andrew Case | 2021/2/1 |
The Hermes BFT for blockchains | IEEE Transactions on Dependable and Secure Computing | Mohammad M Jalalzai Chen Feng Costas Busch Golden G Richard Jianyu Niu | 2021/9/21 |
Digital Investigation and the Trojan Defense, Revisited | Golden G Richard Andrew Case Modhuparna Manna Elsa AM Hahne Aisha Ali-Gombe | 2021/9/14 | |
Modern macOS userland runtime analysis | Forensic Science International: Digital Investigation | Modhuparna Manna Andrew Case Aisha Ali-Gombe Golden G Richard III | 2021/9/1 |
Fixing a Memory Forensics Blind Spot: Linux Kernel Tracing | Andrew Case Golden G Richard III | 2021/7/16 | |
Seance: Divination of tool-breaking changes in forensically important binaries | Forensic Science International: Digital Investigation | Ryan D Maggio Andrew Case Aisha Ali-Gombe Golden G Richard III | 2021/7/1 |
Memory analysis of macos page queues | Forensic Science International: Digital Investigation | Andrew Case Ryan D Maggio Modhuparna Manna Golden G Richard III | 2020/7/1 |
App-agnostic post-execution semantic analysis of Android in-memory forensics artifacts | Aisha Ali-Gombe Alexandra Tambaoan Angela Gurfolino Golden G Richard III | 2020/12/7 | |
AmpleDroid recovering large object files from Android application memory | Sneha Sudhakaran Aisha Ali-Gombe Augustine Orgah Andrew Case Golden G Richard | 2020/12/6 | |
Gaslight revisited: Efficient and powerful fuzzing of digital forensics tools | Computers & Security | Shravya Paruchuri Andrew Case Golden G Richard III | 2020/10/1 |
Hooktracer: Automatic detection and analysis of keystroke loggers using memory forensics | Computers & Security | Andrew Case Ryan D Maggio Md Firoz-Ul-Amin Mohammad M Jalalzai Aisha Ali-Gombe | 2020/9/1 |