Login / Signup
Real-Time Triggering of Android Memory Dumps for Stealthy Attack Investigation.
Jennifer Bellizzi
Mark Vella
Christian Colombo
Julio C. Hernandez-Castro
Published in:
NordSec (2020)
Keyphrases
</>
real time
limited memory
memory usage
data acquisition
multi threaded
memory requirements
countermeasures
memory space
random access
malicious users
memory size
mobile platform
active rules
real time systems
control system
mobile devices
information systems
data sets