Login / Signup
VEDRANDO: A Novel Way to Reveal Stealthy Attack Steps on Android through Memory Forensics.
Jennifer Bellizzi
Eleonora Losiouk
Mauro Conti
Christian Colombo
Mark Vella
Published in:
J. Cybersecur. Priv. (2023)
Keyphrases
</>
mobile devices
memory requirements
data corruption
memory usage
mobile applications
main memory
computing power
random access
document analysis
detection mechanism
smart phones
countermeasures
memory space
dos attacks
memory management
malware detection
attack detection
data structure