| Recent Papers
                        
                        A. Ali-Gombe, S. Sudhakaran, R. Vijayakanthan G. G. Richard III, "RGB Mem: At the
                           Intersection of Memory Forensics and Machine Learning," Proceedings of the 2023 Digital
                           Forensics Research Conference (DFRWS 2023), July 2023.L. Pace, L. Salmon, C. Bowen, I. Baggili. G. G. Richard III, "Every Step You Take,
                           I'll be Tracking You: Forensic Analysis of the Tile Tracker Application," Proceedings of the 2023 Digital Forensics Research Conference (DFRWS 2023), July 2023.A. Case, G. Moreira, A. Sellers, G. G. Richard III, "New Memory Forensics Techniques
                           to Defeat Device Monitoring Malware," Blackhat USA 2022, August 2022, Las Vegas.M. Manna, A. Case, A. Ali-Gombe, G. G. Richard III, "Memory Analysis of .NET and .Net
                           Core Applications," Proceedings of the 2022 Digital Forensics Research Conference (DFRWS), July 2022, virtual.S. Sudhakaran, A. Ali-Gombe, A. Case, G. G. Richard III, "Evaluating the Reliability
                           of Android Userland Memory Forensics," Proceedings of the International Conference on Cyber Warfare and Security, 2022.A. Case, G. G. Richard III, "Fixing a Memory Forensics Blind Spot: Linux Kernel Tracing," Blackhat USA 2021, August 2021, Las Vegas.M. Manna, A. Case, A. Ali-Gombe, G. G. Richard III, "Modern macOS Userland Runtime
                           Analysis," Forensic Science International: Digital Investigation, Vol. 38, September
                           2021.M. Jalalzai, C. Feng, C. Busch, G. G. Richard III, J. Niu, "The Hermes BFT for Blockchains,"
                           IEEE Transactions on Dependable and Secure Computing, 2021. R. Maggio, A. Case, A. Ali-Gombe, G. G. Richard III, "Seance: Divination of Tool-Breaking
                           Changes in Forensically Important Binaries," Proceedings of the 2021 Digital Forensics
                           Research Conference (DFRWS), Best Paper Award, July 2021, virtual.A. Ali-Gombe, G. G. Richard III, "The Recreation and Visualization of Runtime Objects
                           Relationship from Process Memory Images," Proceedings of the 73rd Annual Meeting of
                           the American Academy of Forensic Sciences (AAFS), February 2021, Virtual Meeting.M. Manna, A. Case, G. G. Richard III, "Performing Mac Memory Analysis Using Objective-C
                           and Swift Data Structures," Proceedings of the 73rd Annual Meeting of the American
                           Academy of Forensic Sciences (AAFS), February 2021, Virtual Meeting.S. Sudhakaran, A. Ali-Gombe, G. G. Richard III, "Examining the Impact of Garbage Collection
                           and Process States in Userland Memory Forensics," Proceedings of the 73rd Annual Meeting
                           of the American Academy of Forensic Sciences (AAFS), February 2021, Virtual Meeting.A. Orgah, G. G. Richard III, A. Case, "MemForC: Memory Forensics Corpus Creation for
                           Malware Analysis," Proceedings of the 16th International Conference on Cyber Warfare
                           and Security, 2021.G. G. Richard III, A. Case, M. Modhuparna, E. Hahne, Aisha Ali-Gombe, Digital Investigation
                           and the Trojan Defense, Revisited. In: Ijeh AC, Curran K, editors. Crime Science and
                           Digital Forensics: A Holistic View, Science Publishers, an imprint of CRC press (Taylor
                           and Francis Group), Boca Raton, FL, USA. 2020.S. Sudhakaran, A. Ali-Gombe, A. Orgah, A. Case, G. G. Richard III, "AmpleDroid Recovering
                           Large Object Files from Android Application Memory," Proceedings of the IEEE International
                           Workshop on Information Forensics and Security, 2020.A. Ali-Gombe, A. Tambaoan, A. Gurfolino, G. G. Richard III, "App-Agnostic Post-Execution
                           Semantic Analysis of Android In-Memory Forensics Artifacts," Proceedings of the Annual
                           Computer Security Applications Conference (ACSAC), 2020.S. Paruchuri, A. Case, G. G. Richard III, "Gaslight Revisited: Efficient and Powerful
                           Fuzzing of Digital Forensics Tools," Computers and Security, vol. 97, 2020.A. Case, R. Maggio, M. Firoz-Ul-Amin, M. Jalalzai, A. Ali-Gombe, M. Sun, G. G. Richard
                           III, "Hooktracer: Automatic Detection and Analysis of Keystroke Loggers Using Memory
                           Forensics", Computers and Security, vol. 96, 2020.A. Case, R. Maggio, M. Manna, G. G. Richard III, "Memory Analysis of macOS Page Queues,"
                           Proceedings of the 2020 Digital Forensics Research Conference (DFRWS), July 2020,
                           Memphis, TN.A. Ali-Gombe, S. Sudhakaran, A. Case, G. G. Richard III, "DroidScraper: A Tool for
                           Android In-Memory Object Recovery and Reconstruction," Proceedings of the 22nd International
                           Symposium on Research in Attacks, Intrusions and Defenses (RAID 2019), Beijing, China,
                           2019.M. Jalalzai, C. Busch, G. G. Richard III, "Proteus: Proteus: A Scalable BFT Consensus
                           Protocol for Blockchains," Proceedings of the 2nd IEEE International Conference on
                           Blockchain (Blockchain-2019), Atlanta, GA, 2019.M. Jalalzai, C. Busch, G. G. Richard III, "An Experimental Evaluation of BFT Protocols
                           for Blockchains," Proceedings of the 2019 International Conference on Blockchain (ICBC
                           2019), San Diego, CA, 2019.A. Case, M. Jalalzai, M Firoz-Ul-Amin, R. Maggio, A. Ali-Gombe, M. Sun, G. G. Richard
                           III, "HookTracer: A System for Automated and Accessible API Hooks Analysis," Proceedings
                           of the 2019 Digital Forensics Research Conference (DFRWS), July 2019, Portland, OR.C. Weems, I. Ahmed, G. G. Richard III, J. Russell, E. Neil, "Susceptibility and Resilience
                           to Cyber Threat: Findings from a Scenario Decision Program to Measure Secure and Insecure
                           Computing Behavior," PLOS ONE, 2018.N. Lewis, A. Case, A. Ali-Gombe, G. G. Richard III, "Memory Forensics and the Windows
                           Subsystem for Linux," Proceedings of the 2018 Digital Forensics Research Conference
                           (DFRWS), Best Student Paper Award, July 2018, Providence RI.R. Bhatia, B. Saltaformaggio, S. J. Yang, A. Ali-Gombe, X. Zhang, D. Xu, G. G. Richard
                           III, "Tipped Off by Your Memory Allocator: Device-Wide User Activity Sequencing from
                           Android Memory Images," Proceedings of the 2018 Network and Distributed System Security
                           Symposium (NDSS 2018), February 2018, San Diego, CA.A. Ali-Gombe, B. Saltaformaggio, R. Ramanujam, D. Xu, G. G. Richard III, "Towards
                           a More Dependable Hybrid Analysis of Android Malware Using Aspect-Oriented Programming,"
                           Computers and Security (COSE), vol. 73, March 2018.A. Case, A. Das, S-J Park, R. Ramanujam, G. G. Richard III, "Gaslight: A Comprehensive
                           Fuzzing Architecture for Memory Forensics Frameworks," Proceedings of the 2017 Digital
                           Forensics Research Conference (DFRWS), August 2017, Austin, TX.J. D. Russell, C. F. Weems, I. Ahmed, G. G. Richard III, "Self-reported Secure and
                           Insecure Cyber Behavior: Factor Structure and Associations with Personality Factors,"
                           Journal of Cyber Security Technology. DOI:10.1080/23742917.2017.1345271.A. Case, G. G. Richard III, “Memory Forensics: The Path Forward,” Journal of Digital
                           Investigation, (20)3, pp. 23-33, 2017.   |