National Repository of Grey Literature 6 records found  Search took 0.01 seconds. 
Forensic RAM dump image analyzer
Kollár, Ivor ; Holub, Viliam (advisor) ; Děcký, Martin (referee)
While different techniques are used for physical memory dumping, most of them provide a hard-to-analyse image of raw data. The aim of the work is to develop an automatic analyser of physical memory dumps retrieving contained information in a user-friendly form. The analyser is supposed to simplify automatic data extraction and should be used by forensic experts. Among expected features are multiple target architecture/OS support, target architecture/OS guessing, automated password/crypto keys collecting, process listing, and module/driver listing.
Forensic RAM dump image analyzer
Kollár, Ivor ; Holub, Viliam (advisor) ; Babka, Vlastimil (referee)
While different techniques are used for physical memory dumping, most of them provide a hard-to-analyse image of raw data. The aim of the work is to develop an automatic analyser of physical memory dumps retrieving contained information in a user-friendly form. The analyser is supposed to simplify automatic data extraction and should be used by forensic experts. Among expected features are multiple target architecture/OS support, target architecture/OS guessing, automated password/crypto keys collecting, process listing, and module/driver listing.
Steganographics filesystem
Kollár, Ivor ; Holub, Viliam (advisor) ; Parízek, Pavel (referee)
In the present work we study protecting of information in situations, when cryptography alone is not enough. We will try to analyze possibilities of information hiding, not in innocent looking carrier of information (sound, picture, video), but in pseudosteganographic archive. We will try to describe (and later implement) algorithm, that will be able to create archive, meeting following conditions: Archive will contain N les, each protected by one key. Number N must remain hidden to attacker. By using one of keys, we will get only one le, getting no information about rest of les in archive. Implementation of this algorithm should be as simple as possible,maximally platform independent, and easily practically usable.
Forensic RAM dump image analyzer
Kollár, Ivor ; Holub, Viliam (advisor) ; Babka, Vlastimil (referee)
While different techniques are used for physical memory dumping, most of them provide a hard-to-analyse image of raw data. The aim of the work is to develop an automatic analyser of physical memory dumps retrieving contained information in a user-friendly form. The analyser is supposed to simplify automatic data extraction and should be used by forensic experts. Among expected features are multiple target architecture/OS support, target architecture/OS guessing, automated password/crypto keys collecting, process listing, and module/driver listing.
Forensic RAM dump image analyzer
Kollár, Ivor ; Holub, Viliam (advisor) ; Děcký, Martin (referee)
While different techniques are used for physical memory dumping, most of them provide a hard-to-analyse image of raw data. The aim of the work is to develop an automatic analyser of physical memory dumps retrieving contained information in a user-friendly form. The analyser is supposed to simplify automatic data extraction and should be used by forensic experts. Among expected features are multiple target architecture/OS support, target architecture/OS guessing, automated password/crypto keys collecting, process listing, and module/driver listing.
Steganographics filesystem
Kollár, Ivor ; Parízek, Pavel (referee) ; Holub, Viliam (advisor)
In the present work we study protecting of information in situations, when cryptography alone is not enough. We will try to analyze possibilities of information hiding, not in innocent looking carrier of information (sound, picture, video), but in pseudosteganographic archive. We will try to describe (and later implement) algorithm, that will be able to create archive, meeting following conditions: Archive will contain N les, each protected by one key. Number N must remain hidden to attacker. By using one of keys, we will get only one le, getting no information about rest of les in archive. Implementation of this algorithm should be as simple as possible,maximally platform independent, and easily practically usable.

Interested in being notified about new results for this query?
Subscribe to the RSS feed.