📝

논문 리뷰

Table
idx
Name
Status
Keyword
Journal/Conference Name
URL
2
Selective Recovery of the SSD TRIM Command in Digital Forensics
Open
Done
3
Forensic APFS File Recovery
Open
Done
4
Keychain Analysis with Mac OS X Memory Forensics
Open
Done
5
Forensic analysis of deduplicated file systems
Open
Done
6
Reversing Kia Motors Head Unit to discover and exploit software vulnerabilities
Open
READING
IVI
Vehicle
Vulnerablitiy
Exploit
7
Twice the Bits, Twice the Trouble:Vulnerabilities Induced by Migrating to 64-Bit Platforms
Open
READING
Software security
Data models
Integer-based vulnerabilities
ACM SIGSAC Conference
https://dl.acm.org/doi/abs/10.1145/2976749.2978403