Anti-forensic resilient memory acquisition J Stüttgen, M Cohen Digital investigation 10, S105-S115, 2013 | 113 | 2013 |
Acquisition and analysis of compromised firmware using memory forensics J Stüttgen, S Vömel, M Denzel Digital Investigation 12, S50-S60, 2015 | 47 | 2015 |
An evaluation platform for forensic memory acquisition software S Vömel, J Stüttgen Digital Investigation 10, S30-S40, 2013 | 44 | 2013 |
Robust Linux memory acquisition with minimal target impact J Stüttgen, M Cohen Digital Investigation 11, S112-S119, 2014 | 42 | 2014 |
Selective imaging revisited J Stüttgen, A Dewald, FC Freiling 2013 Seventh International Conference on IT Security Incident Management and …, 2013 | 18 | 2013 |
Selective imaging: creating efficient forensic images by selecting content first J Stüttgen Mannheim University, 2011 | 11 | 2011 |
Analyse und Vergleich von BckR2D2-I und II A Dewald, FC Freiling, T Schreck, M Spreitzenbarth, J Stuttgen, S Vomel, ... Technical Report, 2011 | 9* | 2011 |
Exploring the landscape of cybercrime Z Benenson, A Dewald, HG Eßer, FC Freiling, T Muller, C Moch, S Vomel, ... 2011 First SysSec Workshop, 71-74, 2011 | 5 | 2011 |
On the viability of memory forensics in compromised environments J Stüttgen Friedrich-Alexander-Universität Erlangen-Nürnberg (FAU), 2015 | 3 | 2015 |
Analyse und Vergleich von BckR2D2-I und II Analysis and Comparison of BckR2D2-I and II A Dewald, FC Freiling, T Schreck, M Spreitzenbarth, J Stüttgen, S Vömel, ... | | 2011 |
Säuberung eines infizierten Windows-Betriebssystems auf Basis von Malware-Analyse-Berichten A Knaus, J Stüttgen, J Göbel, M Engelberth, FC Freiling GI-Edition-Lecture Notes in Informatics, 192, 2011 | | 2011 |
Analysis and Comparison of BckR2D2-I and II A Dewald, FC Freiling, T Schreck, M Spreitzenbarth, J Stüttgen, S Vömel, ... | | |