Golden G. Richard III

Orcid: 0000-0001-8981-4446

Affiliations:
  • Louisiana State University, Applied Cybersecurity Lab, Baton Rouge, LA, USA


According to our database1, Golden G. Richard III authored at least 85 papers between 1993 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A step in a new direction: NVIDIA GPU kernel driver memory forensics.
Forensic Sci. Int. Digit. Investig., 2024

2023
Assessing the threat of Rosetta 2 on Apple Silicon devices.
Forensic Sci. Int. Digit. Investig., September, 2023

Catch Me if You Can: Analysis of Digital Devices and Artifacts Used in Murder Cases.
Proceedings of the Digital Forensics and Cyber Crime - 14th EAI International Conference, 2023

Memory Forensics of the OpenDaylight Software-Defined Networking (SDN) Controller.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023

2022
The Hermes BFT for Blockchains.
IEEE Trans. Dependable Secur. Comput., 2022

Memory analysis of .NET and .Net Core applications.
Digit. Investig., 2022

A Reverse Engineering Education Needs Analysis Survey.
CoRR, 2022

Checkmate '22: Research on offensive and defensive techniques in the context of Man At The End (MATE) attacks.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
Modern macOS userland runtime analysis.
Digit. Investig., 2021

Seance: Divination of tool-breaking changes in forensically important binaries.
Digit. Investig., 2021

2020
Memory Analysis of macOS Page Queues.
Digit. Investig., 2020

Gaslight revisited: Efficient and powerful fuzzing of digital forensics tools.
Comput. Secur., 2020

Hooktracer: Automatic Detection and Analysis of Keystroke Loggers Using Memory Forensics.
Comput. Secur., 2020

AmpleDroid Recovering Large Object Files from Android Application Memory.
Proceedings of the 12th IEEE International Workshop on Information Forensics and Security, 2020

App-Agnostic Post-Execution Semantic Analysis of Android In-Memory Forensics Artifacts.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

2019
HookTracer: A System for Automated and Accessible API Hooks Analysis.
Digit. Investig., 2019

Proteus: A Scalable BFT Consesus Protocol for Blockchains.
CoRR, 2019

DroidScraper: A Tool for Android In-Memory Object Recovery and Reconstruction.
Proceedings of the 22nd International Symposium on Research in Attacks, 2019

An Experimental Evaluation of BFT Protocols for Blockchains.
Proceedings of the Blockchain - ICBC 2019, 2019

Consistent BFT Performance for Blockchains.
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2019

Proteus: A Scalable BFT Consensus Protocol for Blockchains.
Proceedings of the IEEE International Conference on Blockchain, 2019

2018
Memory forensics and the Windows Subsystem for Linux.
Digit. Investig., 2018

Toward a more dependable hybrid analysis of android malware using aspect-oriented programming.
Comput. Secur., 2018

Tipped Off by Your Memory Allocator: Device-Wide User Activity Sequencing from Android Memory Images.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

2017
Modern windows hibernation file analysis.
Digit. Investig., 2017

Memory forensics: The path forward.
Digit. Investig., 2017

Gaslight: A comprehensive fuzzing architecture for memory forensics frameworks.
Digit. Investig., 2017

2016
Pool tag quick scanning for windows memory analysis.
Digit. Investig., 2016

Detecting objective-C malware through memory forensics.
Digit. Investig., 2016

Don't Touch that Column: Portable, Fine-Grained Access Control for Android's Native Content Providers.
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2016

Screen after Previous Screens: Spatial-Temporal Recreation of Android App Displays from Memory Images.
Proceedings of the 25th USENIX Security Symposium, 2016

Development of Peer Instruction Questions for Cybersecurity Education.
Proceedings of the 2016 USENIX Workshop on Advances in Security Education (ASE 16), 2016

SPICE: A Software Tool for Bridging the Gap Between End-user's Insecure Cyber Behavior and Personality Traits.
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016

AspectDroid: Android App Analysis System.
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016

2015
Rapid forensic imaging of large disks with sifting collectors.
Digit. Investig., 2015

Advancing Mac OS X rootkit detection.
Digit. Investig., 2015

OpSeq: Android Malware Fingerprinting.
Proceedings of the 5th Program Protection and Reverse Engineering Workshop, 2015

2014
In lieu of swap: Analyzing compressed RAM in Mac OS X and Linux.
Digit. Investig., 2014

2013
Integrity Checking of Function Pointers in Kernel Pools via Virtual Machine Introspection.
Proceedings of the Information Security, 16th International Conference, 2013

Rule-Based Integrity Checking of Interrupt Descriptor Tables in Cloud Environments.
Proceedings of the Advances in Digital Forensics IX, 2013

2012
Acquisition and analysis of volatile memory from android devices.
Digit. Investig., 2012

SCADA Systems: Challenges for Forensic Investigators.
Computer, 2012

ModChecker: Kernel Module Integrity Checking in the Cloud Environment.
Proceedings of the 41st International Conference on Parallel Processing Workshops, 2012

2010
Massively Threaded Digital Forensics Tools.
Proceedings of the Handbook of Research on Computational Forensics, 2010

Dynamic recreation of kernel data structures for live forensics.
Digit. Investig., 2010

Treasure and tragedy in <i>kmem_cache</i> mining for live forensics investigation.
Digit. Investig., 2010

2009
A Highly Immersive Approach to Teaching Reverse Engineering.
Proceedings of the 2nd Workshop on Cyber Security Experimentation and Test, 2009

A Cloud Computing Platform for Large-Scale Forensic Computing.
Proceedings of the Advances in Digital Forensics V, 2009

2008
FACE: Automated digital evidence discovery and correlation.
Digit. Investig., 2008

Class-Aware Similarity Hashing for Data Classification.
Proceedings of the Advances in Digital Forensics IV, 2008

2007
Multi-resolution similarity hashing.
Digit. Investig., 2007

Forensic discovery auditing of digital evidence containers.
Digit. Investig., 2007

Massive threading: Using GPUs to increase the performance of digital forensics tools.
Digit. Investig., 2007

In-Place File Carving.
Proceedings of the Advances in Digital Forensics III, 2007

2006
<i>md5bloom</i>: Forensic filesystem hashing revisited.
Digit. Investig., 2006

Next-generation digital forensics.
Commun. ACM, 2006

dRamDisk: efficient RAM sharing on a commodity cluster.
Proceedings of the 25th IEEE International Performance Computing and Communications Conference, 2006

File System Support for Digital Evidence Bags.
Proceedings of the Advances in Digital Forensics II - IFIP International Conference on Digital Forensics, National Centre for Forensic Science, Orlando, Florida, USA, January 29, 2006

TouchSync: Lightweight Synchronization for Ad-Hoc Mobile Collaboration.
Proceedings of the 2006 International Symposium on Collaborative Technologies and Systems, 2006

Some new approaches for preventing software tampering.
Proceedings of the 44st Annual Southeast Regional Conference, 2006

2005
Physically Locating Wireless Intruders.
J. Univers. Comput. Sci., 2005

Reliable ad hoc group communication using local neighborhoods.
Proceedings of the 2005 IEEE International Conference on Wireless And Mobile Computing, 2005

Content-Based Image Retrieval for Digital Forensics.
Proceedings of the Advances in Digital Forensics, 2005

A Reliable Extension to the ODMRP Ad Hoc Multicast Protocol.
Proceedings of the 2005 International Conference on Wireless Networks, 2005

Scalpel: A Frugal, High Performance File Carver.
Proceedings of the Refereed Proceedings of the 5th Annual Digital Forensic Research Workshop, 2005

Automatically Creating Realistic Targets for Digital Forensics Investigation.
Proceedings of the Refereed Proceedings of the 5th Annual Digital Forensic Research Workshop, 2005

2004
Bluepipe: A Scalable Architecture for On-the-Spot Digital Forensics.
Int. J. Digit. EVid., 2004

Virtual Paths Routing: A Highly Dynamic Routing Protocol for Ad Hoc Wireless Networks.
Proceedings of the 2nd IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2004 Workshops), 2004

Message from the Program Co-Chairs.
Proceedings of the 23rd IEEE International Performance Computing and Communications Conference, 2004

Load-balanced routing through virtual paths: highly adaptive and efficient routing scheme for ad hoc wireless networks.
Proceedings of the 23rd IEEE International Performance Computing and Communications Conference, 2004

2003
Distributed multicast tree generation with dynamic group membership.
Comput. Commun., 2003

Jini Meets UPnP: An Architecture for Jini/UPnP Interoperability.
Proceedings of the 2003 Symposium on Applications and the Internet (SAINT 2003), 27-31 January 2003, 2003

2002
Reliable Group Communication in an Ad Hoc Network.
Proceedings of the 27th Annual IEEE Conference on Local Computer Networks (LCN 2002), 2002

A User Level Framework for Ad Hoc Routing.
Proceedings of the 27th Annual IEEE Conference on Local Computer Networks (LCN 2002), 2002

2001
Adaptive Header Compression for Wireless Networks.
Proceedings of the 26th Annual IEEE Conference on Local Computer Networks (LCN 2001), 2001

2000
Service Advertisement and Discovery: Enabling Universal Device Cooperation.
IEEE Internet Comput., 2000

An architecture for wireless LAN/WAN integration.
Proceedings of the 2000 IEEE Wireless Communications and Networking Conference, 2000

Julep: an environment for the evaluation of distributed process recovery protocols.
Proceedings of the 2000 Pacific Rim International Symposium on Dependable Computing (PRDC 2000), 2000

1999
Building Dynamic Multicast Trees in Mobile Networks.
Proceedings of the 1999 International Conference on Parallel Processing Workshops, 1999

1998
Efficient Vector Time with Dynamic Process Creation and Termination.
J. Parallel Distributed Comput., 1998

On Patterns for Practical Fault Tolerant Software in Java.
Proceedings of the Seventeenth Symposium on Reliable Distributed Systems, 1998

Bessie: Portable Generation of Network Topologies for Simulation.
Proceedings of the International Conference On Computer Communications and Networks (ICCCN 1998), 1998

1997
Using vector time to handle multiple failures in distributed systems.
IEEE Concurrency, 1997

1994
A Distributed Graphics Library System.
Softw. Pract. Exp., 1994

1993
Using Logging and Asynchronous Checkpointing to Implement Recoverable Distributed Shared Memory.
Proceedings of the 12th Symposium on Reliable Distributed Systems, 1993


  Loading...