Acknowledgement
Supported by : 한국연구재단
References
- Becher, M, Dornsief, M., and Klein, C.N., "Firewire: all your memory are belong to us," CansetWest 2005, 2005, (cansecwest.com/core05/2005-firewire-cansecwest.pdf).
- Amit Singh, "Accessing Kernel Memory on the x86 Version of Mac OS X, 2006", Mac OS X Internals, 2006, (bonus chapter: http://www.osxbook.com/book/ bonus/chapter8/kma/).
- Apple, Apple Computer, "Mac OS X Security," pp.13, 2009.
- Apple, Apple Computer, "Mac OS X ABI Mach-O File Format Reference," Mac OS X Reference Library, pp.7-10, Feb. 2009.
- Intel, Intel, "System Programming Guide, Part1," Intel 64 and IA-32 Architectures Software Developer Manual Volume 3A, pp116-131, Aug. 2007.
- Apple Computer, Apple Open Source, http://www.opensource.apple.com/
- Python, Python Package: macholib, http://pypi.python.org/pypi/macholib/
- Walters, A, Petroni Jr and N. L, "Volatools: Integrating Volatile Memory Forensics into the Digital Inverstigation Process" Black Hat DC, 2007, (www. blackhat.com/presentations/bh-dc-07/Walters/Paper/bh-dc-07-Walters-WP.pdf)
- Miller, C. and Dino Dai Zovi, D.A. Mac hacker's handbook, Wiley, pp.342-345, 2009.
- Erikson, B., "Runtime Kernel Patching on Mac OS X," Defcon 17, 2009, (http: //defcon.org/images/defcon-17/dc-17-presentations/defcon-17-bosse_eriksson-kernel_patching_on_osx.pdf).
- wowie, "Developing MacOSX Kernel Rootkits," Phrack 66, 2009, (www.phrack. org/issues.html?issue=66&id=16).