참고문헌
- Michael Hale Ligh, Steven Adair, Blake Hartstein, Mathew Richard, "Malware Analyst's Cookbook and DVD", 에이콘 출판사, pp.715-749, May 2012.
- Mariusz Burdach, "Finding Digital Evidence In Physical Memory", Black Hat USA, Feb 2006.
- Volatility, https://code.google.com/p/volatility/wiki /CommandReference23#kdbgscan, 2013.
- James Okolica, Gilbert L. Peterson, "Windows operating systems agnostic memory analysis", DIGITAL INVESTIGATION 7, pp.48-56, May 2010. https://doi.org/10.1016/j.diin.2010.01.003
- Brendan Dolan-Gavitt, "The VAD tree: A process- eye view of physical memory", DIGITAL INVESTIGATION S4, pp.62-64, Jun 2007.
- Raashid Bhat, "Code Injectin on Window", Strudent Computer Security 2BE, Sep 2011.
- Elia Floio, "When Malware Meets Rootkits", Symantect Security Response, 2005.
- Muteb Alzaidi, Ahmed Alasiri, "The Study of SSDT Hook through Comparative Analysis between Live Response and Memory Image", Master of Information Systems Security Research 2012 Convocation, 2013.
- Volatility, https://code.google.com/p/volatility/, 2013.
- HBGary, http://hbgary.com/products/responder_pro, 2013.
- MANDIANT Redline, http://www.mandiant.com/ resources/download/redline, 2013.
- MANDIANT Redline, "Redline User Guide", MANDIANT, 2012.
- Michael J. Graven, "Finding Evil In Memory", Ninjacon 11, Jun 2011.