300030 Timisoara, Romania, Piata Victoriei nr.3, tel: +40.256-490.771, e-mail: office@cciat.ro
300575 Timisoara, Romania, Bv.Eroilor de la Tisa nr.22, tel: +40.256.490.772, e-mail: office@cciat.ro
Based on forensic analysis patterns, papers involving such collections generally focus on:
If you are looking for a specific research paper, common titles in this domain often include "Forensic Analysis of [Malware Name]" or "Collection and Analysis of Malicious Packages". Sumigo_Collection.zip
Revisiting logical image formats for future digital forensics Based on forensic analysis patterns, papers involving such
: Detailed breakdowns of how the Sumigo malware operates, such as its ability to disable protection features on specific servers like Redis. Based on forensic analysis patterns
: Techniques for identifying and extracting digital evidence left behind by the malware, often stored in structured formats like ZIP or AFF4-L for legal admissibility.
: Using the collection to develop better detection rules (e.g., YARA rules) to identify known variants in a network environment.