default search action
Golden G. Richard III
Person information
- affiliation: Louisiana State University, Applied Cybersecurity Lab, Baton Rouge, LA, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j37]Christopher J. Bowen, Andrew Case, Ibrahim M. Baggili, Golden G. Richard III:
A step in a new direction: NVIDIA GPU kernel driver memory forensics. Forensic Sci. Int. Digit. Investig. 49: 301760 (2024) - 2023
- [j36]Raphaela Mettig, Charles Glass, Andrew Case, Golden G. Richard III:
Assessing the threat of Rosetta 2 on Apple Silicon devices. Forensic Sci. Int. Digit. Investig. 46: 301618 (2023) - [c46]Abdullah Alshaya, Adam Kardorff, Christian Facundus, Ibrahim M. Baggili, Golden G. Richard III:
Memory Forensics of the OpenDaylight Software-Defined Networking (SDN) Controller. ARES 2023: 152:1-152:8 - [c45]John Jankura, Hannah Catallo-Stooks, Ibrahim M. Baggili, Golden G. Richard III:
Catch Me if You Can: Analysis of Digital Devices and Artifacts Used in Murder Cases. ICDF2C (1) 2023: 19-32 - 2022
- [j35]Modhuparna Manna, Andrew Case, Aisha I. Ali-Gombe, Golden G. Richard III:
Memory analysis of .NET and .Net Core applications. Digit. Investig. 42(Supplement): 301404 (2022) - [j34]Mohammad M. Jalalzai, Chen Feng, Costas Busch, Golden G. Richard III, Jianyu Niu:
The Hermes BFT for Blockchains. IEEE Trans. Dependable Secur. Comput. 19(6): 3971-3986 (2022) - [c44]Golden G. Richard III, Tim Blazytko:
Checkmate '22: Research on offensive and defensive techniques in the context of Man At The End (MATE) attacks. CCS 2022: 3553-3554 - [e1]Golden G. Richard III, Tim Blazytko:
Proceedings of the 2022 ACM Workshop on Research on offensive and defensive techniques in the context of Man At The End (MATE) attacks, Los Angeles, CA, USA, 11 November 2022. ACM 2022, ISBN 978-1-4503-9881-7 [contents] - [i3]Charles R. Barone IV, Robert Serafin, Ilya Shavrov, Ibrahim M. Baggili, Aisha I. Ali-Gombe, Golden G. Richard III, Andrew Case:
A Reverse Engineering Education Needs Analysis Survey. CoRR abs/2212.07531 (2022) - 2021
- [j33]Ryan D. Maggio, Andrew Case, Aisha I. Ali-Gombe, Golden G. Richard III:
Seance: Divination of tool-breaking changes in forensically important binaries. Digit. Investig. 37 Supplement: 301189 (2021) - [j32]Modhuparna Manna, Andrew Case, Aisha I. Ali-Gombe, Golden G. Richard III:
Modern macOS userland runtime analysis. Digit. Investig. 38: 301221 (2021) - 2020
- [j31]Andrew Case, Ryan D. Maggio, Md Firoz-Ul-Amin, Mohammad M. Jalalzai, Aisha I. Ali-Gombe, Mingxuan Sun, Golden G. Richard III:
Hooktracer: Automatic Detection and Analysis of Keystroke Loggers Using Memory Forensics. Comput. Secur. 96: 101872 (2020) - [j30]Shravya Paruchuri, Andrew Case, Golden G. Richard III:
Gaslight revisited: Efficient and powerful fuzzing of digital forensics tools. Comput. Secur. 97: 101986 (2020) - [j29]Andrew Case, Ryan D. Maggio, Modhuparna Manna, Golden G. Richard III:
Memory Analysis of macOS Page Queues. Digit. Investig. 33 Supplement: 301004 (2020) - [c43]Aisha I. Ali-Gombe, Alexandra Tambaoan, Angela Gurfolino, Golden G. Richard III:
App-Agnostic Post-Execution Semantic Analysis of Android In-Memory Forensics Artifacts. ACSAC 2020: 28-41 - [c42]Sneha Sudhakaran, Aisha I. Ali-Gombe, Augustine Orgah, Andrew Case, Golden G. Richard III:
AmpleDroid Recovering Large Object Files from Android Application Memory. WIFS 2020: 1-6 - [i2]Mohammad M. Jalalzai, Chen Feng, Costas Busch, Golden G. Richard III, Jianyu Niu:
The Hermes BFT for Blockchains. CoRR abs/2007.00186 (2020)
2010 – 2019
- 2019
- [j28]Andrew Case, Mohammad M. Jalalzai, Md Firoz-Ul-Amin, Ryan D. Maggio, Aisha I. Ali-Gombe, Mingxuan Sun, Golden G. Richard III:
HookTracer: A System for Automated and Accessible API Hooks Analysis. Digit. Investig. 29 Supplement: S104-S112 (2019) - [c41]Mohammad M. Jalalzai, Costas Busch, Golden G. Richard III:
Proteus: A Scalable BFT Consensus Protocol for Blockchains. Blockchain 2019: 308-313 - [c40]Mohammad M. Jalalzai, Costas Busch, Golden G. Richard III:
Consistent BFT Performance for Blockchains. DSN (Supplements) 2019: 17-18 - [c39]Mohammad M. Jalalzai, Golden G. Richard III, Costas Busch:
An Experimental Evaluation of BFT Protocols for Blockchains. ICBC 2019: 34-48 - [c38]Aisha I. Ali-Gombe, Sneha Sudhakaran, Andrew Case, Golden G. Richard III:
DroidScraper: A Tool for Android In-Memory Object Recovery and Reconstruction. RAID 2019: 547-559 - [i1]Mohammad M. Jalalzai, Costas Busch, Golden G. Richard III:
Proteus: A Scalable BFT Consesus Protocol for Blockchains. CoRR abs/1903.04134 (2019) - 2018
- [j27]Aisha I. Ali-Gombe, Brendan Saltaformaggio, J. Ramanujam, Dongyan Xu, Golden G. Richard III:
Toward a more dependable hybrid analysis of android malware using aspect-oriented programming. Comput. Secur. 73: 235-248 (2018) - [j26]Nathan Lewis, Andrew Case, Aisha I. Ali-Gombe, Golden G. Richard III:
Memory forensics and the Windows Subsystem for Linux. Digit. Investig. 26 Supplement: S3-S11 (2018) - [c37]Rohit Bhatia, Brendan Saltaformaggio, Seung Jei Yang, Aisha I. Ali-Gombe, Xiangyu Zhang, Dongyan Xu, Golden G. Richard III:
Tipped Off by Your Memory Allocator: Device-Wide User Activity Sequencing from Android Memory Images. NDSS 2018 - 2017
- [j25]Joe Sylve, Lodovico Marziale, Golden G. Richard III:
Modern windows hibernation file analysis. Digit. Investig. 20: 16-22 (2017) - [j24]Andrew Case, Golden G. Richard III:
Memory forensics: The path forward. Digit. Investig. 20: 23-33 (2017) - [j23]Andrew Case, Arghya Kusum Das, Seung-Jong Park, J. Ramanujam, Golden G. Richard III:
Gaslight: A comprehensive fuzzing architecture for memory forensics frameworks. Digit. Investig. 22 Supplement: S86-S93 (2017) - 2016
- [j22]Joe Sylve, Lodovico Marziale, Golden G. Richard III:
Pool tag quick scanning for windows memory analysis. Digit. Investig. 16 Supplement: S25-S32 (2016) - [j21]Andrew Case, Golden G. Richard III:
Detecting objective-C malware through memory forensics. Digit. Investig. 18 Supplement: S3-S10 (2016) - [c36]Anjila Tamrakar, Justin D. Russell, Irfan Ahmed, Golden G. Richard III, Carl F. Weems:
SPICE: A Software Tool for Bridging the Gap Between End-user's Insecure Cyber Behavior and Personality Traits. CODASPY 2016: 124-126 - [c35]Aisha I. Ali-Gombe, Irfan Ahmed, Golden G. Richard III, Vassil Roussev:
AspectDroid: Android App Analysis System. CODASPY 2016: 145-147 - [c34]William E. Johnson, Allison Luzader, Irfan Ahmed, Vassil Roussev, Golden G. Richard III, Cynthia Bailey Lee:
Development of Peer Instruction Questions for Cybersecurity Education. ASE @ USENIX Security Symposium 2016 - [c33]Brendan Saltaformaggio, Rohit Bhatia, Xiangyu Zhang, Dongyan Xu, Golden G. Richard III:
Screen after Previous Screens: Spatial-Temporal Recreation of Android App Displays from Memory Images. USENIX Security Symposium 2016: 1137-1151 - [c32]Aisha I. Ali-Gombe, Golden G. Richard III, Irfan Ahmed, Vassil Roussev:
Don't Touch that Column: Portable, Fine-Grained Access Control for Android's Native Content Providers. WISEC 2016: 79-90 - 2015
- [j20]Andrew Case, Golden G. Richard III:
Advancing Mac OS X rootkit detection. Digit. Investig. 14 Supplement 1: S25-S33 (2015) - [j19]Jonathan Grier, Golden G. Richard III:
Rapid forensic imaging of large disks with sifting collectors. Digit. Investig. 14 Supplement 1: S34-S44 (2015) - [c31]Aisha I. Ali-Gombe, Irfan Ahmed, Golden G. Richard III, Vassil Roussev:
OpSeq: Android Malware Fingerprinting. PPREW@ACSAC 2015: 7:1-7:12 - 2014
- [j18]Golden G. Richard III, Andrew Case:
In lieu of swap: Analyzing compressed RAM in Mac OS X and Linux. Digit. Investig. 11(Supplement 2): S3-S12 (2014) - 2013
- [c30]Irfan Ahmed, Aleksandar Zoranic, Salman Javaid, Golden G. Richard III, Vassil Roussev:
Rule-Based Integrity Checking of Interrupt Descriptor Tables in Cloud Environments. IFIP Int. Conf. Digital Forensics 2013: 305-328 - [c29]Irfan Ahmed, Golden G. Richard III, Aleksandar Zoranic, Vassil Roussev:
Integrity Checking of Function Pointers in Kernel Pools via Virtual Machine Introspection. ISC 2013: 3-19 - 2012
- [j17]Irfan Ahmed, Sebastian Obermeier, Martin Naedele, Golden G. Richard III:
SCADA Systems: Challenges for Forensic Investigators. Computer 45(12): 44-51 (2012) - [j16]Joe Sylve, Andrew Case, Lodovico Marziale, Golden G. Richard III:
Acquisition and analysis of volatile memory from android devices. Digit. Investig. 8(3-4): 175-184 (2012) - [c28]Irfan Ahmed, Aleksandar Zoranic, Salman Javaid, Golden G. Richard III:
ModChecker: Kernel Module Integrity Checking in the Cloud Environment. ICPP Workshops 2012: 306-313 - 2010
- [j15]Andrew Case, Lodovico Marziale, Golden G. Richard III:
Dynamic recreation of kernel data structures for live forensics. Digit. Investig. 7(Supplement): S32-S40 (2010) - [j14]Andrew Case, Lodovico Marziale, Cris Neckar, Golden G. Richard III:
Treasure and tragedy in kmem_cache mining for live forensics investigation. Digit. Investig. 7(Supplement): S41-S47 (2010) - [p1]Lodovico Marziale, Santhi Movva, Golden G. Richard III, Vassil Roussev, Loren Schwiebert:
Massively Threaded Digital Forensics Tools. Handbook of Research on Computational Forensics, Digital Crime, and Investigation 2010: 234-256
2000 – 2009
- 2009
- [c27]Vassil Roussev, Liqiang Wang, Golden G. Richard III, Lodovico Marziale:
A Cloud Computing Platform for Large-Scale Forensic Computing. IFIP Int. Conf. Digital Forensics 2009: 201-214 - [c26]Golden G. Richard III:
A Highly Immersive Approach to Teaching Reverse Engineering. CSET 2009 - 2008
- [j13]Andrew Case, Andrew Cristina, Lodovico Marziale, Golden G. Richard III, Vassil Roussev:
FACE: Automated digital evidence discovery and correlation. Digit. Investig. 5(Supplement): S65-S75 (2008) - [c25]Vassil Roussev, Golden G. Richard III, Lodovico Marziale:
Class-Aware Similarity Hashing for Data Classification. IFIP Int. Conf. Digital Forensics 2008: 101-113 - 2007
- [j12]Golden G. Richard III, Vassil Roussev, Lodovico Marziale:
Forensic discovery auditing of digital evidence containers. Digit. Investig. 4(2): 88-97 (2007) - [j11]Lodovico Marziale, Golden G. Richard III, Vassil Roussev:
Massive threading: Using GPUs to increase the performance of digital forensics tools. Digit. Investig. 4(Supplement): 73-81 (2007) - [j10]Vassil Roussev, Golden G. Richard III, Lodovico Marziale:
Multi-resolution similarity hashing. Digit. Investig. 4(Supplement): 105-113 (2007) - [c24]Golden G. Richard III, Vassil Roussev, Lodovico Marziale:
In-Place File Carving. IFIP Int. Conf. Digital Forensics 2007: 217-230 - 2006
- [j9]Golden G. Richard III, Vassil Roussev:
Next-generation digital forensics. Commun. ACM 49(2): 76-80 (2006) - [j8]Vassil Roussev, Yixin Chen, Timothy Bourg, Golden G. Richard III:
md5bloom: Forensic filesystem hashing revisited. Digit. Investig. 3(Supplement): 82-90 (2006) - [c23]Bin Fu, Golden G. Richard III, Yixin Chen:
Some new approaches for preventing software tampering. ACM Southeast Regional Conference 2006: 655-660 - [c22]Vassil Roussev, Gabriel Perez Priego, Golden G. Richard III:
TouchSync: Lightweight Synchronization for Ad-Hoc Mobile Collaboration. CTS 2006: 181-188 - [c21]Golden G. Richard III, Vassil Roussev:
File System Support for Digital Evidence Bags. IFIP Int. Conf. Digital Forensics 2006: 29-40 - [c20]Vassil Roussev, Golden G. Richard III, Daniel Tingstrom:
dRamDisk: efficient RAM sharing on a commodity cluster. IPCCC 2006 - 2005
- [j7]Frank Adelstein, Prasanth Alla, Robert A. Joyce, Golden G. Richard III:
Physically Locating Wireless Intruders. J. Univers. Comput. Sci. 11(1): 4-19 (2005) - [c19]Frank Adelstein, Yun Gao, Golden G. Richard III:
Automatically Creating Realistic Targets for Digital Forensics Investigation. DFRWS 2005 - [c18]Golden G. Richard III, Vassil Roussev:
Scalpel: A Frugal, High Performance File Carver. DFRWS 2005 - [c17]Lawrence Klos, Golden G. Richard III:
A Reliable Extension to the ODMRP Ad Hoc Multicast Protocol. ICWN 2005: 45-51 - [c16]Yixin Chen, Vassil Roussev, Golden G. Richard III, Yun Gao:
Content-Based Image Retrieval for Digital Forensics. IFIP Int. Conf. Digital Forensics 2005: 271-282 - [c15]Lawrence Klos, Golden G. Richard III:
Reliable ad hoc group communication using local neighborhoods. WiMob (3) 2005: 361-368 - 2004
- [j6]Yun Gao, Golden G. Richard III, Vassil Roussev:
Bluepipe: A Scalable Architecture for On-the-Spot Digital Forensics. Int. J. Digit. EVid. 3(1) (2004) - [c14]Abdulrahman H. Altalhi, Golden G. Richard III:
Load-balanced routing through virtual paths: highly adaptive and efficient routing scheme for ad hoc wireless networks. IPCCC 2004: 407-413 - [c13]Hossam S. Hassanein, Golden G. Richard III:
Message from the Program Co-Chairs. IPCCC 2004: iv - [c12]Frank Adelstein, Prasanth Alla, Robert A. Joyce, Golden G. Richard III:
Physically Locating Wireless Intruders. ITCC (1) 2004: 482- - [c11]Abdulrahman H. Altalhi, Golden G. Richard III:
Virtual Paths Routing: A Highly Dynamic Routing Protocol for Ad Hoc Wireless Networks. PerCom Workshops 2004: 81-86 - 2003
- [j5]Frank Adelstein, Golden G. Richard III, Loren Schwiebert:
Distributed multicast tree generation with dynamic group membership. Comput. Commun. 26(10): 1105-1128 (2003) - [c10]Jérémie Allard, V. Chinta, S. Gundala, Golden G. Richard III:
Jini Meets UPnP: An Architecture for Jini/UPnP Interoperability. SAINT 2003: 268-275 - 2002
- [c9]Jérémie Allard, Paul Gonin, Minoo Singh, Golden G. Richard III:
A User Level Framework for Ad Hoc Routing. LCN 2002: 13-19 - [c8]Lawrence Klos, Golden G. Richard III:
Reliable Group Communication in an Ad Hoc Network. LCN 2002: 458-459 - 2001
- [c7]Changli Jiao, Loren Schwiebert, Golden G. Richard III:
Adaptive Header Compression for Wireless Networks. LCN 2001: 377-378 - 2000
- [j4]Golden G. Richard III:
Service Advertisement and Discovery: Enabling Universal Device Cooperation. IEEE Internet Comput. 4(5): 18-26 (2000) - [c6]Lawrence Klos, Golden G. Richard III:
Julep: an environment for the evaluation of distributed process recovery protocols. PRDC 2000: 169-176 - [c5]Sumi Helal, Choonhwa Lee, Yongguang Zhang, Golden G. Richard III:
An architecture for wireless LAN/WAN integration. WCNC 2000: 1035-1041
1990 – 1999
- 1999
- [c4]Frank Adelstein, Golden G. Richard III, Loren Schwiebert:
Building Dynamic Multicast Trees in Mobile Networks. ICPP Workshops 1999: 17-23 - 1998
- [j3]Golden G. Richard III:
Efficient Vector Time with Dynamic Process Creation and Termination. J. Parallel Distributed Comput. 55(1): 109-120 (1998) - [c3]Frank Adelstein, Frederick A. Hosch, Golden G. Richard III, Loren Schwiebert:
Bessie: Portable Generation of Network Topologies for Simulation. ICCCN 1998: 787-791 - [c2]Golden G. Richard III, Shengru Tu:
On Patterns for Practical Fault Tolerant Software in Java. SRDS 1998: 144-150 - 1997
- [j2]Golden G. Richard III, Mukesh Singhal:
Using vector time to handle multiple failures in distributed systems. IEEE Concurrency 5(2): 50-59 (1997) - 1994
- [j1]Frank Adelstein, Golden G. Richard III, Loren Schwiebert, Rick Parent, Mukesh Singhal:
A Distributed Graphics Library System. Softw. Pract. Exp. 24(4): 363-376 (1994) - 1993
- [c1]Golden G. Richard III, Mukesh Singhal:
Using Logging and Asynchronous Checkpointing to Implement Recoverable Distributed Shared Memory. SRDS 1993: 58-67
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-05 21:02 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint