O'Reilly logo

Memory Dump Analysis Anthology, Volume 6 by Dmitry Vostokov

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

PART 14: Intelligence Analysis

Intelligence Analysis Patterns

Being deep into studying intelligence analysis119 while preparing for cyber warfare memory dump analysis presentation we came to an idea of intelligence analysis patterns based on software trace analysis patterns120 and software Narratology (Volume 3, page 342). Basically we consider intelligence data as pseudo-software trace messages with an additional probability field (column). Most of the patterns can be transferred and used immediately in intelligence analysis and we are working on such a map. Because real software trace messages are quite certain (deterministic) where their sequences sometimes not (see, for example, Impossible Trace pattern, page 249) there are some unique ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required