Recent Funding

  • "SFS: CyberCorps Scholarships for Service at Louisiana State University," National Science Foundation, PI: Golden G. Richard III (with many collaborators from LSU Engineering and ISDS), 2020-2024, $3,358,221.
  • "SaTC: CORE: Medium: Robust Memory Forensics Techniques for Userland Malware Analysis," National Science Foundation, PI: Golden G. Richard III (with A. Case of the Volatility Foundation), 2017-2020, $1,113,426.
  • "Introducing Active Learning to Malware Analysis Curricula," National Security Agency, PI: Golden G. Richard III (with A. Ali-Gombe of Towson University), 2018, $220,643.

Recent Publications

  • G. G. Richard III, A. Case, M. Modhuparna, E. Hahne, Aisha Ali-Gombe, Digital Investigation and the Trojan Defense, Revisited. In: Ijeh AC, Curran K, editors. Crime Science and Digital Forensics: A Holistic View, Science Publishers, an imprint of CRC press (Taylor and Francis Group), Boca Raton, FL, USA. 2020.
  • A. Orgah,  G. G. Richard III, A. Case, "MemForC: Memory Forensics Corpus Creation for Malware Analysis," Proceedings of the 16th International Conference on Cyber Warfare and Security, 2021.
  • S. Sudhakaran, A. Ali-Gombe, A. Orgah, A. Case, G. G. Richard III, "AmpleDroid Recovering Large Object Files from Android Application Memory," Proceedings of the IEEE Inter-national Workshop on Information Forensics and Security, 2020.
  • A. Ali-Gombe, A. Tambaoan, A. Gurfolino, G. G. Richard III, "App-Agnostic Post-Execution Semantic Analysis of Android In-Memory Forensics Artifacts," Proceedings of the Annual Computer Security Applications Conference (ACSAC), 2020.
  • S. Paruchuri, A. Case, G. G. Richard III, "Gaslight Revisited: Efficient and Powerful Fuzzing of Digital Forensics Tools," Computers and Security, vol. 97, 2020.
  • A. Case, R. Maggio, M. Firoz-Ul-Amin, M. Jalalzai, A. Ali-Gombe, M. Sun, G. G. Richard III, "Hooktracer: Automatic Detection and Analysis of Keystroke Loggers Using Memory Forensics", Computers and Security, vol. 96, 2020.
  • A. Case, R. Maggio, M. Manna, G. G. Richard III, "Memory Analysis of macOS Page Queues," Proceedings of the 2020 Digital Forensics Research Conference (DFRWS), July 2020, Memphis, TN.
  • A. Ali-Gombe, S. Sudhakaran, A. Case, G. G. Richard III, "DroidScraper: A Tool for Android In-Memory Object Recovery and Reconstruction," Proceedings of the 22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2019), Beijing, China, 2019.
  • M. Jalalzai, C. Busch, G. G. Richard III, "Proteus: Proteus: A Scalable BFT Consensus Protocol for Blockchains," Proceedings of the 2nd IEEE International Conference on Blockchain (Blockchain-2019), Atlanta, GA, 2019.
  • M. Jalalzai, C. Busch, G. G. Richard III, "An Experimental Evaluation of BFT Protocols for Blockchains," Proceedings of the 2019 International Conference on Blockchain (ICBC 2019), San Diego, CA, 2019.
  • A. Case, M. Jalalzai, M Firoz-Ul-Amin, R. Maggio, A. Ali-Gombe, M. Sun, G. G. Richard III, "HookTracer: A System for Automated and Accessible API Hooks Analysis," Proceedings of the 2019 Digital Forensics Research Conference (DFRWS), July 2019, Portland, OR.
  • C. Weems, I. Ahmed, G. G. Richard III, J. Russell, E. Neil, "Susceptibility and Resilience to Cyber Threat: Findings from a Scenario Decision Program to Measure Secure and Insecure Computing Behavior," PLOS ONE, 2018.
  • N. Lewis, A. Case, A. Ali-Gombe, G. G. Richard III, "Memory Forensics and the Windows Subsystem for Linux," Proceedings of the 2018 Digital Forensics Research Conference (DFRWS), Best Student Paper Award, July 2018, Providence RI.
  • R. Bhatia, B. Saltaformaggio, S. J. Yang, A. Ali-Gombe, X. Zhang, D. Xu, G. G. Richard III, "Tipped Off by Your Memory Allocator: Device-Wide User Activity Sequencing from Android Memory Images," Proceedings of the 2018 Network and Distributed System Security Symposium (NDSS 2018), February 2018, San Diego, CA.
  • A. Ali-Gombe, B. Saltaformaggio, R. Ramanujam, D. Xu, G. G. Richard III, "Towards a More Dependable Hybrid Analysis of Android Malware Using Aspect-Oriented Programming," Computers and Security (COSE), vol. 73, March 2018.
  • A. Case, A. Das, S-J Park, R. Ramanujam, G. G. Richard III, "Gaslight: A Comprehensive Fuzzing Architecture for Memory Forensics Frameworks," Proceedings of the 2017 Digital Forensics Research Conference (DFRWS), August 2017, Austin, TX.
  • J. D. Russell, C. F. Weems, I. Ahmed, G. G. Richard III, "Self-reported Secure and Insecure Cyber Behavior: Factor Structure and Associations with Personality Factors," Journal of Cyber Security Technology. DOI:10.1080/23742917.2017.1345271.
  • A. Case, G. G. Richard III, “Memory Forensics: The Path Forward,” Journal of Digital Investigation, (20)3, pp. 23-33, 2017.