scispace - formally typeset
X

Xiaolu Zhang

Researcher at University of Texas at San Antonio

Publications -  20
Citations -  220

Xiaolu Zhang is an academic researcher from University of Texas at San Antonio. The author has contributed to research in topics: Digital forensics & Password. The author has an hindex of 7, co-authored 18 publications receiving 121 citations. Previous affiliations of Xiaolu Zhang include University of New Haven & Jilin University.

Papers
More filters
Journal ArticleDOI

IoT Botnet Forensics: A Comprehensive Digital Forensic Case Study on Mirai Botnet Servers

TL;DR: This research provides findings tactically useful to forensic investigators, not only from the perspective of what data can be obtained, but also important information about which device they should target for acquisition and investigation to obtain the most investigatively useful information.
Journal ArticleDOI

How Do I Share My IoT Forensic Experience With the Broader Community? An Automated Knowledge Sharing IoT Forensic Platform

TL;DR: An automated knowledge-sharing forensic platform that automatically suggests forensic artifact schemas, derived from case data, but does not include any sensitive data in the final (shared) schema is presented.
Journal ArticleDOI

Breaking into the vault: Privacy, security and forensic analysis of Android vault applications

TL;DR: This work presents case studies and results from analyzing 18 Android vault applications by reverse engineering them and examining the forensic artifacts they produce, and implements a swap attack on 5 18 applications where they achieved unauthorized access to the data by swapping the files that contained the password with a self-created one.
Journal ArticleDOI

Rapid Android Parser for Investigating DEX files (RAPID)

TL;DR: RAPID is presented which is an open source and easy-to-use JAVA library for parsing DEX files and comes with well-documented APIs which allow users to query data directly from the DEX binary files.
Journal ArticleDOI

Frameup: An Incriminatory Attack on Storj: A Peer to Peer Blockchain Enabled Distributed Storage System

TL;DR: A primary account of frameup, an incriminatory attack made possible because of existing implementations in distributed peer to peer storage systems that embrace blockchain and cryptocurrency tokens, and two frameup attacks, both of which take advantage of Storj's implementation.