X
Xiaolu Zhang
Researcher at University of Texas at San Antonio
Publications - 20
Citations - 220
Xiaolu Zhang is an academic researcher from University of Texas at San Antonio. The author has contributed to research in topics: Digital forensics & Password. The author has an hindex of 7, co-authored 18 publications receiving 121 citations. Previous affiliations of Xiaolu Zhang include University of New Haven & Jilin University.
Papers
More filters
Journal ArticleDOI
IoT Botnet Forensics: A Comprehensive Digital Forensic Case Study on Mirai Botnet Servers
TL;DR: This research provides findings tactically useful to forensic investigators, not only from the perspective of what data can be obtained, but also important information about which device they should target for acquisition and investigation to obtain the most investigatively useful information.
Journal ArticleDOI
How Do I Share My IoT Forensic Experience With the Broader Community? An Automated Knowledge Sharing IoT Forensic Platform
TL;DR: An automated knowledge-sharing forensic platform that automatically suggests forensic artifact schemas, derived from case data, but does not include any sensitive data in the final (shared) schema is presented.
Journal ArticleDOI
Breaking into the vault: Privacy, security and forensic analysis of Android vault applications
TL;DR: This work presents case studies and results from analyzing 18 Android vault applications by reverse engineering them and examining the forensic artifacts they produce, and implements a swap attack on 5 18 applications where they achieved unauthorized access to the data by swapping the files that contained the password with a self-created one.
Journal ArticleDOI
Rapid Android Parser for Investigating DEX files (RAPID)
TL;DR: RAPID is presented which is an open source and easy-to-use JAVA library for parsing DEX files and comes with well-documented APIs which allow users to query data directly from the DEX binary files.
Journal ArticleDOI
Frameup: An Incriminatory Attack on Storj: A Peer to Peer Blockchain Enabled Distributed Storage System
TL;DR: A primary account of frameup, an incriminatory attack made possible because of existing implementations in distributed peer to peer storage systems that embrace blockchain and cryptocurrency tokens, and two frameup attacks, both of which take advantage of Storj's implementation.