Blog

Some Use Cases and Discussion
Building Trust in Mobile Devices with BlueRiSC MRoT
467 310 BlueRiSC

The mobile device market has grown tremendously and affects every facet of human life. Mobile attacks can disrupt life-saving operations, endanger personnel, and expose government systems to exploitation. These threats will continue to grow and…

read more
ThreatSCOPE Use Case: Analyzing the Heartbleed OpenSSL vulnerability
450 310 BlueRiSC

To show the applicability of ThreatSCOPE as an analysis tool for real-world vulnerabilities we highlight its capabilities by performing a vulnerability-centric reverse engineering of the OpenSSL library. This example captures the connection points, vulnerability points,…

read more
Bypassing Windows Login Passwords with CaptureGUARD Gateway for Forensic Acquisition
467 310 BlueRiSC

Live memory acquisition is becoming increasingly important for digital investigations. One of the biggest obstacles with memory acquisition, however, is that in many cases a computer under investigation is locked, requiring a password that is…

read more
BlueRiSC DFI New Article (Digital Forensics Investigator): Hardware-Assisted Advanced Forensics and Cyber Threat Detection
1024 682 BlueRiSC

The goal of any computer investigation is to obtain as much evidence as possible from the computer while at the same time ensuring the integrity of the evidence. It is equally important that investigators find…

read more