<?xml version="1.0"?>
<dblpperson name="Andrew Case" pid="78/11039" n="24">
<person key="homepages/78/11039" mdate="2023-10-03">
<author pid="78/11039">Andrew Case</author>
<url>https://orcid.org/0000-0002-1557-044X</url>
</person>
<r><inproceedings key="conf/acsac/LeaGRAC25" mdate="2026-03-24">
<author pid="420/0729">Darrin Lea</author>
<author pid="397/3812">James M. Ghawaly</author>
<author orcid="0000-0001-8981-4446" pid="64/775">Golden G. Richard III</author>
<author pid="214/9435">Aisha I. Ali-Gombe</author>
<author pid="78/11039">Andrew Case</author>
<title>REx86: A Local Large Language Model for Assisting in x86 Assembly Reverse Engineering.</title>
<booktitle>ACSAC</booktitle>
<year>2025</year>
<pages>108-122</pages>
<crossref>conf/acsac/2025</crossref>
<ee>https://doi.org/10.1109/ACSAC67867.2025.00024</ee>
<url>db/conf/acsac/acsac2025.html#LeaGRAC25</url>
<stream>streams/conf/acsac</stream>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/corr/abs-2510-20975" mdate="2025-11-15">
<author pid="420/0729">Darrin Lea</author>
<author pid="397/3812">James M. Ghawaly</author>
<author pid="64/775">Golden G. Richard III</author>
<author pid="214/9435">Aisha I. Ali-Gombe</author>
<author pid="78/11039">Andrew Case</author>
<title>REx86: A Local Large Language Model for Assisting in x86 Assembly Reverse Engineering.</title>
<year>2025</year>
<month>October</month>
<volume>abs/2510.20975</volume>
<journal>CoRR</journal>
<ee type="oa">https://doi.org/10.48550/arXiv.2510.20975</ee>
<url>db/journals/corr/corr2510.html#abs-2510-20975</url>
<stream>streams/journals/corr</stream>
</article>
</r>
<r><article key="journals/di/BowenCBR24" mdate="2025-04-30">
<author pid="381/8279">Christopher J. Bowen</author>
<author pid="78/11039">Andrew Case</author>
<author orcid="0000-0002-9574-9537" pid="87/5617">Ibrahim M. Baggili</author>
<author pid="64/775">Golden G. Richard III</author>
<title>A step in a new direction: NVIDIA GPU kernel driver memory forensics.</title>
<pages>301760</pages>
<year>2024</year>
<volume>49</volume>
<journal>Forensic Sci. Int. Digit. Investig.</journal>
<number>Supplement</number>
<ee type="oa">https://doi.org/10.1016/j.fsidi.2024.301760</ee>
<url>db/journals/di/di49.html#BowenCBR24</url>
<stream>streams/journals/di</stream>
</article>
</r>
<r><article key="journals/di/MettigGCR23" mdate="2023-10-27">
<author orcid="0000-0002-7261-9289" pid="358/9008">Raphaela Mettig</author>
<author pid="358/9186">Charles Glass</author>
<author pid="78/11039">Andrew Case</author>
<author pid="64/775">Golden G. Richard III</author>
<title>Assessing the threat of Rosetta 2 on Apple Silicon devices.</title>
<pages>301618</pages>
<year>2023</year>
<month>September</month>
<volume>46</volume>
<journal>Forensic Sci. Int. Digit. Investig.</journal>
<ee>https://doi.org/10.1016/j.fsidi.2023.301618</ee>
<url>db/journals/di/di46.html#MettigGCR23</url>
</article>
</r>
<r><article key="journals/di/MannaCAR22" mdate="2025-09-06">
<author pid="305/1196">Modhuparna Manna</author>
<author pid="78/11039">Andrew Case</author>
<author orcid="0009-0006-3229-325X" pid="214/9435">Aisha I. Ali-Gombe</author>
<author pid="64/775">Golden G. Richard III</author>
<title>Memory analysis of .NET and .Net Core applications.</title>
<pages>301404</pages>
<year>2022</year>
<volume>42</volume>
<journal>Digit. Investig.</journal>
<number>Supplement</number>
<ee>https://doi.org/10.1016/j.fsidi.2022.301404</ee>
<url>db/journals/di/di42.html#MannaCAR22</url>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-2212-07531" mdate="2025-09-06">
<author pid="336/3865">Charles R. Barone IV</author>
<author pid="326/1914">Robert Serafin</author>
<author pid="305/9934">Ilya Shavrov</author>
<author orcid="0000-0002-9574-9537" pid="87/5617">Ibrahim M. Baggili</author>
<author orcid="0009-0006-3229-325X" pid="214/9435">Aisha I. Ali-Gombe</author>
<author pid="64/775">Golden G. Richard III</author>
<author orcid="0000-0002-1557-044X" pid="78/11039">Andrew Case</author>
<title>A Reverse Engineering Education Needs Analysis Survey.</title>
<year>2022</year>
<volume>abs/2212.07531</volume>
<journal>CoRR</journal>
<ee type="oa">https://doi.org/10.48550/arXiv.2212.07531</ee>
<url>db/journals/corr/corr2212.html#abs-2212-07531</url>
</article>
</r>
<r><article key="journals/di/MaggioCAR21" mdate="2025-09-06">
<author pid="273/9183">Ryan D. Maggio</author>
<author orcid="0000-0002-1557-044X" pid="78/11039">Andrew Case</author>
<author orcid="0009-0006-3229-325X" pid="214/9435">Aisha I. Ali-Gombe</author>
<author orcid="0000-0001-8981-4446" pid="64/775">Golden G. Richard III</author>
<title>Seance: Divination of tool-breaking changes in forensically important binaries.</title>
<pages>301189</pages>
<year>2021</year>
<volume>37 Supplement</volume>
<journal>Digit. Investig.</journal>
<ee>https://doi.org/10.1016/j.fsidi.2021.301189</ee>
<url>db/journals/di/di37S.html#MaggioCAR21</url>
</article>
</r>
<r><article key="journals/di/MannaCAR21" mdate="2025-09-06">
<author orcid="0000-0002-3681-3754" pid="305/1196">Modhuparna Manna</author>
<author orcid="0000-0002-1557-044X" pid="78/11039">Andrew Case</author>
<author orcid="0009-0006-3229-325X" pid="214/9435">Aisha I. Ali-Gombe</author>
<author orcid="0000-0001-8981-4446" pid="64/775">Golden G. Richard III</author>
<title>Modern macOS userland runtime analysis.</title>
<pages>301221</pages>
<year>2021</year>
<volume>38</volume>
<journal>Digit. Investig.</journal>
<ee>https://doi.org/10.1016/j.fsidi.2021.301221</ee>
<url>db/journals/di/di38.html#MannaCAR21</url>
</article>
</r>
<r><article key="journals/compsec/CaseMFJASR20" mdate="2026-01-30">
<author orcid="0000-0002-1557-044X" pid="78/11039">Andrew Case</author>
<author pid="273/9183">Ryan D. Maggio</author>
<author pid="273/9453">Md Firoz-Ul-Amin</author>
<author pid="237/9791">Mohammad M. Jalalzai</author>
<author orcid="0000-0002-2563-0557" pid="214/9435">Aisha I. Ali-Gombe</author>
<author pid="57/988-1">Mingxuan Sun 0001</author>
<author orcid="0000-0001-8981-4446" pid="64/775">Golden G. Richard III</author>
<title>Hooktracer: Automatic Detection and Analysis of Keystroke Loggers Using Memory Forensics.</title>
<pages>101872</pages>
<year>2020</year>
<volume>96</volume>
<journal>Comput. Secur.</journal>
<ee>https://doi.org/10.1016/j.cose.2020.101872</ee>
<ee>https://www.wikidata.org/entity/Q115054065</ee>
<url>db/journals/compsec/compsec96.html#CaseMFJASR20</url>
</article>
</r>
<r><article key="journals/compsec/ParuchuriCR20" mdate="2023-09-30">
<author pid="273/9140">Shravya Paruchuri</author>
<author orcid="0000-0002-1557-044X" pid="78/11039">Andrew Case</author>
<author orcid="0000-0001-8981-4446" pid="64/775">Golden G. Richard III</author>
<title>Gaslight revisited: Efficient and powerful fuzzing of digital forensics tools.</title>
<pages>101986</pages>
<year>2020</year>
<volume>97</volume>
<journal>Comput. Secur.</journal>
<ee>https://doi.org/10.1016/j.cose.2020.101986</ee>
<ee>https://www.wikidata.org/entity/Q115052538</ee>
<url>db/journals/compsec/compsec97.html#ParuchuriCR20</url>
</article>
</r>
<r><article key="journals/di/CaseMMR20" mdate="2023-09-30">
<author orcid="0000-0002-1557-044X" pid="78/11039">Andrew Case</author>
<author pid="273/9183">Ryan D. Maggio</author>
<author pid="305/1196">Modhuparna Manna</author>
<author orcid="0000-0001-8981-4446" pid="64/775">Golden G. Richard III</author>
<title>Memory Analysis of macOS Page Queues.</title>
<pages>301004</pages>
<year>2020</year>
<volume>33 Supplement</volume>
<journal>Digit. Investig.</journal>
<ee>https://doi.org/10.1016/j.fsidi.2020.301004</ee>
<url>db/journals/di/di33S.html#CaseMMR20</url>
</article>
</r>
<r><inproceedings key="conf/wifs/SudhakaranAOCR20" mdate="2025-09-06">
<author pid="210/3207">Sneha Sudhakaran</author>
<author orcid="0009-0006-3229-325X" pid="214/9435">Aisha I. Ali-Gombe</author>
<author pid="286/6832">Augustine Orgah</author>
<author orcid="0000-0002-1557-044X" pid="78/11039">Andrew Case</author>
<author orcid="0000-0001-8981-4446" pid="64/775">Golden G. Richard III</author>
<title>AmpleDroid Recovering Large Object Files from Android Application Memory.</title>
<pages>1-6</pages>
<year>2020</year>
<booktitle>WIFS</booktitle>
<ee>https://doi.org/10.1109/WIFS49906.2020.9360906</ee>
<crossref>conf/wifs/2020</crossref>
<url>db/conf/wifs/wifs2020.html#SudhakaranAOCR20</url>
</inproceedings>
</r>
<r><article key="journals/di/CaseJFMASR19" mdate="2026-01-30">
<author orcid="0000-0002-1557-044X" pid="78/11039">Andrew Case</author>
<author pid="237/9791">Mohammad M. Jalalzai</author>
<author pid="273/9453">Md Firoz-Ul-Amin</author>
<author pid="273/9183">Ryan D. Maggio</author>
<author orcid="0009-0006-3229-325X" pid="214/9435">Aisha I. Ali-Gombe</author>
<author pid="57/988-1">Mingxuan Sun 0001</author>
<author orcid="0000-0001-8981-4446" pid="64/775">Golden G. Richard III</author>
<title>HookTracer: A System for Automated and Accessible API Hooks Analysis.</title>
<pages>S104-S112</pages>
<year>2019</year>
<volume>29 Supplement</volume>
<journal>Digit. Investig.</journal>
<ee type="oa">https://doi.org/10.1016/j.diin.2019.04.011</ee>
<ee>https://www.wikidata.org/entity/Q127477915</ee>
<url>db/journals/di/di29S.html#CaseJFMASR19</url>
</article>
</r>
<r><inproceedings key="conf/raid/Ali-GombeSCR19" mdate="2021-02-10">
<author pid="214/9435">Aisha I. Ali-Gombe</author>
<author pid="210/3207">Sneha Sudhakaran</author>
<author pid="78/11039">Andrew Case</author>
<author pid="64/775">Golden G. Richard III</author>
<title>DroidScraper: A Tool for Android In-Memory Object Recovery and Reconstruction.</title>
<pages>547-559</pages>
<year>2019</year>
<booktitle>RAID</booktitle>
<ee type="oa">https://www.usenix.org/conference/raid2019/presentation/ali-gombe</ee>
<crossref>conf/raid/2019</crossref>
<url>db/conf/raid/raid2019.html#Ali-GombeSCR19</url>
</inproceedings>
</r>
<r><article key="journals/di/LewisCAR18" mdate="2025-09-06">
<author pid="62/6358">Nathan Lewis</author>
<author orcid="0000-0002-1557-044X" pid="78/11039">Andrew Case</author>
<author orcid="0009-0006-3229-325X" pid="214/9435">Aisha I. Ali-Gombe</author>
<author orcid="0000-0001-8981-4446" pid="64/775">Golden G. Richard III</author>
<title>Memory forensics and the Windows Subsystem for Linux.</title>
<pages>S3-S11</pages>
<year>2018</year>
<volume>26 Supplement</volume>
<journal>Digit. Investig.</journal>
<ee type="oa">https://doi.org/10.1016/j.diin.2018.04.018</ee>
<ee>https://www.wikidata.org/entity/Q129499666</ee>
<url>db/journals/di/di26.html#LewisCAR18</url>
</article>
</r>
<r><article key="journals/di/CaseR17" mdate="2023-09-30">
<author orcid="0000-0002-1557-044X" pid="78/11039">Andrew Case</author>
<author orcid="0000-0001-8981-4446" pid="64/775">Golden G. Richard III</author>
<title>Memory forensics: The path forward.</title>
<pages>23-33</pages>
<year>2017</year>
<volume>20</volume>
<journal>Digit. Investig.</journal>
<ee>https://doi.org/10.1016/j.diin.2016.12.004</ee>
<ee>https://www.wikidata.org/entity/Q69430605</ee>
<url>db/journals/di/di20.html#CaseR17</url>
</article>
</r>
<r><article key="journals/di/CaseDPRR17" mdate="2023-11-12">
<author orcid="0000-0002-1557-044X" pid="78/11039">Andrew Case</author>
<author pid="173/9222">Arghya Kusum Das</author>
<author orcid="0000-0001-7821-7793" pid="42/2979">Seung-Jong Park</author>
<author orcid="0000-0002-4349-1327" pid="r/JRamanujam">J. Ramanujam</author>
<author orcid="0000-0001-8981-4446" pid="64/775">Golden G. Richard III</author>
<title>Gaslight: A comprehensive fuzzing architecture for memory forensics frameworks.</title>
<pages>S86-S93</pages>
<year>2017</year>
<volume>22 Supplement</volume>
<journal>Digit. Investig.</journal>
<ee>https://doi.org/10.1016/j.diin.2017.06.011</ee>
<url>db/journals/di/di22S.html#CaseDPRR17</url>
</article>
</r>
<r><article key="journals/di/CaseR16" mdate="2023-09-30">
<author orcid="0000-0002-1557-044X" pid="78/11039">Andrew Case</author>
<author orcid="0000-0001-8981-4446" pid="64/775">Golden G. Richard III</author>
<title>Detecting objective-C malware through memory forensics.</title>
<pages>S3-S10</pages>
<year>2016</year>
<volume>18 Supplement</volume>
<journal>Digit. Investig.</journal>
<ee>https://doi.org/10.1016/j.diin.2016.04.017</ee>
<url>db/journals/di/di18S.html#CaseR16</url>
</article>
</r>
<r><article key="journals/di/CaseR15" mdate="2023-09-30">
<author orcid="0000-0002-1557-044X" pid="78/11039">Andrew Case</author>
<author orcid="0000-0001-8981-4446" pid="64/775">Golden G. Richard III</author>
<title>Advancing Mac OS X rootkit detection.</title>
<pages>S25-S33</pages>
<year>2015</year>
<volume>14 Supplement 1</volume>
<journal>Digit. Investig.</journal>
<ee type="oa">https://doi.org/10.1016/j.diin.2015.05.005</ee>
<url>db/journals/di/di14.html#CaseR15</url>
</article>
</r>
<r><article key="journals/di/RichardC14" mdate="2023-09-30">
<author orcid="0000-0001-8981-4446" pid="64/775">Golden G. Richard III</author>
<author orcid="0000-0002-1557-044X" pid="78/11039">Andrew Case</author>
<title>In lieu of swap: Analyzing compressed RAM in Mac OS X and Linux.</title>
<pages>S3-S12</pages>
<year>2014</year>
<volume>11</volume>
<journal>Digit. Investig.</journal>
<number>Supplement 2</number>
<ee>https://doi.org/10.1016/j.diin.2014.05.011</ee>
<url>db/journals/di/di11.html#RichardC14</url>
</article>
</r>
<r><article key="journals/di/SylveCMR12" mdate="2023-09-30">
<author pid="56/11038">Joe Sylve</author>
<author orcid="0000-0002-1557-044X" pid="78/11039">Andrew Case</author>
<author pid="15/2325">Lodovico Marziale</author>
<author orcid="0000-0001-8981-4446" pid="64/775">Golden G. Richard III</author>
<title>Acquisition and analysis of volatile memory from android devices.</title>
<pages>175-184</pages>
<year>2012</year>
<volume>8</volume>
<journal>Digit. Investig.</journal>
<number>3-4</number>
<ee>https://doi.org/10.1016/j.diin.2011.10.003</ee>
<url>db/journals/di/di8.html#SylveCMR12</url>
</article>
</r>
<r><article key="journals/di/CaseMR10" mdate="2023-09-30">
<author orcid="0000-0002-1557-044X" pid="78/11039">Andrew Case</author>
<author pid="15/2325">Lodovico Marziale</author>
<author orcid="0000-0001-8981-4446" pid="64/775">Golden G. Richard III</author>
<title>Dynamic recreation of kernel data structures for live forensics.</title>
<pages>S32-S40</pages>
<year>2010</year>
<volume>7</volume>
<journal>Digit. Investig.</journal>
<number>Supplement</number>
<ee>https://doi.org/10.1016/j.diin.2010.05.005</ee>
<url>db/journals/di/di7.html#CaseMR10</url>
</article>
</r>
<r><article key="journals/di/CaseMNR10" mdate="2023-09-30">
<author orcid="0000-0002-1557-044X" pid="78/11039">Andrew Case</author>
<author pid="15/2325">Lodovico Marziale</author>
<author pid="306/3694">Cris Neckar</author>
<author orcid="0000-0001-8981-4446" pid="64/775">Golden G. Richard III</author>
<title>Treasure and tragedy in <i>kmem_cache</i> mining for live forensics investigation.</title>
<pages>S41-S47</pages>
<year>2010</year>
<volume>7</volume>
<journal>Digit. Investig.</journal>
<number>Supplement</number>
<ee>https://doi.org/10.1016/j.diin.2010.05.006</ee>
<url>db/journals/di/di7.html#CaseMNR10</url>
</article>
</r>
<r><article key="journals/di/CaseCMRR08" mdate="2023-09-30">
<author orcid="0000-0002-1557-044X" pid="78/11039">Andrew Case</author>
<author pid="47/3016">Andrew Cristina</author>
<author pid="15/2325">Lodovico Marziale</author>
<author orcid="0000-0001-8981-4446" pid="64/775">Golden G. Richard III</author>
<author pid="67/1885">Vassil Roussev</author>
<title>FACE: Automated digital evidence discovery and correlation.</title>
<pages>S65-S75</pages>
<year>2008</year>
<volume>5</volume>
<journal>Digit. Investig.</journal>
<number>Supplement</number>
<ee>https://doi.org/10.1016/j.diin.2008.05.008</ee>
<url>db/journals/di/di5.html#CaseCMRR08</url>
</article>
</r>
<coauthors n="28" nc="1">
<co c="0"><na f="a/Ali=Gombe:Aisha_I=" pid="214/9435">Aisha I. Ali-Gombe</na></co>
<co c="0"><na f="b/Baggili:Ibrahim_M=" pid="87/5617">Ibrahim M. Baggili</na></co>
<co c="0"><na f="b/Barone_IV:Charles_R=" pid="336/3865">Charles R. Barone IV</na></co>
<co c="0"><na f="b/Bowen:Christopher_J=" pid="381/8279">Christopher J. Bowen</na></co>
<co c="0"><na f="c/Cristina:Andrew" pid="47/3016">Andrew Cristina</na></co>
<co c="0"><na f="d/Das:Arghya_Kusum" pid="173/9222">Arghya Kusum Das</na></co>
<co c="0"><na f="f/Firoz=Ul=Amin:Md" pid="273/9453">Md Firoz-Ul-Amin</na></co>
<co c="0"><na f="g/Ghawaly:James_M=" pid="397/3812">James M. Ghawaly</na></co>
<co c="0"><na f="g/Glass:Charles" pid="358/9186">Charles Glass</na></co>
<co c="0"><na f="j/Jalalzai:Mohammad_M=" pid="237/9791">Mohammad M. Jalalzai</na></co>
<co c="0"><na f="l/Lea:Darrin" pid="420/0729">Darrin Lea</na></co>
<co c="0"><na f="l/Lewis:Nathan" pid="62/6358">Nathan Lewis</na></co>
<co c="0"><na f="m/Maggio:Ryan_D=" pid="273/9183">Ryan D. Maggio</na></co>
<co c="0"><na f="m/Manna:Modhuparna" pid="305/1196">Modhuparna Manna</na></co>
<co c="0"><na f="m/Marziale:Lodovico" pid="15/2325">Lodovico Marziale</na></co>
<co c="0"><na f="m/Mettig:Raphaela" pid="358/9008">Raphaela Mettig</na></co>
<co c="0"><na f="n/Neckar:Cris" pid="306/3694">Cris Neckar</na></co>
<co c="0"><na f="o/Orgah:Augustine" pid="286/6832">Augustine Orgah</na></co>
<co c="0"><na f="p/Park:Seung=Jong" pid="42/2979">Seung-Jong Park</na></co>
<co c="0"><na f="p/Paruchuri:Shravya" pid="273/9140">Shravya Paruchuri</na></co>
<co c="0"><na f="r/Ramanujam:J=" pid="r/JRamanujam">J. Ramanujam</na></co>
<co c="0"><na f="r/Richard_III:Golden_G=" pid="64/775">Golden G. Richard III</na></co>
<co c="0"><na f="r/Roussev:Vassil" pid="67/1885">Vassil Roussev</na></co>
<co c="0"><na f="s/Serafin:Robert" pid="326/1914">Robert Serafin</na></co>
<co c="0"><na f="s/Shavrov:Ilya" pid="305/9934">Ilya Shavrov</na></co>
<co c="0"><na f="s/Sudhakaran:Sneha" pid="210/3207">Sneha Sudhakaran</na></co>
<co c="0"><na f="s/Sun_0001:Mingxuan" pid="57/988-1">Mingxuan Sun 0001</na></co>
<co c="0"><na f="s/Sylve:Joe" pid="56/11038">Joe Sylve</na></co>
</coauthors>
</dblpperson>

