What the heck is this?

This page contains a BibTeX formatted listing of my publications. If you don't know what this means, just ignore it.



@Misc{kornblum:mtn0901,
  title = {When I'm Sixty Four (Bits)},
  author = {Jesse D. Kornblum},
  month = {August},
  year = {2009},
  note = {{ManTech Tech Note 2009-01}}
}



@Article{kornblum:di09,
  title = {Implementing BitLocker Drive Encryption for Forensic Analysis},
  author = {Jesse D. Kornblum},
  journal = {Digital Investigation},
  year = {2009},
  month = {March},
  pages = {75-84},
  volume = {5},
  number = {3},
}



@InProceedings{kornblum:dfrws08,
  title = {Using JPEG Quantization Tables to Identify Imagery Processed by Software},
  author = {Jesse D. Kornblum},
  booktitle = {Proceedings of the Digital Forensic Workshop},
  month = {August},
  year = {2008},
  pages = {21-25},
  url = {http://www.dfrws.org/2008/proceedings/p21-kornblum.pdf},
}



@Article{kornblum:dfp08,
  title = {Auditing Hash Sets: Lessons Learned from Jurassic Park},
  author = {Jesse D. Kornblum},
  journal = {Digital Forensic Practice},
  volume = {2},
  number = {3},
  month = {July},
  year = {2008},
  pages = {108-112},
  url = {http://dx.doi.org/10.1080/15567280802385477},
}



@Article{libster:osr08,
  title = {Proposal for an Integrated Memory Acquisition Mechanism}, 
  author = {Eugene Libster and Jesse D. Kornblum},
  journal = {Operating Systems Review},
  volume = {42},
  number = {3},
  pages = {14-20},
  month = {April},
  year = {2008},
  url = {http://doi.acm.org/10.1145/1368506.1368510},
}



@Article{kornblum:di07,
  title = {Using Every Part of the Buffalo in Windows Memory Analysis},
  author = {Jesse D. Kornblum},
  journal = {Digital Investigation},
  volume = {4},
  number = {1},
  pages = {24-29},
  month = {March},
  year = {2007},
  url = {http://dx.doi.org/10.1016/j.diin.2006.12.002},
}



@Article{kornblum:ijde06,
  title = {Exploiting the Rootkit Paradox with Windows Memory Analysis},
  author = {Jesse D. Kornblum},
  journal = {International Journal of Digital Evidence},
  volume = {5},
  number = {1},
  month = {Fall},
  year = {2006},
  url = {http://www.utica.edu/academic/institutes/ecii/publications/articles/EFE2FC4D-0B11-BC08-AD2958256F5E68F1.pdf}
}



@Article{carrier:cacm06,
  title = {Standardizing Digital Evidence Storage}, 
  author = {Brian Carrier and Frank Adelstein and Eoghan Casey and Simson L. Garfinkel and Chet Hosmer and Jesse Kornblum and Jim Lyle and Marcus Rogers and Phil Turner},
  journal = {Communications of the ACM},
  volume = {49},
  number = {2},
  month = {February},
  year = {2006},
  url = {http://doi.acm.org/10.1145/1113034.1113071},
}



@InProceedings{kornblum:dfrws06,
  title = {Identifying Almost Identical Files Using Context Triggered Piecewise Hashing},
  author = {Jesse D. Kornblum},
  booktitle = {Proceedings of the Digital Forensic Workshop},
  month = {August},
  year = {2006},
  pages = {91-97},
  url = {http://dfrws.org/2006/proceedings/12-Kornblum.pdf},
}



@Article{kornblum:ijde04,
  title = {The Linux Kernel and the Forensic Acquisition of Hard Disks with an Odd Number of Sectors},
  author = {Jesse D. Kornblum},
  journal = {International Journal of Digital Evidence},
  volume = {3},
  number = {2},
  month = {Fall},
  year = {2004},
  url = {http://www.utica.edu/academic/institutes/ecii/publications/articles/A0B8BE05-BD96-240E-F1BE517A38B48665.pdf},
}



@InProceedings{kornblum:dfrws02,
  title = {Preservation of Fragile Digital Evidence by First Responders},
  author = {Jesse D. Kornblum},
  booktitle = {Proceedings of the Digital Forensic Workshop},
  month = {August},
  year = {2002},
  url = {http://dfrws.org/2002/papers/Papers/Jesse_Kornblum.pdf},
}