CSC 4630: Reverse Engineering and Malware Analysis
CSC 4362: Software Vulnerabilities and Exploitation
CSC 7360: Memory Forensics
Cybersecurity
Digital Forensics
Memory Forensics
Reverse Engineering
Malware Analysis
Operating Systems
Vulnerability Analysis
Exploit Development
Bowen, C. J., Case, A., Baggili, I., & Richard III, G. G. (2024). A step in a new
direction: NVIDIA GPU kernel driver memory forensics. Forensic Science International:
Digital Investigation, 49, 301760.
Jankura, J., Catallo-Stooks, H., Baggili, I., & Richard, G. (2023, November). Catch
Me if You Can: Analysis of Digital Devices and Artifacts Used in Murder Cases. In
International Conference on Digital Forensics and Cyber Crime (pp. 19-32). Cham: Springer
Nature Switzerland.
Mettig, R., Glass, C., Case, A., & Richard III, G. G. (2023). Assessing the threat
of Rosetta 2 on Apple Silicon devices. Forensic Science International: Digital Investigation,
46, 301618.
Alshaya, A., Kardorff, A., Facundus, C., Baggili, I., & Richard III, G. (2023, August).
Memory forensics of the OpenDaylight software-defined networking (SDN) controller.
In Proceedings of the 18th International Conference on Availability, Reliability and
Security (pp. 1-8).
Pace, L. R., Salmon, L. A., Bowen, C. J., Baggili, I., & Richard III, G. G. (2023).
Every step you take, I'll be tracking you: Forensic analysis of the tile tracker application.
Forensic science international: digital investigation, 45, 301559.
Ali-Gombe, A., Sudhakaran, S., Vijayakanthan, R., & Richard III, G. G. (2023). cRGB_Mem:
At the intersection of memory forensics and machine learning. Forensic Science International:
Digital Investigation, 45, 301564.
Barone IV, C. R., Serafin, R., Shavrov, I., Baggili, I., Ali-Gombe, A., Richard III,
G. G., & Case, A. (2022). A Reverse Engineering Education Needs Analysis Survey. arXiv
preprint arXiv:2212.07531.
Richard III, G. G., & Blazytko, T. (2022, November). Checkmate'22: Research on offensive
and defensive techniques in the context of Man At The End (MATE) attacks. In Proceedings
of the 2022 ACM SIGSAC Conference on Computer and Communications Security (pp. 3553-3554).
Manna, M., Case, A., Ali-Gombe, A., & Richard III, G. G. (2022). Memory analysis of.
net and. net core applications. Forensic Science International: Digital Investigation,
42, 301404.
Sudhakaran, S., Ali-Gombe, A., Case, A., & III, G. G. R. (2022, March). Evaluating
the Reliability of Android Userland Memory Forensics. In Proceedings of the 17th International
Conference on Information Warfare and Security (p. 423).
2025: Source: NextFlex, Title: ADP90: NASIC T-2 Program FY24, Co-PI: Golden Richard
III, $136,415.
2024-2025: Source: NextFlex, Title: ADP68: NASIC T-2 Program FY23, PI: Golden Richard
III, $187,218.
2024-2026: Source: National Science Foundation (NSF), Title: NSF POSE: Phase II: Harnessing
Open High Performance Computing (HPC) Through HPX, Co-PI: Golden Richard III, $1.5M.
2024-2026: Source: CINA/ Department of Homeland Security (DHS), Title: Adding STIX
Support to the Volatility Memory Forensics Framework, PI: Golden Richard III, $500,000.
2024-2026: Source: CINA/Department of Homeland Security (DHS), Title: Memory Forensics-Guided
Execution Reconstruction for Android Devices, Co-PI: Golden Richard III, $500,000
2023-2025: Source: National Security Agency (NSA), Title: LSU Cyber Clinic for Small
Businesses, Co-PI: Golden Richard III, $1.5M.
2020-2025: Source: National Science Foundation (NSF), Title: SFS: CyberCorps Scholarships
for Service at Louisiana State University, PI: Golden Richard III, $3,658,221. Additional
supplemented expected during Spring 2025.
This website uses cookies to ensure site visitors get the best experience on our website. By continuing to use this site, you accept our use of cookies and Privacy Statement. To learn more, please visit LSU Privacy Statement.