1
Vol.106 (2) June 2015 SOUTH AFRICAN INSTITUTE OF ELECTRICAL ENGINEERS 43 VOL 106 No 2 June 2015 SAIEE Africa Research Journal Vol.106 (2) June 2015 SOUTH AFRICAN INSTITUTE OF ELECTRICAL ENGINEERS 1 June 2015 Volume 106 No. 2 www.saiee.org.za Africa Research Journal ISSN 1991-1696 Research Journal of the South African Institute of Electrical Engineers Incorporating the SAIEE Transactions A Sandbox-based Approach to the Deobfuscation and Dissection of PHP-based Malware P. Wrench and B. Irwin .............................................................. 46 e Impact of Triggers on Forensic Acquisition and Analysis of Databases W. K. Hauger and M. S. Olivier .................................................. 64 An Investigation into Reducing ird Party Privacy Breaches during the Investigation of Cybercrime W.J. van Staden ......................................................................... 74 A Multi-faceted Model for IP-based Service Authorization in the Eduroam Network L. Tekeni, R. Botha and K. Thomson.......................................... 83 Secure Separation of Shared Caches in Amp-based Mixed Criticality Systems P. Schnarz, C. Fischer, J. Wietzke, I. Stengel............................. 93 SAIEE AFRICA RESEARCH JOURNAL EDITORIAL STAFF .......................... IFC

VOL 106 No 2 June 2015 SAIEE Africa Research Journalsaieecontent.blob.core.windows.net/wm-418498-cms... · Vol.106 (2) June 2015 SOUTH AFRICAN INSTITUTE OF ELECTRICAL ENGINEERS 1

  • Upload
    others

  • View
    0

  • Download
    0

Embed Size (px)

Citation preview

Page 1: VOL 106 No 2 June 2015 SAIEE Africa Research Journalsaieecontent.blob.core.windows.net/wm-418498-cms... · Vol.106 (2) June 2015 SOUTH AFRICAN INSTITUTE OF ELECTRICAL ENGINEERS 1

Vol.106 (2) June 2015 SOUTH AFRICAN INSTITUTE OF ELECTRICAL ENGINEERS 43

VOL 106 No 2June 2015

SAIEE Africa Research Journal

Vol.106 (2) June 2015 SOUTH AFRICAN INSTITUTE OF ELECTRICAL ENGINEERS 1

June 2015Volume 106 No. 2www.saiee.org.za

Africa Research JournalISSN 1991-1696

Research Journal of the South African Institute of Electrical EngineersIncorporating the SAIEE Transactions A Sandbox-based Approach to the Deobfuscation and Dissection

of PHP-based MalwareP. Wrench and B. Irwin .............................................................. 46

The Impact of Triggers on Forensic Acquisition and Analysisof DatabasesW. K. Hauger and M. S. Olivier .................................................. 64

An Investigation into Reducing Third Party Privacy Breachesduring the Investigation of CybercrimeW.J. van Staden ......................................................................... 74

A Multi-faceted Model for IP-based Service Authorization inthe Eduroam NetworkL. Tekeni, R. Botha and K. Thomson.......................................... 83

Secure Separation of Shared Caches in Amp-based MixedCriticality SystemsP. Schnarz, C. Fischer, J. Wietzke, I. Stengel............................. 93

SAIEE AFRICA RESEARCH JOURNAL EDITORIAL STAFF .......................... IFC