跳到主要导航 跳到搜索 跳到主要内容

一种基于隐藏事件触发机制的内存取证方法

  • Chaoyuan Cui
  • , Yonggang Li
  • , Yun Wu*
  • , Licheng Wang
  • *此作品的通讯作者

科研成果: 期刊稿件文章同行评审

摘要

As an important branch of computer forensics, memory forensics can extract and alalyze digital evidence of OS running status, and has become a powerful weapon against cybercrimes. Most of the existed memory forensics approaches obtain memory data completely, and thus contain a large amount of redundant information, which brings inconvenience to subsequent memory analysis. In addition, there is blindness in the selection of forensic time points, especially for malware with hidden characteristics, so it cannot accurately perform real-time forensics when an attack occurs. Because of the volatile and unrecoverable nature of memory, the mismatch between the forensic time point and the attack process will make the forensic content unable to characterize the attack behavior, resulting in invalid forensic data. This study proposes ForenHD, a memory forensics approach based on hidden event trigger mechanism. ForenHD monitors the kernel objects in the target virtual machine in real time by leveraging virtualization technology. It firstly determines hidden objects by analyzing the logical connection and running status of kernel objects, and then uses the discovered hidden objects as the triggering event of memory forensics. Finally ForenHD extracts the code segment information of the hidden object through memory mapping. As a result, real-time and partial memory forensics can be achieved.Experiments on multiple hidden object forensics show ForenHD's feasibility and effectiveness.

投稿的翻译标题A Memory Forensic Method Based on Hidden Event Trigger Mechanism
源语言繁体中文
页(从-至)2278-2290
页数13
期刊Jisuanji Yanjiu yu Fazhan/Computer Research and Development
55
10
DOI
出版状态已出版 - 1 10月 2018
已对外发布

关键词

  • Hidden event
  • Memory forensic
  • Partial forensics
  • Real-time forensic
  • System virtualization technology
  • Trigger mechanism

指纹

探究 '一种基于隐藏事件触发机制的内存取证方法' 的科研主题。它们共同构成独一无二的指纹。

引用此