AutoProfile: Towards Automated Profile Generation for Memory Analysis

Author:

Pagani Fabio1,Balzarotti Davide2

Affiliation:

1. UC Santa Barbara, USA

2. Eurecom, France

Abstract

Despite a considerable number of approaches that have been proposed to protect computer systems, cyber-criminal activities are on the rise and forensic analysis of compromised machines and seized devices is becoming essential in computer security. This article focuses on memory forensics, a branch of digital forensics that extract artifacts from the volatile memory. In particular, this article looks at a key ingredient required by memory forensics frameworks: a precise model of the OS kernel under analysis, also known as profile . By using the information stored in the profile, memory forensics tools are able to bridge the semantic gap and interpret raw bytes to extract evidences from a memory dump. A big problem with profile-based solutions is that custom profiles must be created for each and every system under analysis. This is especially problematic for Linux systems, because profiles are not generic : they are strictly tied to a specific kernel version and to the configuration used to build the kernel. Failing to create a valid profile means that an analyst cannot unleash the true power of memory forensics and is limited to primitive carving strategies. For this reason, in this article we present a novel approach that combines source code and binary analysis techniques to automatically generate a profile from a memory dump, without relying on any non-public information. Our experiments show that this is a viable solution and that profiles reconstructed by our framework can be used to run many plugins, which are essential for a successful forensics investigation.

Funder

European Research Council

European Unions Horizon 2020

Publisher

Association for Computing Machinery (ACM)

Subject

Safety, Risk, Reliability and Quality,General Computer Science

Reference49 articles.

1. Bug 84052 - Using randomizing structure layout plugin in linux kernel compilation doesn’t generate proper debuginfo;Bugzilla GCC;https://gcc.gnu.org/bugzilla/show_bug.cgi?id=84052,2018

2. Type inference on executables;Caballero Juan;ACM Computing Surveys,2016

3. Dynamic recreation of kernel data structures for live forensics;Case Andrew;Digital Investigation,2010

4. Memory forensics: The path forward;Case Andrew;Digital Investigation,2017

Cited by 7 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Systematic review of deep learning solutions for malware detection and forensic analysis in IoT;Journal of King Saud University - Computer and Information Sciences;2024-10

2. BinGo: Identifying Security Patches in Binary Code with Graph Representation Learning;Proceedings of the 19th ACM Asia Conference on Computer and Communications Security;2024-07

3. RandCompile: Removing Forensic Gadgets from the Linux Kernel to Combat its Analysis;Annual Computer Security Applications Conference;2023-12-04

4. Supporting Multiple OS Types on Estimation of System Call Hook Point by Virtual Machine Monitor;2023 Eleventh International Symposium on Computing and Networking Workshops (CANDARW);2023-11-27

5. Memory Analysis Based Estimation of Hook Point by Virtual Machine Monitor;International Journal of Networking and Computing;2023

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3