Abstract
Despite a considerable number of approaches that have been proposed to protect computer systems, cyber-criminal activities are on the rise and forensic analysis of compromised machines and seized devices is becoming essential in computer security.
This article focuses on memory forensics, a branch of digital forensics that extract artifacts from the volatile memory. In particular, this article looks at a key ingredient required by memory forensics frameworks: a precise model of the OS kernel under analysis, also known as
profile
. By using the information stored in the profile, memory forensics tools are able to
bridge the semantic gap
and interpret raw bytes to extract evidences from a memory dump.
A big problem with profile-based solutions is that custom profiles must be created for each and every system under analysis. This is especially problematic for Linux systems, because profiles are not
generic
: they are strictly tied to a specific kernel version and to the configuration used to build the kernel. Failing to create a valid profile means that an analyst cannot unleash the true power of memory forensics and is limited to primitive carving strategies.
For this reason, in this article we present a novel approach that combines source code and binary analysis techniques to automatically generate a profile from a memory dump,
without
relying on any non-public information. Our experiments show that this is a viable solution and that profiles reconstructed by our framework can be used to run many plugins, which are essential for a successful forensics investigation.
Funder
European Research Council
European Unions Horizon 2020
Publisher
Association for Computing Machinery (ACM)
Subject
Safety, Risk, Reliability and Quality,General Computer Science
Reference49 articles.
1. Bug 84052 - Using randomizing structure layout plugin in linux kernel compilation doesn’t generate proper debuginfo;Bugzilla GCC;https://gcc.gnu.org/bugzilla/show_bug.cgi?id=84052,2018
2. Type inference on executables;Caballero Juan;ACM Computing Surveys,2016
3. Dynamic recreation of kernel data structures for live forensics;Case Andrew;Digital Investigation,2010
4. Memory forensics: The path forward;Case Andrew;Digital Investigation,2017
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献