In the Land of MMUs: Multiarchitecture OS-Agnostic Virtual Memory Forensics
-
Published:2022-07-09
Issue:4
Volume:25
Page:1-32
-
ISSN:2471-2566
-
Container-title:ACM Transactions on Privacy and Security
-
language:en
-
Short-container-title:ACM Trans. Priv. Secur.
Author:
Oliveri Andrea1ORCID,
Balzarotti Davide1ORCID
Affiliation:
1. Eurecom, Sophia-Antipolis, France
Abstract
The first step required to perform any analysis of a physical memory image is the reconstruction of the virtual address spaces, which allows translating virtual addresses to their corresponding physical offsets. However, this phase is often overlooked, and the challenges related to it are rarely discussed in the literature. Practical tools solve the problem by using a set of custom heuristics tailored on a very small number of well-known operating systems (OSs) running on few architectures.
In this article, we look for the first time at all the different ways the virtual to physical translation can be operated in 10 different CPU architectures. In each case, we study the inviolable constraints imposed by the memory management unit that can be used to build signatures to recover the required data structures from memory without any knowledge about the running OS. We build a proof-of-concept tool to experiment with the extraction of virtual address spaces showing the challenges of performing an OS-agnostic virtual to physical address translation in real-world scenarios. We conduct experiments on a large set of 26 different OSs and a use case on a real hardware device. Finally, we show a possible usage of our technique to retrieve information about user space processes running on an unknown OS without any knowledge of its internals.
Funder
European Research Council
European Unions Horizon 2020
Publisher
Association for Computing Machinery (ACM)
Subject
Safety, Risk, Reliability and Quality,General Computer Science
Reference67 articles.
1. Forensic memory analysis: From stack and code to execution history
2. Cellbrite. https://cellebrite.com/en/home/.
3. Buildroot Association. 2022. Home Page. Retrieved April 2, 2022 from https://buildroot.org/.
4. Apple Inc. 2022. Darwin OS. Retrieved April 2, 2022 from https://github.com/apple/darwin-xnu.
5. Embox Developers Embox OS. https://github.com/embox/embox.
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Enhancing Reliability During Physical Memory Forensics: Strategies and Practices;SN Computer Science;2024-01-12
2. Design and Implementation of Memory Management Unit for LoongArch Architecture;Proceedings of the 2023 7th International Conference on Electronic Information Technology and Computer Engineering;2023-10-20