首页 > 最新文献

Forensic Science International-Digital Investigation最新文献

英文 中文
Forensic analysis of OpenAI's ChatGPT mobile application 对 OpenAI 的 ChatGPT 移动应用程序的取证分析
IF 2 4区 医学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-10 DOI: 10.1016/j.fsidi.2024.301801
Evangelos Dragonas , Costas Lambrinoudakis , Panagiotis Nakoutis

Since its public launch, OpenAI's ChatGPT has achieved significant success, attracting millions of users within the first few months of its release. Although numerous similar applications have emerged, none have yet matched the success of OpenAI's ChatGPT. Last year, OpenAI released the ChatGPT mobile app. This application serves a broad range of uses, some of which may be malicious and, unfortunately, it has not yet been parsed by either commercial or open-source tools. Nevertheless, the data stored by this application, such as JSON files that store a user's conversations with ChatGPT, can be instrumental in attributing user actions, discerning perpetrators' knowledge and motivations, and resolving practical investigations. In this paper, OpenAI's ChatGPT mobile application is examined on both Android and iOS operating systems, focusing on potential evidentiary data within. The cloud-native data associated with the app, which can be retrieved through user data export requests are also investigated. The primary objective of this study is to discover artifacts that investigators can use in real-world cases involving this mobile app. Additionally, the authors have contributed to FOSS to support professionals in this field.

自公开发布以来,OpenAI 的 ChatGPT 取得了巨大成功,在发布后的头几个月内就吸引了数百万用户。尽管类似的应用层出不穷,但还没有一款能与 OpenAI 的 ChatGPT 相媲美。去年,OpenAI 发布了 ChatGPT 移动应用程序。该应用程序用途广泛,其中有些可能是恶意的,遗憾的是,商业或开源工具都尚未对其进行解析。然而,该应用程序存储的数据(如存储用户与 ChatGPT 对话的 JSON 文件)有助于确定用户行为的归属、辨别犯罪者的知识和动机以及解决实际调查问题。本文研究了 OpenAI 的 ChatGPT 移动应用程序在 Android 和 iOS 操作系统上的运行情况,重点关注其中潜在的证据数据。本文还研究了与该应用程序相关的云原生数据,这些数据可通过用户数据导出请求进行检索。本研究的主要目的是发现调查人员可在涉及该移动应用程序的真实世界案件中使用的人工制品。此外,作者还为 FOSS 做出了贡献,以支持该领域的专业人员。
{"title":"Forensic analysis of OpenAI's ChatGPT mobile application","authors":"Evangelos Dragonas ,&nbsp;Costas Lambrinoudakis ,&nbsp;Panagiotis Nakoutis","doi":"10.1016/j.fsidi.2024.301801","DOIUrl":"https://doi.org/10.1016/j.fsidi.2024.301801","url":null,"abstract":"<div><p>Since its public launch, OpenAI's ChatGPT has achieved significant success, attracting millions of users within the first few months of its release. Although numerous similar applications have emerged, none have yet matched the success of OpenAI's ChatGPT. Last year, OpenAI released the ChatGPT mobile app. This application serves a broad range of uses, some of which may be malicious and, unfortunately, it has not yet been parsed by either commercial or open-source tools. Nevertheless, the data stored by this application, such as JSON files that store a user's conversations with ChatGPT, can be instrumental in attributing user actions, discerning perpetrators' knowledge and motivations, and resolving practical investigations. In this paper, OpenAI's ChatGPT mobile application is examined on both Android and iOS operating systems, focusing on potential evidentiary data within. The cloud-native data associated with the app, which can be retrieved through user data export requests are also investigated. The primary objective of this study is to discover artifacts that investigators can use in real-world cases involving this mobile app. Additionally, the authors have contributed to FOSS to support professionals in this field.</p></div>","PeriodicalId":48481,"journal":{"name":"Forensic Science International-Digital Investigation","volume":"50 ","pages":"Article 301801"},"PeriodicalIF":2.0,"publicationDate":"2024-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141596810","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"医学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Leveraging metadata in social media forensic investigations: Unravelling digital clues- A survey study 在社交媒体取证调查中利用元数据:揭开数字线索--一项调查研究
IF 2 4区 医学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-08 DOI: 10.1016/j.fsidi.2024.301798
Akarshan Suryal

Survey study explores the pivotal role of metadata in forensic investigations within the realm of social media. Investigating digital clues embedded in metadata unveils a wealth of information crucial for understanding the authenticity and origin of online content. This study delves into the technical intricacies of metadata extraction, shedding light on its potential in verifying the chronology, geolocation, and user interactions on social platforms. By leveraging metadata, forensic experts can unravel the intricate web of digital footprints, enhancing the accuracy and efficiency of social media investigations. The findings of this study contribute to the evolving landscape of digital forensic techniques, addressing contemporary challenges in online information scrutiny.

调查研究探讨了元数据在社交媒体领域法证调查中的关键作用。通过调查元数据中蕴含的数字线索,可以发现大量对了解在线内容的真实性和来源至关重要的信息。本研究深入探讨了元数据提取的复杂技术,揭示了元数据在验证社交平台上的时间顺序、地理位置和用户互动方面的潜力。通过利用元数据,法证专家可以揭开错综复杂的数字足迹之网,提高社交媒体调查的准确性和效率。本研究的发现有助于不断发展的数字取证技术,应对当代在线信息审查的挑战。
{"title":"Leveraging metadata in social media forensic investigations: Unravelling digital clues- A survey study","authors":"Akarshan Suryal","doi":"10.1016/j.fsidi.2024.301798","DOIUrl":"https://doi.org/10.1016/j.fsidi.2024.301798","url":null,"abstract":"<div><p>Survey study explores the pivotal role of metadata in forensic investigations within the realm of social media. Investigating digital clues embedded in metadata unveils a wealth of information crucial for understanding the authenticity and origin of online content. This study delves into the technical intricacies of metadata extraction, shedding light on its potential in verifying the chronology, geolocation, and user interactions on social platforms. By leveraging metadata, forensic experts can unravel the intricate web of digital footprints, enhancing the accuracy and efficiency of social media investigations. The findings of this study contribute to the evolving landscape of digital forensic techniques, addressing contemporary challenges in online information scrutiny.</p></div>","PeriodicalId":48481,"journal":{"name":"Forensic Science International-Digital Investigation","volume":"50 ","pages":"Article 301798"},"PeriodicalIF":2.0,"publicationDate":"2024-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141594840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"医学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Letter to Editor regarding article, “Grand theft API: A forensic analysis of vehicle cloud data” 致编辑的信,内容涉及文章 "Grand theft API:车辆云数据的法证分析"
IF 2 4区 医学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-06 DOI: 10.1016/j.fsidi.2024.301800
Nishchal Soni
{"title":"Letter to Editor regarding article, “Grand theft API: A forensic analysis of vehicle cloud data”","authors":"Nishchal Soni","doi":"10.1016/j.fsidi.2024.301800","DOIUrl":"https://doi.org/10.1016/j.fsidi.2024.301800","url":null,"abstract":"","PeriodicalId":48481,"journal":{"name":"Forensic Science International-Digital Investigation","volume":"50 ","pages":"Article 301800"},"PeriodicalIF":2.0,"publicationDate":"2024-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141596811","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"医学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Key extraction-based lawful access to encrypted data: Taxonomy and survey 基于密钥提取的加密数据合法访问:分类与调查
IF 2 4区 医学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-05 DOI: 10.1016/j.fsidi.2024.301796
Christian Lindenmeier, Andreas Hammer, Jan Gruber, Jonas Röckl, Felix Freiling

The rise of end-to-end encryption has enabled end-users to protect their data to a point that classical techniques of lawful access (seizure of devices, wiretaps) are futile. While there is a heated discussion about regulating the access primitive to end-user devices for law enforcement, little attention is given to the technical design of how evidence should be collected. This is especially critical during remote surveillance, as law enforcement may have unrestricted access to end-user devices over longer periods of time. In this paper, we propose the novel category of key extraction-based lawful interception (KEX-LI), meaning that instead of directly accessing plaintext data, law enforcement only extracts the necessary key material from end-user devices, thus minimizing the requirements of data extraction on end-user devices. When subsequently collecting encrypted data (e.g., via wiretapping), law enforcement can use these keys for decryption. We structure and survey the state-of-the-art of key extraction techniques, thus embedding KEX-LI in the broader context of device forensics. Furthermore, we describe specific requirements for a practical solution to conduct KEX-LI and evaluate currently available technical implementations. Our results are intended to help practitioners select the most suitable techniques as well as to identify research gaps.

端到端加密技术的兴起使终端用户能够保护自己的数据,以至于传统的合法访问技术(扣押设备、窃听)变得徒劳无益。尽管人们在热烈讨论如何规范执法部门对终端用户设备的原始访问,但却很少关注如何收集证据的技术设计。这一点在远程监控过程中尤为重要,因为执法部门可能会在较长时间内不受限制地访问终端用户设备。在本文中,我们提出了基于密钥提取的合法拦截(KEX-LI)这一新颖类别,即执法部门不直接访问明文数据,而只从最终用户设备中提取必要的密钥材料,从而最大限度地减少对最终用户设备的数据提取要求。在随后收集加密数据时(如通过窃听),执法部门可以使用这些密钥进行解密。我们构建并调查了最先进的密钥提取技术,从而将 KEX-LI 嵌入到更广泛的设备取证环境中。此外,我们还描述了进行 KEX-LI 的实用解决方案的具体要求,并对当前可用的技术实现进行了评估。我们的研究结果旨在帮助从业人员选择最合适的技术,并找出研究空白。
{"title":"Key extraction-based lawful access to encrypted data: Taxonomy and survey","authors":"Christian Lindenmeier,&nbsp;Andreas Hammer,&nbsp;Jan Gruber,&nbsp;Jonas Röckl,&nbsp;Felix Freiling","doi":"10.1016/j.fsidi.2024.301796","DOIUrl":"https://doi.org/10.1016/j.fsidi.2024.301796","url":null,"abstract":"<div><p>The rise of end-to-end encryption has enabled end-users to protect their data to a point that classical techniques of lawful access (seizure of devices, wiretaps) are futile. While there is a heated discussion about regulating the access primitive to end-user devices for law enforcement, little attention is given to the technical design of <em>how</em> evidence should be collected. This is especially critical during remote surveillance, as law enforcement may have unrestricted access to end-user devices over longer periods of time. In this paper, we propose the novel category of <em>key extraction-based lawful interception</em> (KEX-LI), meaning that instead of directly accessing plaintext data, law enforcement only extracts the necessary key material from end-user devices, thus minimizing the requirements of data extraction on end-user devices. When subsequently collecting <em>encrypted</em> data (e.g., via wiretapping), law enforcement can use these keys for decryption. We structure and survey the state-of-the-art of key extraction techniques, thus embedding KEX-LI in the broader context of device forensics. Furthermore, we describe specific requirements for a practical solution to conduct KEX-LI and evaluate currently available technical implementations. Our results are intended to help practitioners select the most suitable techniques as well as to identify research gaps.</p></div>","PeriodicalId":48481,"journal":{"name":"Forensic Science International-Digital Investigation","volume":"50 ","pages":"Article 301796"},"PeriodicalIF":2.0,"publicationDate":"2024-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666281724001203/pdfft?md5=77c3dcb49bff2636a03dd9fc94b62337&pid=1-s2.0-S2666281724001203-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141543701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"医学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Formal Concept Analysis approach to hierarchical description of malware threats 对恶意软件威胁进行分级描述的形式概念分析方法
IF 2 4区 医学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-04 DOI: 10.1016/j.fsidi.2024.301797
Manuel Ojeda-Hernández, Domingo López-Rodríguez, Ángel Mora

The problem of intelligent malware detection has become increasingly relevant in the industry, as there has been an explosion in the diversity of threats and attacks that affect not only small users, but also large organisations and governments. One of the problems in this field is the lack of homogenisation or standardisation in the nomenclature used by different antivirus programs for different malware threats. The lack of a clear definition of what a category is and how it relates to individual threats makes it difficult to share data and extract common information from multiple antivirus programs. Therefore, efforts to create a common naming convention and hierarchy for malware are important to improve collaboration and information sharing in this field.

Our approach uses as a tool the methods of Formal Concept Analysis (FCA) to model and attempt to solve this problem. FCA is an algebraic framework able to discover useful knowledge in the form of a concept lattice and implications relating to the detection and diagnosis of suspicious files and threats. The knowledge extracted using this mathematical tool illustrates how formal methods can help prevent new threats and attacks. We will show the results of applying the proposed methodology to the identification of hierarchical relationships between malware.

智能恶意软件检测问题在业界的重要性与日俱增,因为威胁和攻击的多样性急剧增加,不仅影响到小型用户,也影响到大型组织和政府。这一领域的问题之一是不同的杀毒软件对不同恶意软件威胁所使用的术语缺乏统一性或标准化。由于缺乏对类别的明确定义以及类别与单个威胁之间的关系,因此很难从多个杀毒软件中共享数据和提取共同信息。因此,努力为恶意软件创建一个通用的命名规范和层次结构,对于改善该领域的合作和信息共享非常重要。我们的方法使用了形式概念分析(FCA)的方法作为工具,来模拟并尝试解决这一问题。FCA 是一种代数框架,能够以概念网格的形式发现有用的知识,以及与检测和诊断可疑文件和威胁有关的含义。利用这一数学工具提取的知识说明了形式化方法如何有助于预防新的威胁和攻击。我们将展示将所提方法应用于识别恶意软件之间层次关系的结果。
{"title":"A Formal Concept Analysis approach to hierarchical description of malware threats","authors":"Manuel Ojeda-Hernández,&nbsp;Domingo López-Rodríguez,&nbsp;Ángel Mora","doi":"10.1016/j.fsidi.2024.301797","DOIUrl":"https://doi.org/10.1016/j.fsidi.2024.301797","url":null,"abstract":"<div><p>The problem of intelligent malware detection has become increasingly relevant in the industry, as there has been an explosion in the diversity of threats and attacks that affect not only small users, but also large organisations and governments. One of the problems in this field is the lack of homogenisation or standardisation in the nomenclature used by different antivirus programs for different malware threats. The lack of a clear definition of what a category is and how it relates to individual threats makes it difficult to share data and extract common information from multiple antivirus programs. Therefore, efforts to create a common naming convention and hierarchy for malware are important to improve collaboration and information sharing in this field.</p><p>Our approach uses as a tool the methods of Formal Concept Analysis (FCA) to model and attempt to solve this problem. FCA is an algebraic framework able to discover useful knowledge in the form of a concept lattice and implications relating to the detection and diagnosis of suspicious files and threats. The knowledge extracted using this mathematical tool illustrates how formal methods can help prevent new threats and attacks. We will show the results of applying the proposed methodology to the identification of hierarchical relationships between malware.</p></div>","PeriodicalId":48481,"journal":{"name":"Forensic Science International-Digital Investigation","volume":"50 ","pages":"Article 301797"},"PeriodicalIF":2.0,"publicationDate":"2024-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666281724001215/pdfft?md5=697d14b6aecc4eca8d00c3562237fedd&pid=1-s2.0-S2666281724001215-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141543693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"医学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On enhancing memory forensics with FAME: Framework for advanced monitoring and execution 利用 FAME 加强内存取证:高级监控和执行框架
IF 2 4区 医学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-01 DOI: 10.1016/j.fsidi.2024.301757
Taha Gharaibeh , Ibrahim Baggili , Anas Mahmoud

Memory Forensics (MF) is an essential aspect of digital investigations, but practitioners often face time-consuming challenges when using popular tools like the Volatility Framework (VF). VF, a widely-adopted Python-based memory forensics tool, presents difficulties for practitioners due to its slow performance. Thus, in this study, we evaluated methods to accelerate VF without modifying its code by testing four alternative Python Just In Time (JIT) interpreters - CPython, Pyston, PyPy, and Pyjion - using CPython as our baseline. Tests were conducted on 14 memory samples, totaling 173 GB, using a search-intensive VF plugin for Windows hosts. Employing our custom Framework for Advanced Monitoring and Execution (FAME), we deployed interpreters in Docker containers and monitored their real-time performance. A statistically significant difference was observed between the Python JIT interpreters and the standard interpreter. With PyPy emerging as the best interpreter, yielding a 15–20 % performance increase compared to the standard interpreter. Implementing PyPy has the potential to save significant time (many hours) when processing substantial memory samples. FAME enhances the efficiency of deploying and monitoring robust forensic tool testing, fostering reproducible research and yielding reliable results in both MF and the broader field of digital forensics.

内存取证(MF)是数字调查的一个重要方面,但从业人员在使用 Volatility Framework(VF)等流行工具时往往面临耗时的挑战。VF 是一款广泛采用的基于 Python 的内存取证工具,由于其性能缓慢,给从业人员带来了困难。因此,在本研究中,我们以 CPython 为基线,通过测试 CPython、Pyston、PyPy 和 Pyjion 这四种可供选择的 Python 即时(JIT)解释器,评估了在不修改代码的情况下加速 VF 的方法。我们使用 Windows 主机的搜索密集型 VF 插件,对 14 个内存样本(总计 173 GB)进行了测试。我们采用定制的高级监控和执行框架(Framework for Advanced Monitoring and Execution,FAME),在 Docker 容器中部署了解释器,并监控其实时性能。在 Python JIT 解释器和标准解释器之间观察到了统计学上的明显差异。PyPy 成为最佳解释器,与标准解释器相比,性能提高了 15-20%。在处理大量内存样本时,实施 PyPy 有可能节省大量时间(许多小时)。FAME 提高了部署和监控强大取证工具测试的效率,促进了可重复的研究,并在 MF 和更广泛的数字取证领域产生了可靠的结果。
{"title":"On enhancing memory forensics with FAME: Framework for advanced monitoring and execution","authors":"Taha Gharaibeh ,&nbsp;Ibrahim Baggili ,&nbsp;Anas Mahmoud","doi":"10.1016/j.fsidi.2024.301757","DOIUrl":"https://doi.org/10.1016/j.fsidi.2024.301757","url":null,"abstract":"<div><p>Memory Forensics (MF) is an essential aspect of digital investigations, but practitioners often face time-consuming challenges when using popular tools like the Volatility Framework (VF). VF, a widely-adopted Python-based memory forensics tool, presents difficulties for practitioners due to its slow performance. Thus, in this study, we evaluated methods to accelerate VF without modifying its code by testing four alternative Python Just In Time (JIT) interpreters - CPython, Pyston, PyPy, and Pyjion - using CPython as our baseline. Tests were conducted on 14 memory samples, totaling 173 GB, using a search-intensive VF plugin for Windows hosts. Employing our custom Framework for Advanced Monitoring and Execution (FAME), we deployed interpreters in Docker containers and monitored their real-time performance. A statistically significant difference was observed between the Python JIT interpreters and the standard interpreter. With PyPy emerging as the best interpreter, yielding a 15–20 % performance increase compared to the standard interpreter. Implementing PyPy has the potential to save significant time (many hours) when processing substantial memory samples. FAME enhances the efficiency of deploying and monitoring robust forensic tool testing, fostering reproducible research and yielding reliable results in both MF and the broader field of digital forensics.</p></div>","PeriodicalId":48481,"journal":{"name":"Forensic Science International-Digital Investigation","volume":"49 ","pages":"Article 301757"},"PeriodicalIF":2.0,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666281724000763/pdfft?md5=1f7f0db390ef407e9290e4cf098b3028&pid=1-s2.0-S2666281724000763-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141542373","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"医学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
volGPT: Evaluation on triaging ransomware process in memory forensics with Large Language Model volGPT:利用大型语言模型对内存取证中的勒索软件进程进行分流评估
IF 2 4区 医学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-01 DOI: 10.1016/j.fsidi.2024.301756
Dong Bin Oh , Donghyun Kim , Donghyun Kim , Huy Kang Kim

In the face of the harm that ransomware can inflict upon users’ computers, the imperative to efficiently and accurately triage its processes within memory forensics becomes increasingly crucial. However, ransomware perpetrators employ sophisticated techniques, such as process masquerading, to evade detection and analysis. In response to these challenges, we propose a novel ransomware triage method leveraging a Large Language Model (LLM) in conjunction with the Volatility framework, the de-facto standard in memory forensics. We conducted experiments on memory dumps infected by five different ransomware families, utilizing LLM-based approaches. Through extensive experiments, our method named volGPT demonstrated high accuracy in identifying ransomware-related processes within memory dumps. Additionally, our approach exhibited greater efficiency and provided more comprehensive explanations during ransomware triage than other state-of-the-art methods.

面对勒索软件对用户计算机造成的危害,在内存取证中高效、准确地分流勒索软件进程变得越来越重要。然而,勒索软件的实施者采用了复杂的技术(如进程伪装)来逃避检测和分析。为了应对这些挑战,我们提出了一种新颖的勒索软件分流方法,该方法利用大语言模型(LLM),并结合内存取证领域的事实标准--Volatility 框架。我们利用基于 LLM 的方法对五种不同勒索软件家族感染的内存转储进行了实验。通过大量实验,我们名为 volGPT 的方法在识别内存转储中的勒索软件相关进程方面表现出了很高的准确性。此外,与其他最先进的方法相比,我们的方法在勒索软件分流过程中表现出更高的效率,并提供了更全面的解释。
{"title":"volGPT: Evaluation on triaging ransomware process in memory forensics with Large Language Model","authors":"Dong Bin Oh ,&nbsp;Donghyun Kim ,&nbsp;Donghyun Kim ,&nbsp;Huy Kang Kim","doi":"10.1016/j.fsidi.2024.301756","DOIUrl":"https://doi.org/10.1016/j.fsidi.2024.301756","url":null,"abstract":"<div><p>In the face of the harm that ransomware can inflict upon users’ computers, the imperative to efficiently and accurately triage its processes within memory forensics becomes increasingly crucial. However, ransomware perpetrators employ sophisticated techniques, such as process masquerading, to evade detection and analysis. In response to these challenges, we propose a novel ransomware triage method leveraging a Large Language Model (LLM) in conjunction with the Volatility framework, the de-facto standard in memory forensics. We conducted experiments on memory dumps infected by five different ransomware families, utilizing LLM-based approaches. Through extensive experiments, our method named volGPT demonstrated high accuracy in identifying ransomware-related processes within memory dumps. Additionally, our approach exhibited greater efficiency and provided more comprehensive explanations during ransomware triage than other state-of-the-art methods.</p></div>","PeriodicalId":48481,"journal":{"name":"Forensic Science International-Digital Investigation","volume":"49 ","pages":"Article 301756"},"PeriodicalIF":2.0,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666281724000751/pdfft?md5=1146cd1fa02f1199396b49faab24db03&pid=1-s2.0-S2666281724000751-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141542316","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"医学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A step in a new direction: NVIDIA GPU kernel driver memory forensics 向新方向迈进:英伟达™(NVIDIA®)GPU 内核驱动程序内存取证
IF 2 4区 医学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-01 DOI: 10.1016/j.fsidi.2024.301760
Christopher J. Bowen , Andrew Case , Ibrahim Baggili , Golden G. Richard III

In the ever-expanding landscape of computation, graphics processing units have become one of the most essential types of devices for personal and commercial needs. Nearly all modern computers have one or more dedicated GPUs due to advancements in artificial intelligence, high-performance computing, 3D graphics rendering, and the growing demand for enhanced gaming experiences. As the GPU industry continues to grow, forensic investigations will need to incorporate these devices, given that they have large amounts of VRAM, computing power, and are used to process highly sensitive data. Past research has also shown that malware can hide its payloads within these devices and out of the view of traditional memory forensics. While memory forensics research aims to address the critical threat of memory-only malware, no current work focuses on video memory malware and the malicious use of the GPU. Our work investigates the largest GPU manufacturer, NVIDIA, by examining the newly released open-source GPU kernel modules for the development of forensic tool creation. We extend our impact by creating symbol mappings between open and closed-source NVIDIA software that enables researchers to develop tools for both “flavors” of software. We specifically focus our research on artifacts found in RAM, providing the foundational methods to detect and map NVIDIA Object Compiler Structures for forensic investigations. As a part of our analysis and evaluation, we examined the similarities between open-and-closed kernel modules by collecting structure sizes and class IDs to understand the similarities and differences. A standalone tool, NVSYMMAP, and Volatility plugins were created with this foundation to automate this process and provide forensic investigators with knowledge involving processes that utilized the GPU.

在不断扩大的计算领域,图形处理器已成为满足个人和商业需求的最基本设备之一。由于人工智能、高性能计算、3D 图形渲染的进步,以及对增强游戏体验日益增长的需求,几乎所有现代计算机都配备了一个或多个专用 GPU。随着 GPU 行业的不断发展,鉴于这些设备拥有大量的 VRAM 和计算能力,并用于处理高度敏感的数据,因此取证调查将需要结合这些设备。过去的研究还表明,恶意软件可以将其有效载荷隐藏在这些设备中,而不在传统内存取证的视野之内。虽然内存取证研究旨在解决纯内存恶意软件的严重威胁,但目前还没有任何研究关注视频内存恶意软件和对 GPU 的恶意使用。我们的工作通过研究新发布的开源 GPU 内核模块,调查了最大的 GPU 制造商英伟达公司,以开发取证工具的创建。我们在开放源代码和封闭源代码的英伟达软件之间创建了符号映射,使研究人员能够为这两种 "口味 "的软件开发工具,从而扩大了我们的影响。我们将研究重点特别放在 RAM 中发现的人工制品上,为取证调查提供了检测和映射英伟达对象编译器结构的基础方法。作为分析和评估的一部分,我们通过收集结构大小和类 ID 来了解开放式和封闭式内核模块之间的异同。在此基础上,我们创建了独立工具 NVSYMMAP 和 Volatility 插件,以自动执行该流程,并为法证调查人员提供涉及使用 GPU 的进程的知识。
{"title":"A step in a new direction: NVIDIA GPU kernel driver memory forensics","authors":"Christopher J. Bowen ,&nbsp;Andrew Case ,&nbsp;Ibrahim Baggili ,&nbsp;Golden G. Richard III","doi":"10.1016/j.fsidi.2024.301760","DOIUrl":"https://doi.org/10.1016/j.fsidi.2024.301760","url":null,"abstract":"<div><p>In the ever-expanding landscape of computation, graphics processing units have become one of the most essential types of devices for personal and commercial needs. Nearly all modern computers have one or more dedicated GPUs due to advancements in artificial intelligence, high-performance computing, 3D graphics rendering, and the growing demand for enhanced gaming experiences. As the GPU industry continues to grow, forensic investigations will need to incorporate these devices, given that they have large amounts of VRAM, computing power, and are used to process highly sensitive data. Past research has also shown that malware can hide its payloads within these devices and out of the view of traditional memory forensics. While memory forensics research aims to address the critical threat of memory-only malware, no current work focuses on video memory malware and the malicious use of the GPU. Our work investigates the largest GPU manufacturer, NVIDIA, by examining the newly released open-source GPU kernel modules for the development of forensic tool creation. We extend our impact by creating symbol mappings between open and closed-source NVIDIA software that enables researchers to develop tools for both “flavors” of software. We specifically focus our research on artifacts found in RAM, providing the foundational methods to detect and map NVIDIA Object Compiler Structures for forensic investigations. As a part of our analysis and evaluation, we examined the similarities between open-and-closed kernel modules by collecting structure sizes and class IDs to understand the similarities and differences. A standalone tool, NVSYMMAP, and Volatility plugins were created with this foundation to automate this process and provide forensic investigators with knowledge involving processes that utilized the GPU.</p></div>","PeriodicalId":48481,"journal":{"name":"Forensic Science International-Digital Investigation","volume":"49 ","pages":"Article 301760"},"PeriodicalIF":2.0,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666281724000799/pdfft?md5=1b4ae87eaf8d79a9cfad984d68ffa72b&pid=1-s2.0-S2666281724000799-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141542426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"医学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
In the time loop: Data remanence in main memory of virtual machines 在时间循环中虚拟机主内存中的数据重存
IF 2 4区 医学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-01 DOI: 10.1016/j.fsidi.2024.301758
Ella Savchenko, Jenny Ottmann, Felix Freiling

Data remanence in the physical memory of computers, i.e., the fact that data remains temporarily in memory even after power is cut, is a well-known issue which can be exploited for recovering cryptographic keys and other data in forensic investigations. Since virtual machines in many aspects mimic their physical counterparts, we investigate whether data remanence is also observable in virtual machines. Using KVM as an example of virtualization technology, we experimentally show that it is common for a substantial amount of volatile data to remain in the memory of virtual machines after a reboot. In digital forensic analysis scenarios such as malware analysis using virtual machines, our observations imply high risks of evidence contamination if no precautions are taken. So while the symptoms of data remanence in virtual machines are similar to physical machines, the implications for digital forensic analysis appear very different.

计算机物理内存中的数据重现(即断电后数据仍暂时保留在内存中)是一个众所周知的问题,在取证调查中可用于恢复加密密钥和其他数据。由于虚拟机在许多方面都模仿物理机,我们研究了虚拟机中是否也能观察到数据重现。以 KVM 虚拟化技术为例,我们通过实验证明,虚拟机在重启后内存中保留大量易失性数据的情况非常普遍。在使用虚拟机进行恶意软件分析等数字取证分析场景中,我们的观察结果表明,如果不采取预防措施,证据被污染的风险很高。因此,虽然虚拟机中数据残留的症状与物理机类似,但对数字取证分析的影响似乎截然不同。
{"title":"In the time loop: Data remanence in main memory of virtual machines","authors":"Ella Savchenko,&nbsp;Jenny Ottmann,&nbsp;Felix Freiling","doi":"10.1016/j.fsidi.2024.301758","DOIUrl":"https://doi.org/10.1016/j.fsidi.2024.301758","url":null,"abstract":"<div><p>Data remanence in the physical memory of computers, i.e., the fact that data remains temporarily in memory even after power is cut, is a well-known issue which can be exploited for recovering cryptographic keys and other data in forensic investigations. Since virtual machines in many aspects mimic their physical counterparts, we investigate whether data remanence is also observable in virtual machines. Using KVM as an example of virtualization technology, we experimentally show that it is common for a substantial amount of volatile data to remain in the memory of virtual machines after a reboot. In digital forensic analysis scenarios such as malware analysis using virtual machines, our observations imply high risks of evidence contamination if no precautions are taken. So while the symptoms of data remanence in virtual machines are similar to physical machines, the implications for digital forensic analysis appear very different.</p></div>","PeriodicalId":48481,"journal":{"name":"Forensic Science International-Digital Investigation","volume":"49 ","pages":"Article 301758"},"PeriodicalIF":2.0,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666281724000775/pdfft?md5=3abed7c8dec7ac120f070d7062098baf&pid=1-s2.0-S2666281724000775-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141542374","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"医学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
TLS key material identification and extraction in memory: Current state and future challenges 记忆中的 TLS 密钥材料识别和提取:现状与未来挑战
IF 2 4区 医学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-07-01 DOI: 10.1016/j.fsidi.2024.301766
Daniel Baier , Alexander Basse , Jan-Niclas Hilgert , Martin Lambertz

Memory forensics is a crucial part of digital forensics as it can be used to extract valuable information such as running processes, network connections, and encryption keys from memory. The last is especially important when considering the widely used Transport Layer Security (TLS) protocol used to secure internet communication, thus hampering network traffic analysis. Particularly in the context of cybercrime investigations (such as malware analysis), it is therefore paramount for investigators to decrypt TLS traffic. This can provide vital insights into the methods and strategies employed by attackers. For this purpose, it is first and foremost necessary to identify and extract the corresponding TLS key material in memory.

In this paper, we systematize and evaluate the current state of techniques, tools, and methodologies for identifying and extracting TLS key material in memory. We consider solutions from academia but also identify innovative and promising approaches used “in the wild” that are not considered by the academic literature. Furthermore, we identify the open research challenges and opportunities for future research in this domain. Our work provides a profound foundation for future research in this crucial area.

内存取证是数字取证的重要组成部分,因为它可用于从内存中提取运行进程、网络连接和加密密钥等有价值的信息。考虑到广泛使用的传输层安全(TLS)协议用于确保互联网通信安全,从而阻碍了网络流量分析,因此最后一点尤为重要。因此,特别是在网络犯罪调查(如恶意软件分析)中,调查人员必须对 TLS 流量进行解密。这可以为了解攻击者使用的方法和策略提供重要信息。为此,首先必须识别和提取内存中相应的 TLS 密钥材料。在本文中,我们对识别和提取内存中 TLS 密钥材料的技术、工具和方法的现状进行了系统整理和评估。我们考虑了学术界的解决方案,同时也发现了 "野生 "的创新和有前途的方法,但学术文献并未考虑这些方法。此外,我们还确定了该领域未来研究的挑战和机遇。我们的工作为这一关键领域的未来研究奠定了深厚的基础。
{"title":"TLS key material identification and extraction in memory: Current state and future challenges","authors":"Daniel Baier ,&nbsp;Alexander Basse ,&nbsp;Jan-Niclas Hilgert ,&nbsp;Martin Lambertz","doi":"10.1016/j.fsidi.2024.301766","DOIUrl":"https://doi.org/10.1016/j.fsidi.2024.301766","url":null,"abstract":"<div><p>Memory forensics is a crucial part of digital forensics as it can be used to extract valuable information such as running processes, network connections, and encryption keys from memory. The last is especially important when considering the widely used Transport Layer Security (TLS) protocol used to secure internet communication, thus hampering network traffic analysis. Particularly in the context of cybercrime investigations (such as malware analysis), it is therefore paramount for investigators to decrypt TLS traffic. This can provide vital insights into the methods and strategies employed by attackers. For this purpose, it is first and foremost necessary to identify and extract the corresponding TLS key material in memory.</p><p>In this paper, we systematize and evaluate the current state of techniques, tools, and methodologies for identifying and extracting TLS key material in memory. We consider solutions from academia but also identify innovative and promising approaches used “in the wild” that are not considered by the academic literature. Furthermore, we identify the open research challenges and opportunities for future research in this domain. Our work provides a profound foundation for future research in this crucial area.</p></div>","PeriodicalId":48481,"journal":{"name":"Forensic Science International-Digital Investigation","volume":"49 ","pages":"Article 301766"},"PeriodicalIF":2.0,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666281724000854/pdfft?md5=a76adc8897d71246d0088ed7c98c0315&pid=1-s2.0-S2666281724000854-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141542376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"医学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Forensic Science International-Digital Investigation
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1