windows 7 × 64内存取证的新方法

G. S. Suma, Dija S, Thomas K L
{"title":"windows 7 × 64内存取证的新方法","authors":"G. S. Suma, Dija S, Thomas K L","doi":"10.1109/ICCIC.2014.7238400","DOIUrl":null,"url":null,"abstract":"Due to the ever increasing growth rate of malwares, Memory Forensics has become unavoidable in a cyber crime investigation. This is because physical memory may contain crucial information that is available nowhere in the system hard disk. Memory Forensics deals with collection of forensically sound evidence from physical memory content of Suspect's system. This is a fast growing and challenging field in computer forensics where a live forensic methodology is adopted in order to acquire physical memory content. Analysis of the collected memory dump is very difficult due to the complex data structures in it, especially in Windows ×64 systems. Also, the complexity involved in 64-bit address translation makes the analysis tougher. This translation can be done only after finding an artifact called Directory Table Base (DTB). Even though there are few methods available for finding DTB, none is efficient for adopting in a memory analysis tool. In this paper, a novel methodology for finding DTB in a 64-bit Windows system is described in detail. The paper also explains algorithms for retrieving forensically relevant information like running processes and its associated details from physical memory dump collected from Windows7 × 64 machines.","PeriodicalId":187874,"journal":{"name":"2014 IEEE International Conference on Computational Intelligence and Computing Research","volume":"943 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"A novel methodology for windows 7 × 64 memory forensics\",\"authors\":\"G. S. Suma, Dija S, Thomas K L\",\"doi\":\"10.1109/ICCIC.2014.7238400\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Due to the ever increasing growth rate of malwares, Memory Forensics has become unavoidable in a cyber crime investigation. This is because physical memory may contain crucial information that is available nowhere in the system hard disk. Memory Forensics deals with collection of forensically sound evidence from physical memory content of Suspect's system. This is a fast growing and challenging field in computer forensics where a live forensic methodology is adopted in order to acquire physical memory content. Analysis of the collected memory dump is very difficult due to the complex data structures in it, especially in Windows ×64 systems. Also, the complexity involved in 64-bit address translation makes the analysis tougher. This translation can be done only after finding an artifact called Directory Table Base (DTB). Even though there are few methods available for finding DTB, none is efficient for adopting in a memory analysis tool. In this paper, a novel methodology for finding DTB in a 64-bit Windows system is described in detail. The paper also explains algorithms for retrieving forensically relevant information like running processes and its associated details from physical memory dump collected from Windows7 × 64 machines.\",\"PeriodicalId\":187874,\"journal\":{\"name\":\"2014 IEEE International Conference on Computational Intelligence and Computing Research\",\"volume\":\"943 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2014-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2014 IEEE International Conference on Computational Intelligence and Computing Research\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCIC.2014.7238400\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 IEEE International Conference on Computational Intelligence and Computing Research","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCIC.2014.7238400","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3

摘要

由于恶意软件的增长速度越来越快,记忆取证在网络犯罪调查中不可避免。这是因为物理内存可能包含在系统硬盘中无处可用的关键信息。内存取证处理从嫌疑人系统的物理内存内容中收集的法医可靠证据。这是计算机取证中一个快速发展和具有挑战性的领域,采用现场取证方法来获取物理内存内容。由于所收集的内存转储中的数据结构非常复杂,对其进行分析非常困难,特别是在Windows ×64系统中。此外,64位地址转换的复杂性使得分析更加困难。这种转换只能在找到一个名为目录表基(DTB)的工件之后进行。尽管用于查找DTB的方法很少,但没有一种方法可以有效地用于内存分析工具。本文详细描述了一种在64位Windows系统中查找DTB的新方法。本文还解释了从Windows7 × 64机器收集的物理内存转储中检索法医相关信息(如运行进程及其相关细节)的算法。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
A novel methodology for windows 7 × 64 memory forensics
Due to the ever increasing growth rate of malwares, Memory Forensics has become unavoidable in a cyber crime investigation. This is because physical memory may contain crucial information that is available nowhere in the system hard disk. Memory Forensics deals with collection of forensically sound evidence from physical memory content of Suspect's system. This is a fast growing and challenging field in computer forensics where a live forensic methodology is adopted in order to acquire physical memory content. Analysis of the collected memory dump is very difficult due to the complex data structures in it, especially in Windows ×64 systems. Also, the complexity involved in 64-bit address translation makes the analysis tougher. This translation can be done only after finding an artifact called Directory Table Base (DTB). Even though there are few methods available for finding DTB, none is efficient for adopting in a memory analysis tool. In this paper, a novel methodology for finding DTB in a 64-bit Windows system is described in detail. The paper also explains algorithms for retrieving forensically relevant information like running processes and its associated details from physical memory dump collected from Windows7 × 64 machines.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Automatic generation control of three area hydro-thermal power systems with electric and mechanical governor Analysis of AQM router of network supporting multiple TCP flows Data analytic engineering and its application in earthquake engineering: An overview Comparative analysis of digital image stabilization by using empirical mode decomposition methods Analytical approach towards packet drop attacks in mobile ad-hoc networks
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1