期刊文献+

Digital Forensic Analysis on Runtime Instruction Flow

Digital Forensic Analysis on Runtime Instruction Flow
下载PDF
导出
摘要 Computer system's runtime information is an essential part of the digital evidence. Current digital forensic approaches mainly focus on memory and I/O data, while the runtime instructions from processes are often ignored. We present a novel approach on runtime instruction forensic analysis and have developed a forensic system which collects instruction flow and extracts digital evidence. The system is based on whole-system emulation technique and analysts are allowed to define analysis strategy to improve analysis efficiency and reduce overhead. This forensic approach and system are applicable to binary code analysis, information retrieval and matware forensics.
出处 《China Communications》 SCIE CSCD 2010年第6期112-119,共8页 中国通信(英文版)
关键词 digital forensics dynamic analysis instruction flow virtual machine EMULATION 程序运行 数字取证 指令流 计算机系统 数字证据 信息检索 组成部分 仿真技术
  • 相关文献

参考文献13

  • 1Anon. Bochs: the Open Source IA-32 Emulation Project [ EB/OL ]. http J/boc hs. sourc eforge.net.
  • 2SHARIF M, LANZI A, GIFFIN J, et al. Automatic Reverse Engineering of Malware Emulators [C]// Proceedings of the 30th IEEE Symposium on Security and Privacy(ISSP). IEEE Press, 2009: 94-109.
  • 3YIN H, SONG D. TEMU: Binary Code Analysis via Wholesystem Layered Annotative Execution [R]. Technical Report. Berkeley, 2010.
  • 4MALIN C, CASEY E, AQUILINA J. Malware Forensics: Investigating and Analyzing Malicious Code [ M]. Syngress, 2008.
  • 5DINABURG A, ROYAL P, SHARIF M, et al. Ether: Malware Analysis via Hardware Virtualization Extensions [C]// Proceedings of the 15th ACM Conference on Computer and Communications Security(CCS). New York: ACM, 2008: 51-62.
  • 6MARTIGNONI A, PALEARI R, ROGLIA G, et al. Testing CPU Emulators [C]//Proceedings of the 18th International Symposium on Software Testing and Analysis. New York: ACM, 2009:261-272.
  • 7Anon. What Is Windows PE? [EB/OL]. http://technet.microsoft.c om/en-us/library/dd799308 (WS. 10 ). aspx.
  • 8Anon. SliTaz GNU/Linux [ EB/OL ]. http://www.slitaz. org/ en/.
  • 9MAARTMANN-MOE C, THORKILDSEN S, ARNES A. The Persistence of Memory Forensic Identification and Extraction of Cryptographic Keys [J]. Digital Investiga- tion, 2009, 6(1): 132-140.
  • 10Anon. FIPS 46-2-(DES), Data Encryption Standard[ EB/ OL]. http ://www. itl.nist. gov/fipspubs/fip46-2.htm.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部