期刊文献+

基于EPROCESS特征的物理内存查找方法 被引量:3

Searching physical memory method based on EPROCESS characteristics
原文传递
导出
摘要 为了快速定位目标活动进程,提取对应的物理内存数据,分析了Windows系统中进程运行时其EPROCESS结构的特性及作用,提出了基于EPROCESS特征的物理内存查找方法。该方法利用EPROCESS结构的特性,定位出活动进程的EPROCESS结构,找出进程页目录基地址,并根据虚拟地址描述符的功能,提取活动进程物理内存。实验结果表明,该方法能快速、有效地定位活动进程,提取出活动进程物理内存,缩小取证分析范围,提高取证效率。 To quickly locate the target active processes,and extract the corresponding physical memory data,EPROCESS structure's role and characteristics are analyzed.A method of searching physical memory based on EPROCESS characteristics is proposed.This method uses the characteristics of EPROCESS structure,locates active processes' EPROCESS structure,finds out the process page directory base address,and extracts the corresponding physical memory data according to the virtual address descriptor's function.Experiments show that the proposed method can quickly and efficiently locate the target active processes,and extract the corresponding physical memory data.This method narrows the range of forensic analysis and improves evidence collection efficiency.
出处 《重庆邮电大学学报(自然科学版)》 CSCD 北大核心 2013年第1期122-125,131,共5页 Journal of Chongqing University of Posts and Telecommunications(Natural Science Edition)
基金 重庆市教委科学技术研究项目(KJ110505) 重庆市科技攻关计划项目(CSTC 2011AC2155)~~
关键词 计算机取证 EPROCESS 进程 内存 computer forensics EPROCESS process memory
  • 相关文献

参考文献3

二级参考文献27

  • 1胡汉平,梁兴,张宝良.一种主动防御的网络传输系统[J].电子学报,2005,33(4):701-705. 被引量:2
  • 2Schuster A.Searching for processes and threads in microsoft Windows memory dumps[C/OL]//Proceedings of the 2006 Digital Forensic Research Workshop (DFRWS), 2006.http ://www.dfrws.org/2006/proceedings/2-Schuster.pdf.
  • 3Burdach M.Digital forensics of the physical memory[EB/OL].(2005- 03 ).http ://(orensie .seecurc.net/pdf/mburdaeh_digital_forensies of physical_memory.pdf.
  • 4Carvey A.Windows forensic analysis[M/OL]//Sample Chapter:Windows Memory Analysis.[S.l.] : Sgngress, 2007.http ://www.syngress.com/hook_catalog/sample 159749156X.PDF.
  • 5Burdach M.An introduction to Windows memory forensic[EB/OL]. ( 2005 -07 ). http ://forensic. seccure. net/pdf/introduction_to windows_ memory_forensic.pdf.
  • 6Intel Corporation.Intel 64 and IA-32 architectures software developer's manual volume 3A:System programming guide [EB/OL]. (2007-11 ).http://www.intel.com/design/processor/manuals/253668.pdf.
  • 7CNNIC.中国互联网络发展状况统计报告[EB/OL].http://www.cnnic.net.cn/download/2005/2005011801.pdf,2005-02-01/2005-03-19.
  • 8YASINSAC. Computer forensics education[J]. IEEE Security & Privacy Magazine, 2003,1(4):15-23.
  • 9KEVINMandia CHRISProsise 常晓波译.应急响应:计算机犯罪调查[M].北京:清华大学出版社,2002..
  • 10MARK Reith, CLINT Carr, GREGG Gunsch.An examination of digital forensic models[J].International Journal of Digital Evidence. 2002, 1 (3):25-28.

共引文献54

同被引文献20

  • 1Andreas S. Searching for processes and threads in Microsoft Windows memory dumps [ J ]. Digital Investigation : The International Journal of Digital Forensics & Incident, 2006,3:10-16.
  • 2Dolan-Gavitt B. Forensic analysis of the Windows registry in memory[ J]. Digital Investigation: The International Journal of Digital Forensics & Incident, 2008 (5) : $26-$32.
  • 3Zhang Ruichao, Wang Lianhai, Zhang Shuhui. Windows memory analysis based on KPCR[ C]/! 2009 the Fifth In- ternational Conference on Information Assurance and Secur- ity. 2009:677-680.
  • 4Okolica J, Peterson G. Extracting the windows clipboard from physical memory[ J ]. Digital Investigation: The Inter- national Journal of Digital Forensics & Incident, 2011,8: Sl18-S124.
  • 5Funminiyi Olajide, Nick Savage. Forensic extraction of us- er information in continuous block of evidence [ C ]//2011 International Conference on Information Society (i-Socie- ty). 2011:476481.
  • 6Mcrosoft. Word97-2007 Binary File Format(DOC) Specifi- cation [ EB/OL ]. http://www, microsoft, com/intemp/ osp/default, mspx, 2013-03-20.
  • 7Carvey H. Instant messaging investigations on a live Win- dows XP system [ J]. Digital Investigation: The Interna- tional Journal of Digital Forensics & Incident, 2004,1 (4) : 256 -260.
  • 8Zhang Chunxia, Li Xudong, Lin Shuguang, et al. Re- search on status reconversion of VAD in the checkpoint of Windows process [ C ]//The 2010 International Conference on Computer Application and System Modeling(ICCASM). 2010 : 89-93.
  • 9韩敬伟,李树彪.浅析WINDOWS环境下的内存分页机制[J].国外电子测量技术,2008,27(6):35-38. 被引量:2
  • 10钟秀玉.基于FAT32的数据恢复系统的设计[J].计算机应用与软件,2008,25(11):56-57. 被引量:10

引证文献3

二级引证文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部