首页> 外文会议>IFIP WG 11.9 International Conference on Digital Forensics >RETROFITTING MOBILE DEVICES FOR CAPTURING MEMORY-RESIDENT MALWARE BASED ON SYSTEM SIDE-EFFECTS
【24h】

RETROFITTING MOBILE DEVICES FOR CAPTURING MEMORY-RESIDENT MALWARE BASED ON SYSTEM SIDE-EFFECTS

机译:改装移动设备,用于基于系统副作用捕获内存驻留恶意软件

获取原文

摘要

Sophisticated memory-resident malware that target mobile phone platforms can be extremely difficult to detect and capture. However, triggering volatile memory captures based on observable system side-effects exhibited by malware can harvest live memory that contains memory-resident malware. This chapter describes a novel approach for capturing memory-resident malware on an Android device for future analysis. The approach is demonstrated by making modifications to the Android debuggerd daemon to capture memory while a vulnerable process is being exploited on a Google Nexus 5 phone. The implementation employs an external hardware device to store a memory capture after successful exfiltration from the compromised mobile device.
机译:主控移动电话平台的复杂内存驻留恶意软件可能非常难以检测和捕获。但是,基于恶意软件展示的可观察系统副作用触发易失性存储器捕获可以收集包含内存驻留恶意软件的现场存储器。本章介绍了一种新颖的方法,用于在Android设备上捕获内存驻留恶意软件以备将来分析。通过对Android Debuggerd守护程序进行修改来捕获内存的同时,在谷歌Nexus 5手机上利用易受攻击的过程,可以对该方法进行说明。该实现采用外部硬件设备在从受损移动设备成功exfiltation之后存储内存捕获。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号