首页> 外文期刊>Digital investigation >Extraction of forensically sensitive information from windows physical memory
【24h】

Extraction of forensically sensitive information from windows physical memory

机译:从Windows物理内存中提取取证敏感信息

获取原文
获取原文并翻译 | 示例
           

摘要

Forensic analysis of physical memory is gaining good attention from experts in the community especially after recent development of valuable tools and techniques. Investigators find it very helpful to seize physical memory contents and perform post-incident analysis of this potential evidence. Most of the research carried out focus on enumerating processes and threads by accessing memory resident objects. To collect case-sensitive information from the extracted memory content, the existing techniques usually rely on string matching. The most important contribution of the paper is a new technique for extracting sensitive information from physical memory. The technique is based on analyzing the call stack and the security sensitive APIs. It allows extracting sensitive information that cannot be extracted by string matching-based techniques. In addition, the paper leverages string matching to get a more reliable technique for analyzing and extracting what we called "application/protocol fingerprints". The proposed techniques and their implementation target the machines running under the Windows XP (SP1, SP2) operating system.
机译:物理内存的法医学分析正受到社区专家的广泛关注,尤其是在最近开发了有价值的工具和技术之后。调查人员发现,抓住物理内存内容并对该事件进行事后分析非常有帮助。大多数研究着重于通过访问驻留在内存中的对象来枚举进程和线程。为了从提取的内存内容中收集区分大小写的信息,现有技术通常依赖于字符串匹配。本文最重要的贡献是一种从物理内存中提取敏感信息的新技术。该技术基于分析调用堆栈和安全敏感的API。它允许提取无法通过基于字符串匹配的技术提取的敏感信息。另外,本文利用字符串匹配来获得更可靠的技术来分析和提取我们所谓的“应用程序/协议指纹”。提出的技术及其实现针对的是在Windows XP(SP1,SP2)操作系统下运行的计算机。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号