首页> 外文期刊>Digital investigation >Windows Memory Forensics: Detecting (Unintentionally Hidden Injected Code by Examining Page Table Entries
【24h】

Windows Memory Forensics: Detecting (Unintentionally Hidden Injected Code by Examining Page Table Entries

机译:Windows Memory ForeSensic:通过检查页表条目检测(无意中隐藏的代码

获取原文
获取原文并翻译 | 示例
           

摘要

Malware utilizes code injection techniques to either manipulate other processes (e.g. done by banking trojans) or hide its existence. With some exceptions, such as ROP gadgets, the injected code needs to be executable by the CPU (at least at some point in time). In this work, we cover and evaluate hiding techniques that prevent executable pages (containing injected code) from being reported by current detection tools. These techniques can either be implemented by malware in order to hide its injected code (as already observed) or can, in one case, unintentionally be taken care of by the operating system through its paging mechanism. In a second step, we present an approach to reveal such pages despite the mentioned hiding techniques by examining Page Table Entries. We implement our approach in a plugin for the memory forensic framework Rekall, which automatically reports any memory region containing executable pages, and evaluate it against own implementations of different hiding techniques, as well as against real-world malware samples. (C) 2019 The Author(s). Published by Elsevier Ltd on behalf of DFRWS.
机译:恶意软件利用代码注入技术来操纵其他过程(例如,通过银行木工)或隐藏其存在。对于一些例外,例如ROP小工具,注入的代码需要由CPU(至少在某个时间点)可执行。在这项工作中,我们介绍并评估了通过当前检测工具报告的可执行页面(包含注入代码)的隐藏技术。这些技术可以由恶意软件实现,以便在一个情况下隐藏其注入的代码(如已经观察到)或可以通过其寻呼机制通过操作系统来处理无意地处理。在第二步中,尽管通过检查页表条目,但我们展示了一种方法来揭示这些页面。我们在内存法医框架Rekall中的插件中实现了我们的方法,它自动报告包含可执行页面的任何内存区域,并根据不同隐藏技术的实现,以及对抗真实世界的恶意软件样本来评估它。 (c)2019年作者。 elsevier有限公司代表DFRW出版。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号