earticle

논문검색

Incident-driven memory snapshot for full-virtualized OS using interruptive debugging techniques

초록

영어

Memory forensics is growing concern. For effective evidence retrieval, it is important to take snapshot timely. With proper modification of guest OS, VMM is powerful tool for timely snapshot. In this paper, we propose an incident-driven memory snapshot for full-virtualized OS using interruptive debugging techniques. We modify debug register handler to invoke snapshot facility of VMM. Software interrupt or signal are generated in register handler. Then, we can take snapshot asynchronously when debug register is changed. On guest OS, we apply three kinds of interruptive debugging techniques: driver supplied callback function, DLL injection. IDT (interruption descriptor table) is modified by driver supplied callback function, which makes it possible to cope with vulnerability exploitation. DLL injection is applied to insert security check function into a resource access function. Proposed system is implemented XEN virtual machine monitor and KVM (Kernel Virtual machine).

목차

Abstract
 1. Introduction
  1.1. Incident-driven memory
  1.2. Towards an asynchronous memory forensics
 2. Modification of VMM
 3. Modification of Windows guest OS
  3.1. Improving exception handler
  3.2 Dll injection
 4. Conclusions
 References

저자정보

  • Ruo Ando National Institute of Information and Communication Technology 4-2-1 Nukui-Kitamachi, Koganei, Tokyo 184-8795 Japan
  • Youki Kadobayashi National Institute of Information and Communication Technology 4-2-1 Nukui-Kitamachi, Koganei, Tokyo 184-8795 Japan
  • Youichi Shinoda National Institute of Information and Communication Technology 4-2-1 Nukui-Kitamachi, Koganei, Tokyo 184-8795 Japan

참고문헌

자료제공 : 네이버학술정보

    함께 이용한 논문

      ※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

      0개의 논문이 장바구니에 담겼습니다.