Hypervisor-assisted Atomic Memory Acquisition in Modern Systems
@inproceedings{Kiperberg2019HypervisorassistedAM, title={Hypervisor-assisted Atomic Memory Acquisition in Modern Systems}, author={Michael Kiperberg and R. Leon and A. Resh and Asaf Algawi and N. Zaidenberg}, booktitle={ICISSP}, year={2019} }
Reliable memory acquisition is essential to forensic analysis of a cyber-crime. Various methods of memory acquisition have been proposed, ranging from tools based on a dedicated hardware to software only solutions. Recently, a hypervisor-based method for memory acquisition was proposed (Qi et al., 2017; Martignoni et al., 2010). This method obtains a reliable (atomic) memory image of a running system. The method achieves this by making all memory pages non-writable until they are copied to the… CONTINUE READING
Figures, Tables, and Topics from this paper
5 Citations
HyperLeech: Stealthy System Virtualization with Minimal Target Impact through DMA-Based Hypervisor Injection
- Computer Science
- 2020
- PDF
Protection against reverse engineering in ARM
- Computer Science
- International Journal of Information Security
- 2019
- 4
- PDF
Efficient Protection for VDI Workstations
- Computer Science
- 2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/ 2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom)
- 2019
References
SHOWING 1-10 OF 24 REFERENCES
When hardware meets software: a bulletproof solution to forensic memory acquisition
- Computer Science
- ACSAC '12
- 2012
- 38
- PDF
A hardware-based memory acquisition procedure for digital investigations
- Computer Science
- Digit. Investig.
- 2004
- 203
- PDF
ForenVisor: A Tool for Acquiring and Preserving Reliable Data in Cloud Live Forensics
- Computer Science
- IEEE Transactions on Cloud Computing
- 2017
- 21
- Highly Influential
- PDF
SecVisor: a tiny hypervisor to provide lifetime kernel code integrity for commodity OSes
- Computer Science
- SOSP
- 2007
- 658
- PDF
Live and Trustworthy Forensic Analysis of Commodity Production Systems
- Computer Science
- RAID
- 2010
- 54
- Highly Influential
- PDF
Jump over ASLR: Attacking branch predictors to bypass ASLR
- Computer Science
- 2016 49th Annual IEEE/ACM International Symposium on Microarchitecture (MICRO)
- 2016
- 154
- PDF
Remote Attestation of Software and Execution-Environment in Modern Machines
- Computer Science
- 2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing
- 2015
- 11