期刊文献+

Digital Forensic Analysis on Runtime Instruction Flow

Digital Forensic Analysis on Runtime Instruction Flow
在线阅读 下载PDF
导出
摘要 Computer system's runtime information is an essential part of the digital evidence. Current digital forensic approaches mainly focus on memory and I/O data, while the runtime instructions from processes are often ignored. We present a novel approach on runtime instruction forensic analysis and have developed a forensic system which collects instruction flow and extracts digital evidence. The system is based on whole-system emulation technique and analysts are allowed to define analysis strategy to improve analysis efficiency and reduce overhead. This forensic approach and system are applicable to binary code analysis, information retrieval and matware forensics.
出处 《China Communications》 SCIE CSCD 2010年第6期112-119,共8页 中国通信(英文版)
关键词 digital forensics dynamic analysis instruction flow virtual machine EMULATION 程序运行 数字取证 指令流 计算机系统 数字证据 信息检索 组成部分 仿真技术
作者简介 Li Juanru, is currently a Ph. D candidate in Department of Computer Science and Engineering, Shanghai Jiao Tong University. He received his B.S. degree from Shanghai Jiao Tong University in 2007. His research interests include software security and Side Channel Attack.Gu Dawu, is a full professor and a faculty member at Shanghai Jiao Tong University in Computer Science and Engineering Department. He was awarded a B.S. degree in applied mathematics in 1992, and a Ph.D. degree in cryptography in 1998, both from Xidian University. He is a senior member of China Computer Federation and is also both members of IACR and ACM. He ever wined the honor of New Century Excellent Talent made by Ministry of Education of China in 2005. He was a visiting scholar in Tokyo University in 2002, and a senior research fellow in Katholleke Universiteit Leuven (KUL) in 2008, respectively. His main research interests focus on applied cryptography and computer security. He has got over 90 scientific papers in academic journals and conferences.Deng Chaoguo, is currently a Master candidate in Department of Computer Science and Engineering, Shanghai Jiao Tong University. He received his B.S. degree from Tong Ji University in 2008. His research interests include software security.Luo Yuhao, is currently a Ph. D candidate in Department of Computer Science and Engineering, Shanghai Jiao Tong University. He received his B.S. degree from Tong Ji University in 2009. His research interests include software security.
  • 相关文献

参考文献13

  • 1Anon. Bochs: the Open Source IA-32 Emulation Project [ EB/OL ]. http J/boc hs. sourc eforge.net.
  • 2SHARIF M, LANZI A, GIFFIN J, et al. Automatic Reverse Engineering of Malware Emulators [C]// Proceedings of the 30th IEEE Symposium on Security and Privacy(ISSP). IEEE Press, 2009: 94-109.
  • 3YIN H, SONG D. TEMU: Binary Code Analysis via Wholesystem Layered Annotative Execution [R]. Technical Report. Berkeley, 2010.
  • 4MALIN C, CASEY E, AQUILINA J. Malware Forensics: Investigating and Analyzing Malicious Code [ M]. Syngress, 2008.
  • 5DINABURG A, ROYAL P, SHARIF M, et al. Ether: Malware Analysis via Hardware Virtualization Extensions [C]// Proceedings of the 15th ACM Conference on Computer and Communications Security(CCS). New York: ACM, 2008: 51-62.
  • 6MARTIGNONI A, PALEARI R, ROGLIA G, et al. Testing CPU Emulators [C]//Proceedings of the 18th International Symposium on Software Testing and Analysis. New York: ACM, 2009:261-272.
  • 7Anon. What Is Windows PE? [EB/OL]. http://technet.microsoft.c om/en-us/library/dd799308 (WS. 10 ). aspx.
  • 8Anon. SliTaz GNU/Linux [ EB/OL ]. http://www.slitaz. org/ en/.
  • 9MAARTMANN-MOE C, THORKILDSEN S, ARNES A. The Persistence of Memory Forensic Identification and Extraction of Cryptographic Keys [J]. Digital Investiga- tion, 2009, 6(1): 132-140.
  • 10Anon. FIPS 46-2-(DES), Data Encryption Standard[ EB/ OL]. http ://www. itl.nist. gov/fipspubs/fip46-2.htm.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部