<p id="nxp5x"><big id="nxp5x"><noframes id="nxp5x">

    <var id="nxp5x"><video id="nxp5x"></video></var>

          <em id="nxp5x"></em>

              首 頁 本刊概況 出 版 人 發行統計 在線訂閱 歡迎投稿 市場分析 1 組織交流 1 關于我們
             
            1
               通信短波
            1
               新品之窗
            1
               優秀論文
            1
               通信趨勢
            1
               特別企劃
            1
               運營商動態
            1
               技術前沿
            1
               市場聚焦
            1
               通信視點
            1
               信息化論壇
            1
            當前位置:首頁 > 優秀論文
            基于圖匹配和鏈表導向的內核數據結構取證技術
            作者:王 浩 陳 平 茅 兵
            來源:本站原創
            更新時間:2012/5/10 10:32:00
            正文:
            (軟件新技術國家重點實驗 南京大學計算機科學與技術系  南京 210046)
             
            WANG Hao  CHEN Pin     MAO Bing
            (State Key Laboratory for Novel Software Technology, Department of Computer Science and Technology, Najing University, Nanjing 210046, China)
             
            Abstract Identifying instances of kernel data structures from memory image is very important in many security fields. Existing points-to Graph based Signature faced void pointer, NULL pointer and isomorphism etc problems. This paper presents a new forensic technology, whose signature distinguish doubly linked list pointers from general pointers. Comparing with the previously work, the new forensic technology has some advantages, such as accuracy, speed, robust etc.
             
             
             
             
             
            參考文獻
            [1] J. Rutkowska. Thoughts about Cross-View based Rootkit Detection. http://invisiblethings.org. 2005.
            [2] J. Wilhelm and T. Chiueh. A Forced Sampled Execution Approach to Kernel Rootkit Identification. Recent advances in intrusion detection Lecture Notes in Computer Science. 2007.
            [3] N. Quynh and Y. Takefuji. Towards a Tamper Resistant Kernel Rootkit Detector. Proceedings of the ACM symposium on Applied computing. 2007.
            [4] X. Jiang, X. Wang, and D. Xu. Stealthy malware detection through vmm-based “out-of-the-box” semantic view reconstruction. In Proceedings of the 14th ACM conference on Computer and communications security (CCS). 2007.
            [5] B. D. Payne, M. Carbone, and W. Lee. Secure and flexible monitoring of virtual machines. In Proceedings of the 23rd Annual Computer Security Applications Conference (ACSEC). 2007.
            [6] A. Case, A. Cristina, L. Marziale, G. G. Richard, and V. Roussev. Face: Automated digital evidence discovery and correlation. The Proceedings of the 8th Annual DFRWS Conference. 2008.
            [7] P. Movall, W. Nelson, and S. Wetzstein. Linux physical memory analysis. In Proceedings of the FREENIX Track of the USENIX Annual Technical Conference. 2005.
            [8] A. Walters, T. Fraser, and W. A. Arbaugh. Fatkit: A framework for the extraction and analysis of digital forensic data from volatile system memory. Digital Investigation. 2006.
            [9] Z. Lin, X. Zhang, and D. Xu. Automatic reverse engineering of data structures from binary execution. In Proceedings of the 17th Annual Network and Distributed System Security Symposium (NDSS). 2010.
            [10] A. Slowinska, T. Stancescu, and H. Bos. Howard: a dynamic excavator for reverse engineering data structures. In proceedings of the18th Annual Network and Distributed System Security Symposium (NDSS).
            2011.
            [11] C. Betz. Memparser.
            [12] A. Schuster. Searching for processes and threads in Microsoft Windows memory dumps. In Proceedings of the 6th Annual Digital Forensic Research Workshop (DFRWS). 2006.
            [13] A. Baliga, V. Ganapathy, and L. Iftode. Automatic inference and enforcement of kernel data structure invariants. In Proceedings of the 2008 Annual Computer Security Applications Conference (ACSAC). 2008.
            [14] B. Dolan-Gavitt, A. Srivastava, P. Traynor, and J. Giffin. Robust signatures for kernel data structures. In Proceedings of the 16th ACM conference on Computer and communications security (CCS). 2009.
            [15] J. Rutkowska. Klister v0.3. https://www.rootkit.com/newsread.php?newsid=51.
            [16] A. Walters. The volatility framework: Volatile memory artifact extraction utility framework. https://www.volatilesystems.com/default/volatility.
            [17] Z. Lin, J. Rhee, X. Zhang, D. Xu, X. Jiang. SigGraph: Brute Force Scanning of Kernel Data Structure Instances Using Graph-based Signatures. 18th Annual Network & Distributed System Security Symposium(NDSS). 2011.
            [18] A. Walters and N. Petroni. Volatools: Integrating volatile memory forensics into the digital investigation process. In Blackhat Federal. 2007.
            [19] T. Haruyama and H. Suzuki. One-byte Modification for Breaking Memory Forensic Analysis. Blackhat. 2012.
             
            作者簡介:
            王 浩   碩士,主要研究方向軟件安全;
            陳 平  博士,主要研究方向軟件安全、系統安全;
            茅 兵 教授,博士生導師,主要研究方向系統安全、分布式系統。
             
             
             
               
            《通信市場》 中國·北京·復興路49號通信市場(100036) 點擊查看具體位置
            電話:86-10-6820 7724, 6820 7726
            京ICP備05037146號-8
            建議使用 Microsoft IE4.0 以上版本 800*600瀏覽 如果您有什么建議和意見請與管理員聯系
            欧美成人观看免费全部欧美老妇0