学位论文详细信息
Exploring application memory
Forensics;Memory;Visualization
Larson, Kevin Andrew ; Campbell ; Roy H.
关键词: Forensics;    Memory;    Visualization;   
Others  :  https://www.ideals.illinois.edu/bitstream/handle/2142/88107/LARSON-THESIS-2015.pdf?sequence=1&isAllowed=y
美国|英语
来源: The Illinois Digital Environment for Access to Learning and Scholarship
PDF
【 摘 要 】

Increasingly complex malware continues to evade detection, stealing information, taking systems offline, and disrupting functionality of many computer systems. Traditional techniques have not adequately protected systems from attackers, and the most commonly used detection techniques overlook the contents of memory.Modern systems contain a wealth of information in the contents of memory, but making use of that information is anything but trivial.There are a number of challenges related to both the acquisition and analysis of a system's memory.Many forensic situations could involve machines in hostile environments, and many acquisition techniques result in artifacts, which reduce the fidelity of the image and hinder the analysis phase.Although the kernel memory space has come a long way in being mapped, the state of application memory has largely been unexplored. We have created a toolset that extracts the application's context from the structure of pointers in a sample of that application's memory.This context allows us to perform statistical analysis, visualize the structure of memory, and provides a new way to train classifiers.

【 预 览 】
附件列表
Files Size Format View
Exploring application memory 3658KB PDF download
  文献评价指标  
  下载次数:13次 浏览次数:40次