计算机工程与应用 ›› 2013, Vol. 49 ›› Issue (19): 63-67.
• 网络、通信、安全 • 上一篇 下一篇
向 涛,苟木理
出版日期:
发布日期:
XIANG Tao, GOU Muli
Online:
Published:
摘要: 内存取证是计算机取证的一个重要分支,而获取内存镜像文件中进程和线程信息是内存取证技术的重点和难点。基于微软最新操作系统平台Windows 8,研究其进程和线程的获取方法。运用逆向工程分析技术对Windows 8下进程和线程相关内核数据结构进行分析,提取出相应特征;基于这些特征,提出了一种能够从物理内存镜像文件中得到系统当前进程和线程信息的算法。实验结果和分析表明,该算法能够成功提取隐藏进程和非隐藏进程,及其各进程相关的线程信息,为内存取证分析提供了可靠的数据基础。
关键词: 内存取证, Windows 8, 进程, 线程, 物理内存分析
Abstract: Memory forensics is a branch of importance in computer forensics, and searching for processes and threads in physical memory dumps is crucial and challenging for memory forensics. This paper investigates the searching of processes and threads in physical memory dumps based on the latest Microsoft operation system Windows 8. By utilizing reverse engineering techniques, the kernel data structures regarding processes and threads on Windows 8 are explored, and their features are identified. Based on these features, an algorithm is proposed for searching processes and threads in Windows 8 physical memory dumps. Experimental results and their analysis indicate that it is capable of extracting information about hidden and non-hidden processes and their threads successfully, thereby providing reliable data foundation for further analysis in memory forensics.
Key words: memory forensics, Windows 8, process, thread, physical memory analysis
向 涛,苟木理. Windows 8下基于镜像文件的内存取证研究[J]. 计算机工程与应用, 2013, 49(19): 63-67.
XIANG Tao, GOU Muli. Memory forensics based on Windows 8 physical memory dumps[J]. Computer Engineering and Applications, 2013, 49(19): 63-67.
0 / 推荐
导出引用管理器 EndNote|Ris|BibTeX
链接本文: http://cea.ceaj.org/CN/
http://cea.ceaj.org/CN/Y2013/V49/I19/63