检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:翟继强[1] 陈攀 徐晓 杨海陆 ZHAI Jiqiang;CHEN Pan;XU Xiao;YANG Hailu(School of Computer Science and Technology, Harbin University of Science and Technology, Harbin 150080, China)
机构地区:[1]哈尔滨理工大学计算机科学与技术学院,黑龙江哈尔滨150080
出 处:《西北工业大学学报》2021年第5期1139-1149,共11页Journal of Northwestern Polytechnical University
基 金:国家自然科学基金(61403109);黑龙江省自然科学基金(F2016024);黑龙江省教育厅科技面上项目(12531121)资助。
摘 要:目前有关堆的取证研究主要是针对Linux系统的堆和Windows系统的NT堆,然而怎样从转储文件中提取出Windows 10系统段堆信息并没有得到充分研究。为了重现Windows 10系统中段堆的内部信息,提出根据内存对象vtype描述信息中字段偏移定位并解析段堆内部信息的方法。使用池扫描技术定位进程对象,根据进程对象和进程环境块对象的结构信息获取进程堆的起始位置并扫描进程堆,再使用段堆特征值定位段堆的位置,进而提取出段堆的内部信息。依据分析结果,研发了基于Volatility框架的5个段堆取证插件。实验结果表明文中方法可以有效地提取进程中每个段堆及其内部组件在内存中的地址、占用的内存大小等信息,这些信息可以帮助调查人员分析网络犯罪或网络攻击在内存中留下的数字痕迹。The current forensic research on heaps mainly extracts information from the heap of Linux and the NT heap of Windows.However,the study of how to extract the information on the segment heap in the Windows 10 from dump files is not sufficient.To reproduce the internal information on the segment heap,this paper proposes a method for locating and extracting the internal information on the segment heap in the Windows 10 according to the field offset in the vtype description information of memory object.The method uses the pool scanning technology to locate the process object,obtains the starting position of the process heap and scans the process heap according to the structural information on the process object and the process environment block object.Then it locates the position of the segment heap with its feature values,thereby extracting its internal information.Based on the analysis results,five forensic plugins for extracting the information on the segment heap were developed on the Volatility framework.The experimental results show that this method can effectively extract the information on the address of each segment heap and its internal components in the memory and on the size of committed memory,etc.The information can help investigators to analyze the digital traces left in the memory by cyber criminals or cyber attackers.
关 键 词:NT堆 段堆 池扫描技术 Volatility框架
分 类 号:TP319[自动化与计算机技术—计算机软件与理论]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.15