MRCIF: A Memory-Reverse-Based Code Injection Forensics Algorithm
نویسندگان
چکیده
The new DLL injection method and its variants can prevent the injected process from calling common system API to load module so that malicious is invisible LDR linked list of process. Traditional detection methods have low accuracy in forensic attacks. To solve this problem, paper proposes a code covert memory page algorithm based on structure reverse analysis named MRCIF. First, physical pages containing features image are located, sub-algorithm designed for mapping space virtual space, thus realizing reconstruction subset corresponding module. Then, reversely reconstructed, developed reconstruct space. Finally, subset. experimental results indicate MRCIF achieves an 88.89%, which much higher than traditional method, only accurately detect Virtual Address Descriptor (VAD) remapping attack.
منابع مشابه
Quincy: Detecting Host-Based Code Injection Attacks in Memory Dumps
Malware predominantly employs code injections, which allow to run code in the trusted context of another process. This enables malware, for instance, to secretly operate or to intercept critical information. It is crucial for analysts to quickly detect injected code. While there are systems to detect code injections in memory dumps, they suffer from unsatisfying detection rates or their detecti...
متن کاملImage counter-forensics based on feature injection
Starting from the concept that many image forensic tools are based on the detection of some features revealing a particular aspect of the history of an image, in this work we model the counter-forensic attack as the injection of a specific fake feature pointing to the same history of an authentic reference image. We propose a general attack strategy that does not rely on a specific detector str...
متن کاملAndroid Malware Analysis Based On Memory Forensics
Live forensics solutions have long been proven powerful in various research fields. The rise of mobile platforms has created numerous new challenges for the researchers. The adoption of the widely used technologies of the traditional PC environment has limitations due to the lack of wider control over the mobile operating system. In this paper we present a new malware analysis solution for the ...
متن کاملA Message-Passing Distributed Memory Parallel Algorithm for a Dual-Code Thin Layer, Parabolized Navier-Stokes Solver
In this study, the results of parallelization of a 3-D dual code (Thin Layer, Parabolized Navier-Stokes solver) for solving supersonic turbulent flow around body and wing-body combinations are presented. As a serial code, TLNS solver is very time consuming and takes a large part of memory due to the iterative and lengthy computations. Also for complicated geometries, an exceeding number of grid...
متن کاملA Flexible Integrated Forward/ Reverse Logistics Model with Random Path-based Memetic Algorithm
Due to business and environmental issues, the efficient design of an integrated forward/reverse logistics network has recently attracted more attention from researchers. The significance of transportation cost and customer satisfaction spurs an interest in developing a flexible network design model with different delivery paths. This paper proposes a flexible mixed-integer programming model to ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Applied sciences
سال: 2023
ISSN: ['2076-3417']
DOI: https://doi.org/10.3390/app13042478