MRCIF: A Memory-Reverse-Based Code Injection Forensics Algorithm

نویسندگان

چکیده

The new DLL injection method and its variants can prevent the injected process from calling common system API to load module so that malicious is invisible LDR linked list of process. Traditional detection methods have low accuracy in forensic attacks. To solve this problem, paper proposes a code covert memory page algorithm based on structure reverse analysis named MRCIF. First, physical pages containing features image are located, sub-algorithm designed for mapping space virtual space, thus realizing reconstruction subset corresponding module. Then, reversely reconstructed, developed reconstruct space. Finally, subset. experimental results indicate MRCIF achieves an 88.89%, which much higher than traditional method, only accurately detect Virtual Address Descriptor (VAD) remapping attack.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Quincy: Detecting Host-Based Code Injection Attacks in Memory Dumps

Malware predominantly employs code injections, which allow to run code in the trusted context of another process. This enables malware, for instance, to secretly operate or to intercept critical information. It is crucial for analysts to quickly detect injected code. While there are systems to detect code injections in memory dumps, they suffer from unsatisfying detection rates or their detecti...

متن کامل

Image counter-forensics based on feature injection

Starting from the concept that many image forensic tools are based on the detection of some features revealing a particular aspect of the history of an image, in this work we model the counter-forensic attack as the injection of a specific fake feature pointing to the same history of an authentic reference image. We propose a general attack strategy that does not rely on a specific detector str...

متن کامل

Android Malware Analysis Based On Memory Forensics

Live forensics solutions have long been proven powerful in various research fields. The rise of mobile platforms has created numerous new challenges for the researchers. The adoption of the widely used technologies of the traditional PC environment has limitations due to the lack of wider control over the mobile operating system. In this paper we present a new malware analysis solution for the ...

متن کامل

A Message-Passing Distributed Memory Parallel Algorithm for a Dual-Code Thin Layer, Parabolized Navier-Stokes Solver

In this study, the results of parallelization of a 3-D dual code (Thin Layer, Parabolized Navier-Stokes solver) for solving supersonic turbulent flow around body and wing-body combinations are presented. As a serial code, TLNS solver is very time consuming and takes a large part of memory due to the iterative and lengthy computations. Also for complicated geometries, an exceeding number of grid...

متن کامل

A Flexible Integrated Forward/ Reverse Logistics Model with Random Path-based Memetic Algorithm

Due to business and environmental issues, the efficient design of an integrated forward/reverse logistics network has recently attracted more attention from researchers. The significance of transportation cost and customer satisfaction spurs an interest in developing a flexible network design model with different delivery paths. This paper proposes a flexible mixed-integer programming model to ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Applied sciences

سال: 2023

ISSN: ['2076-3417']

DOI: https://doi.org/10.3390/app13042478