Robust Linux memory acquisition with minimal target impact

نویسندگان

  • Johannes Stüttgen
  • Michael Cohen
چکیده

Software based Memory acquisition on modern systems typically requires the insertion of a kernel module into the running kernel. On Linux, kernel modules must be compiled against the exact version of kernel headers and the exact kernel configuration used to build the currently executing kernel. This makes Linux memory acquisition significantly more complex in practice, than on other platforms due to the number of variations of kernel versions and configurations, especially when responding to incidents. The Linux kernel maintains a checksum of kernel version and will generally refuse to load a module which was compiled against a different kernel version. Although there are some techniques to override this check, there is an inherent danger leading to an unstable kernel and possible kernel crashes. This paper presents a novel technique to safely load a precompiled kernel module for acquisition on a wide range of Linux kernel versions and configuration. Our technique injects a minimal acquisition module (parasite) into another valid kernel module (host) already found on the target system. The resulting combined module is then relinked in such a way as to grant code execution and control over vital data structures to the acquisition code, whilst the host module remains dormant during runtime. a 2014 The Authors. Published by Elsevier Ltd on behalf of DFRWS. This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/3.0/).

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

On the Viability of Memory Forensics in Compromised Environments

Memory forensics has become a powerful tool for the detection and analysis of malicious software. It provides investigators with an impartial view of a system, exposing hidden processes, threads, and network connections, by acquiring and analyzing physical memory. Because malicious software must be at least partially resident in memory in order to execute, it cannot remove all its traces from R...

متن کامل

PSFC/JA-01-20 CompactPCI Based Data Acquisition with MDSplus

Alcator C-Mod is incorporating CompactPCI based data acquisition cards into the MDSplus data acquisition system. Each crate includes a diskless computer running the mdsip server from MDSplus under the linux operating system, and one or more digitizer cards with onboard memory. A minimal set of software is downloaded to this computer at boot time allowing it to arm and read out the cards when re...

متن کامل

Data Acquisition and Control System Using Embedded Web Server

This paper realizes an embedded web server, which enables data acquisition and status monitoring with the help of any standard web browser. User can monitor and control remote temperature and video information The platform used is Linux and ARM 9 processor. Biggest advantage of this web server is embedding a PC based web server into the ARM platform without losing any of its features. It consis...

متن کامل

Beneficial Effects of Statins in Experimental Amnesia

The present study was undertaken to investigate the beneficial effects of widely-prescribed lipid lowering drugs, pitavastatin, atorvastatin and simvastatin 3-hydroxy-3-methylglutaryl-coenzyme-A (HMG-CoA) reductase inhibitors in cognitive dysfunctions of mice. Intra-cerebroventricular (ICV)-Streptozocin-(STZ)- and high-fat diet (HFD)-induced amnesia served as interoceptive memory models where a...

متن کامل

Application Performance on the Tri-Lab Linux Capacity Cluster - TLCC

In a recent acquisition by DOE/NNSA several large capacity computing clusters called TLCC have been installed at the DOE labs: SNL, LANL and LLNL. TLCC architecture with ccNUMA, multi-socket, multi-core nodes, and InfiniBand interconnect, is representative of the trend in HPC architectures. This chapter examines application performance on TLCC contrasting them with Red Storm/Cray XT4. TLCC and ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Digital Investigation

دوره 11  شماره 

صفحات  -

تاریخ انتشار 2014