Motivation. An Evaluation Platform for Forensic Memory Acquisition Software



Similar documents
Quantifying Hardware Selection in an EnCase v7 Environment

System Requirements for Microsoft Dynamics NAV 2009 SP1

Windows Startup: Observed Changes Over Time

NetIQ Privileged User Manager

Simnet Registry Repair User Guide. Edition 1.3

Anti-spam Comparison Report

Revit products will use multiple cores for many tasks, using up to 16 cores for nearphotorealistic

Sage 300 ERP 2014 Compatibility guide

Intro to Virtualization

HPSA Agent Characterization

Parallels Desktop 4 for Windows and Linux Read Me

MYOB EXO System Requirement Guidelines. 30 April 2014 Version 2.7

Capacity Planning Process Estimating the load Initial configuration

Scalable Distributed Service Integrity Attestation for Software-as-a-Service Clouds

Virtuoso and Database Scalability

Microsoft Office Outlook 2013: Part 1

Assessing the Security of Hardware-Based vs. Software-Based Encryption on USB Flash Drives

How to handle Out-of-Memory issue

Dynamics NAV/SQL Server Configuration Recommendations

Marco A. M. de Melo & Fernando S. P. Gonçalves MANAGER

Software and Hardware Requirements

Microsoft Office 2010 system requirements

Cisco Virtualization Experience Client 4000 Release 1.0

Product Release Notes ARGUS Valuation Capitalisation v Document Version 1.0 October 1st, 2008

How To Ensure Correctness Of Data In The Cloud

How To Test For Performance And Scalability On A Server With A Multi-Core Computer (For A Large Server)

Virtualization. Types of Interfaces

Running Windows on a Mac. Why?

System Requirements. Maximizer CRM Enterprise Edition System Requirements

Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec

MID-TIER DEPLOYMENT KB

Comparing Virtualization Technologies

Autodesk Revit 2016 Product Line System Requirements and Recommendations

DACSA: A Decoupled Architecture for Cloud Security Analysis

Tech Tip: Understanding Server Memory Counters

Information Technology

Sage ERP Accpac. Compatibility Guide Version 6.0. Revised: November 18, Version 6.0 Compatibility Guide

System Requirements Table of contents

FAQ. Safe Anywhere PC. Disclaimer:

7.x Upgrade Instructions Software Pursuits, Inc.

SuperGIS Server 3 Website Performance and Stress Test Report

Enterprise Performance Tuning: Best Practices with SQL Server 2008 Analysis Services. By Ajay Goyal Consultant Scalability Experts, Inc.

Using. Microsoft Virtual PC. Page 1

Accelerating Business Intelligence with Large-Scale System Memory

KVM: Kernel-based Virtualization Driver

SDFS Overview. By Sam Silverberg

Rod Tucker, Jayant Baliga, Robert Ayre, Kerry Hinton

Figure 1: RotemNet Main Screen

Virtualization in Linux KVM + QEMU

QLIKVIEW ARCHITECTURE AND SYSTEM RESOURCE USAGE

Administration guide. Host software WinCCU Installation. Complete gas volume and energy data management

Synergis Software 18 South 5 TH Street, Suite 100 Quakertown, PA , version

INTRODUCTION TO WINDOWS 7

Compromise-as-a-Service

Performance Characteristics of VMFS and RDM VMware ESX Server 3.0.1

Operational Efficiencies of Proactive Vulnerability Management

Pattern Insight Clone Detection

Incident Response. Six Best Practices for Managing Cyber Breaches.

Hardware and Software Requirements for Sage 50 v15 to v22

Security Measures of Personal Information of Smart Home PC

Virtualization with Windows

Delivering Quality in Software Performance and Scalability Testing

Operating Systems 4 th Class

Sage ERP Accpac. Compatibility Guide Versions 5.5 and 5.6. Revised: November 18, Compatibility Guide for Supported Versions

INSTALLATION GUIDE ENTERPRISE DYNAMICS 9.0

#9011 GeoMedia WebMap Performance Analysis and Tuning (a quick guide to improving system performance)

Parallels Virtuozzo Containers vs. VMware Virtual Infrastructure:

SQL Server Transaction Log from A to Z

Cisco IP Communicator (Softphone) Compatibility

Backup and Restore Back to Basics with SQL LiteSpeed

NAS 249 Virtual Machine Configuration with VirtualBox

Why Performance Test Outside the Firewall? Exposing What You Have Missed

CHAPTER 6: CLASSIC CLIENT OPTION

Initial Hardware Estimation Guidelines. AgilePoint BPMS v5.0 SP1

Google File System. Web and scalability

Dongwoo Kim : Hyeon-jeong Lee s Husband

e-config Data Migration Guidelines Version 1.1 Author: e-config Team Owner: e-config Team

Priority Based Implementation in Pintos

Accelerating Business Intelligence with Large-Scale System Memory

Higher-Order Testing

Wide-area Network Acceleration for the Developing World. Sunghwan Ihm (Princeton) KyoungSoo Park (KAIST) Vivek S. Pai (Princeton)

Live und in Farbe Live Migration. André Przywara CLT 2010

Virtualization Forensics: Acquisition and analysis of a clustered VMware ESXi servers

Test instructions & HW/SW specifications Contents

An Oracle White Paper July Oracle Primavera Contract Management, Business Intelligence Publisher Edition-Sizing Guide

Transactional Support for SDN Control Planes "

Muse Server Sizing. 18 June Document Version Muse

Sage Grant Management System Requirements

Chapter 6, The Operating System Machine Level

Professional and Enterprise Edition. Hardware Requirements

And OrACLE In A data MArT APPLICATIOn

Contents. Page 1 Seavus Project Viewer System Requirements

Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec

Symantec Backup Exec System Recovery Exchange Retrieve Option User's Guide

MySupport. End User Guide. Document Version: 1.3

Dedicated Hosting. The best of all worlds. Build your server to deliver just what you want. For more information visit: imcloudservices.com.

INTRODUCTION TO DATABASE SYSTEMS

Table of Contents. June 2010

Virtualization Guide. McAfee Vulnerability Manager Virtualization

Transcription:

Motivation Research in memory forensics has mostly focused on analysis-related aspects to date The respective base snapshot is frequently assumed to be sound or reliable But what factors actually affect its soundness? Ø Once determined, how can we measure those factors? Ø To what degree do current acquisition approaches satisfy those factors? Ø In this talk: Methods for evaluating software-based imaging solutions 1

Acquisition Criteria Criteria for Sound Memory Imaging Ø Several criteria have been early identified by different authors Ø Works are mostly descriptive though and primarily illustrate weaknesses of existing technologies Ø More formal definition by Vömel and Freiling (2012) Ø Theory: The quality of a forensic memory snapshot is determined by its degree of correctness, atomicity, and integrity 2

Acquisition Criteria Correctness Ø correctness basically means that the snapshot only contains true values Ø trivial but necessary requirement Ø for instance, malicious software may try to impede or manipulate the acquisition process Ø errors in imaging applications may lead to incorrect acquisition results 3

Acquisition Criteria Atomicity Inconsistencies may occur due to concurrent activity 4

Acquisition Criteria Integrity Allows observing the state of memory over the time of the acquisition process 5

Methodology Evaluation Methodology Ø We have developed an evaluation platform to determine the degree of correctness, atomicity, and integrity for Windowsbased software imagers Ø Platform is based on a heavily customized version of the Bochs x86 PC emulator Ø White-box testing methodology Ø acquisition utilities need to be patched Ø important events (e.g., start of a page imaging operation) are communicated to the platform via a number of hypercalls 6

Methodology Overview of the Platform Architecture 7

Methodology Measuring Correctness Ø Idea: Create an external memory snapshot in parallel to the acquisition phase Ø match the external snapshot with the image of the acquisition program to identify possible differences Ø permits verifying the size and contents of the created memory image 8

Methodology Measuring Atomicity Ø Idea: Use an indirect approach and attempt to quantify the degree of atomicity violations Ø requires monitoring the memory operations of all running threads during the acquisition phase Ø Problem: We do not know if the individual memory operations are causally related Ø Quantify potential atomicity violations as an upper bound 9

Methodology Measuring Integrity Ø Idea: Create external snapshots of system memory at specific point of times Ø match the created snapshots in a second step to determine the level of differences Ø permits determining how much memory was changed during the acquisition phase and due to loading the acquisition program into RAM 10

Evaluation Evaluation Procedure Ø Evaluation of three open source imaging applications Ø win32dd, mdd, WinPMEM Ø 90 test runs for each imager Ø All tests initially started from an idle system state Ø Memory sizes between 512 MB and 2 GB Ø Each test required between 6.87 and 22.37 GB of disk space 11

Evaluation Correctness Evaluation Image: http://blogs.technet.com/b/markrussinovich/archive/2008/07/21/3092070.aspx Ø (older, open source version of) win32dd and mdd initially acquired the physical address space incorrectly Ø regions of device memory were ignored Ø offset mapping is corrupted Ø after patching, all three utilities created correct snapshots, both in size and contents Ø non-accessible regions are zeroed out 12

Evaluation Atomicity Evaluation Ø the level of atomicity rapidly decreased with larger memory sizes Ø Theory: With longer imaging periods, it gets increasingly difficult to keep the image file free from smearing Ø Open research: In how far do inconsistencies truly affect later memory analysis? Ø Inconsistencies are counterintuitive to classic perceptions of forensic soundness though 13

Evaluation Integrity Evaluation Ø the level of integrity slightly increased with larger memory sizes Ø Theory: On a system with constant load, proportionally less amounts of space are required with higher memory capacities Ø Still: About one fifth of memory is changed during the acquisition phase Ø Results are similar to earlier experiments by other authors 14

Summary Summary and Outlook Ø Rigorous testing and evaluation of acquisition solutions has been widely neglected so far Ø We now have a mechanism for verifying the correctness of imaging applications and estimating their level of atomicity and integrity Ø Experiments have been performed under laboratory conditions Ø Next step: How reliably do acquisition solutions work in the presence of an intelligent adversary? 15

In case of any questions, please feel free to contact: Stefan Vömel http://www1.informatik.uni-erlangen.de/ stefan.voemel@cs.fau.de i1 Chair for IT Security Infrastructures

Discussion Discussion of the Evaluation Approach Ø Evaluation of a software imager requires minor patching Ø white-box testing methodology Ø so far, we have only evaluated open source solutions Ø Evaluation is limited to x86 32-bit applications and systems with a maximum memory capacity of 2 GB Ø restrictions are due to the underlying Bochs engine Ø Level of atomicity and impact of an acquisition program can only be estimated based on upper bounds 17