An os-agnostic approach to memory forensics

A Oliveri, M Dell'Amico, D Balzarotti - … , 27 February-3 March 2023, San …, 2023 - hal.science
The analysis of memory dumps presents unique challenges, as operating systems use a
variety of (often undocumented) ways to represent data in memory. To solve this problem …

Katana: Robust, automated, binary-only forensic analysis of linux memory snapshots

F Franzen, T Holl, M Andreas, J Kirsch… - Proceedings of the 25th …, 2022 - dl.acm.org
The development and research of tools for forensically analyzing Linux memory snapshots
have stalled in recent years as they cannot deal with the high degree of configurability and …

{00SEVen}–Re-enabling Virtual Machine Forensics: Introspecting Confidential {VMs} Using Privileged {in-VM} Agents

F Schwarz, C Rossow - 33rd USENIX Security Symposium (USENIX …, 2024 - usenix.org
The security guarantees of confidential VMs (eg, AMD's SEV) are a double-edged sword:
Their protection against undesired VM inspection by malicious or compromised cloud …

CrypTody: Cryptographic Misuse Analysis of IoT Firmware via Data-flow Reasoning

J Wang, S Guo, W Diao, Y Liu, H Duan, Y Liu… - Proceedings of the 27th …, 2024 - dl.acm.org
Cryptographic techniques form the foundation of the security and privacy of computing
solutions. However, if cryptographic APIs are not invoked correctly, they can result in …

[HTML][HTML] Chracer: memory analysis of chromium-based browsers

G Choi, J Bang, S Lee, J Park - Forensic Science International: Digital …, 2023 - Elsevier
The web browsing activities of a user provide useful evidence for digital forensic
investigations. However, existing analysis techniques that aim to analyze local artifacts (eg …

Abusing trust: Mobile kernel subversion via TrustZone rootkits

D Marth, C Hlauschek, C Schanes… - 2022 IEEE Security …, 2022 - ieeexplore.ieee.org
The Arm TrustZone is the de facto standard for hardware-backed Trusted Execution
Environments (TEEs) on mobile devices, providing isolation for secure computations to be …

RandCompile: Removing Forensic Gadgets from the Linux Kernel to Combat its Analysis

F Franzen, AC Wilhelmer, J Grossklags - Proceedings of the 39th …, 2023 - dl.acm.org
Recently proposed tools such as LogicMem, Katana, and AutoProfile enable a fine-grained
inspection of the operating system's memory. They provide insights that were previously only …

Future of Kernel Object-Based Memory Forensics

D Kim, T Shon - … on Platform Technology and Service (PlatCon), 2023 - ieeexplore.ieee.org
There are various techniques (String Search, Signature, List Traversal, Kernel Object, etc.) to
perform memory forensics. Among them, Kernel Object-based memory forensics techniques …

A Zero-Knowledge Approach to Memory Forensics

A Oliveri - 2023 - theses.hal.science
The rapid increase of embedded devices and IoT objects is leading to a multiplication of
operating systems and processor architectures, which are generally not supported by …

TEE-based designs for network gateways, web authentication, and VM introspection

FF Schwarz - 2024 - publikationen.sulb.uni-saarland.de
Over the last decades, the complexity of client, server, and network devices has drastically
increased---and so has the number of sophisticated attacks against them. New …