Visible to the public Trace-free Memory Data Structure Forensics via Past Inference and Future Speculations

TitleTrace-free Memory Data Structure Forensics via Past Inference and Future Speculations
Publication TypeConference Paper
Year of Publication2016
AuthorsSun, Pengfei, Han, Rui, Zhang, Mingbo, Zonouz, Saman
Conference NameProceedings of the 32Nd Annual Conference on Computer Security Applications
PublisherACM
Conference LocationNew York, NY, USA
ISBN Number978-1-4503-4771-6
Keywordscomposability, Metrics, pubcrawl, taint analysis
Abstract

A yet-to-be-solved but very vital problem in forensics analysis is accurate memory dump data type reverse engineering where the target process is not a priori specified and could be any of the running processes within the system. We present ReViver, a lightweight system-wide solution that extracts data type information from the memory dump without its past execution traces. ReViver constructs the dump's accurate data structure layout through collection of statistical information about possible past traces, forensics inspection of the present memory dump, and speculative investigation of potential future executions of the suspended process. First, ReViver analyzes a heavily instrumented set of execution paths of the same executable that end in the same state of the memory dump (the eip and call stack), and collects statistical information the potential data structure instances on the captured dump. Second, ReViver uses the statistical information and performs a word-byword data type forensics inspection of the captured memory dump. Finally, ReViver revives the dump's execution and explores its potential future execution paths symbolically. ReViver traces the executions including library/system calls for their known argument/return data types, and performs backward taint analysis to mark the dump bytes with relevant data type information. ReViver's experimental results on real-world applications are very promising (98.1%), and show that ReViver improves the accuracy of the past trace-free memory forensics solutions significantly while maintaining a negligible runtime performance overhead (1.8%).

URLhttp://doi.acm.org/10.1145/2991079.2991118
DOI10.1145/2991079.2991118
Citation Keysun_trace-free_2016