about
play

About Bringing Memory Forensics and Virtual Machine Introspection - PowerPoint PPT Presentation

About Bringing Memory Forensics and Virtual Machine Introspection Title: to Production Environments Student: Benjamin Taubmann PhD stage: Third year, finisher Advisor: Prof. Dr. Hans P. Reiser Affiliation: Assistant Professorship of


  1. About Bringing Memory Forensics and Virtual Machine Introspection Title: to Production Environments Student: Benjamin Taubmann PhD stage: Third year, finisher Advisor: Prof. Dr. Hans P. Reiser Affiliation: Assistant Professorship of Security in Information Systems University of Passau Research Area: System Security, Memory Forensics, Virtual Machine Introspection Projects: DINGfest (BMBF), ARADIA (DFG) Taubmann Digital Forensics on production environments 1 / 6

  2. Motivation “Senator reveals that the FBI paid $900,000 to hack into San Bernardino killer’s iPhone” - CNBC, 2017 What is the problem? § Missing interface for memory access on production systems (cloud, mobile devices) § Performance of current memory forensics and virtual machine introspection tools is too slow for use cases in production environments Why is it a problem? § Forensic investigators and common users cannot do memory based forensics on (their) VMs and mobiles devices § Cloud customers cannot benefit from the advantages of memory forensics and VMI-based security approaches : a higher level of isolation, stealthiness and forensic soundness than traditional in-guest security solutions. Taubmann Digital Forensics on production environments 2 / 6

  3. Research Questions 1. Data Acquisition: How to get access to the memory of production systems such as cloud environments or mobile devices? 2. Infomation Extraction: How to locate and extract high level information efficiently from main memory? 3. Applications: How to deploy and adapt VMI methods to the requirements of real world use cases and modern computing systems ? Taubmann Digital Forensics on production environments 3 / 6

  4. Overall Architecture Malware Intrusion Digital 3 Application Analysis Detection Forensics Trace Application Application ... Semantic Network Functions Knowledge: Packet Data Payload Modify Information Library 2 Structure Values Extraction Layout, Function Trace TCP/IP Address Syscalls Kernel Packet Intercept System State Trace Read Data Network 1 Acquisition Memory Network CPU Write Forensic Framework Analyzed System Taubmann Digital Forensics on production environments 4 / 6

  5. Contributions (bold red) Digital SSH Intrusion Malware 3 Forensics Honeypot Detection System Analysis Volatility/ TlsKex DroidKex Rekall 2 libvmtrace Drakvuf libvmi Frida 1 CloudPhylactor CloudVMI Coldboot Snapshot Static Dynamic Analysis Analysis Taubmann Digital Forensics on production environments 5 / 6

  6. Conclusion The main contributions of the thesis are: 1. A generic architecture for digital forensics on production systems 2. Data acquisition architecture for digital forensics in cloud environments and on mobile devices 3. Efficient TLS session key extraction from main memory of applications 4. Adapting resource intensive VMI-based tracing to the requirements of different use-cases that require minimal overhead such as intrusion detection systems Extended slide set: http://www.uni-passau.de/fileadmin/files/lehrstuhl/reiser/ publications/taubmann_introduction.pdf Taubmann Digital Forensics on production environments 6 / 6

  7. Thanks!

  8. Publications [1] Taubmann, Benjamin, Noëlle Rakotondravony, [5] Taubmann, Benjamin and Bojan Kolosnjaji. and Hans P. Reiser. “CloudPhylactor: “Architecture for Resource-Aware VMI-based Harnessing Mandatory Access Control for Cloud Malware Analysis.” In: SHCIS’17 . 2017. Virtual Machine Introspection in Cloud Data Centers.” In: IEEE TrustCom-16 . 2016. [6] Taubmann, Benjamin, Omar Al Abduljaleel, and Hans P. Reiser. “DroidKex: Fast Extraction of [2] Taubmann, Benjamin, Christoph Frädrich, Ephemeral TLS Keys from the Memory of Dominik Dusold, and Hans P. Reiser. “TLSkex: Android Apps.” In: DFRWS USA . 2018. Harnessing virtual machine introspection for decrypting TLS communication.” In: DFRWS [7] Stewart Sentanoe, Taubmann, Benjamin, and EU . 2016. Hans P. Reiser. “Virtual Machine Introspection [3] Taubmann, Benjamin, Manuel Huber, Based SSH Honeypot.” In: SHCIS’17 . 2017. Lukas Heim, Georg Sigl, and Hans P. Reiser. “A Lightweight Framework for Cold Boot Based [8] Taubmann, Benjamin and Hans P. Reiser. Forensics on Mobile Devices.” In: ARES . 2015. “Secure Architecture for VMI-based Dynamic [4] Andres Fischer, Thomas Kittel, Malware Analysis in the Cloud.” In: DSN fast abstract . 2016. Bojan Kolosnjaji, Tamas K Lengyel, Waseem Mandarawi, Hans P. Reiser, Taubmann, Benjamin, Eva Weishäupl, [9] F. Menges, F. Böhm, M. Vielberth, A. Puchta, Hermann de Meer, Tilo Müller, and B. Taubmann, N. Rakotondravony, T. Latzo. Mykola Protsenko. “CloudIDEA: A Malware “Introducing DINGfest: An architecture for next Defense Architecture for Cloud Data Centers.” generation SIEM systems.” In: GI Sicherheit In: C&TC 2015 . 2015. 2018 (Short Paper) .

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend