Asynchronous pseudo physical memory snapshot and forensics on paravirtualized VMM using split kernel module

  • Authors:
  • Ruo Ando;Youki Kadobayashi;Youichi Shinoda

  • Affiliations:
  • National Institute of Information and Communication Technology, Koganei, Tokyo, Japan;National Institute of Information and Communication Technology, Koganei, Tokyo, Japan;National Institute of Information and Communication Technology, Koganei, Tokyo, Japan

  • Venue:
  • ICISC'07 Proceedings of the 10th international conference on Information security and cryptology
  • Year:
  • 2007

Quantified Score

Hi-index 0.00

Visualization

Abstract

VMM (virtual machine monitor) provides the useful inspection and interposition of the guest OS. With proper modification of the guest OS and VMM, we can obtain incident-driven memory snapshot for malicious code forensics. In this paper we propose an asynchronous memory snapshot and forensics using split kernel module. Our split kernel module works for the virtualized interruption handling, which notifies the security incident on the guest OS. On frontend, we insert virtualized interruption into source code of MAC (mandatory access control) module and other security modules. Then, backend kernel module receives interruption as the asynchronous incident notification. In experiment, we take RAM snapshot of LKM-rootkit installation using system call extension. Frequently appeared strings are extracted in order to find the evidence memory blocks which was assigned for LKM-rootkit. Also, it is showed that asynchronous snapshot enables us to find the evidence of malicious software in memory snapshot by simple string analysis in linear time.