2012
DOI: 10.1007/978-3-642-33338-5_7
|View full text |Cite
|
Sign up to set email alerts
|

Dione: A Flexible Disk Monitoring and Analysis Framework

Abstract: Abstract. The proliferation of malware in recent years has motivated the need for tools to detect, analyze, and understand intrusions. Though analysis and detection can be difficult, malware fortunately leaves artifacts of its presence on disk. In this paper, we present Dione, a flexible policy-based disk I/O monitoring and analysis infrastructure that can be used to analyze and understand malware behavior. Dione interposes between a system-under-analysis and its hard disk, intercepting disk accesses and recon… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2016
2016
2019
2019

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(6 citation statements)
references
References 17 publications
0
6
0
Order By: Relevance
“…Jain et al [41] provide an excellent overview of this area of research. However, introspection techniques have very limited access to the semantic meaning of the data that they are acquiring, which led to the development of numerous techniques for bridging this semantic gap in both memory [9], [27], [33], [42], [48] and disk [18], [45], [50] accesses. All VM-based techniques thus far have nevertheless been shown to reveal some detectable artifacts [20], [57], [59], [60] that could still be used to subvert analysis [31], [57].…”
Section: Background and Threat Modelmentioning
confidence: 99%
See 1 more Smart Citation
“…Jain et al [41] provide an excellent overview of this area of research. However, introspection techniques have very limited access to the semantic meaning of the data that they are acquiring, which led to the development of numerous techniques for bridging this semantic gap in both memory [9], [27], [33], [42], [48] and disk [18], [45], [50] accesses. All VM-based techniques thus far have nevertheless been shown to reveal some detectable artifacts [20], [57], [59], [60] that could still be used to subvert analysis [31], [57].…”
Section: Background and Threat Modelmentioning
confidence: 99%
“…LO-PHI also necessitated the development of novel introspection techniques. While numerous techniques exist for memory acquisition [19], [28], [72] of bare-metal systems, passively monitoring disk activity has only recently begun to be explored [50]. In this work we present a hardware sensor capable of passively sniffing the disk activity of a live machine while introducing minimal artifacts.…”
Section: Introductionmentioning
confidence: 99%
“…This ultimately eliminates the need to install malware detection software on the guest machine and could enable further research into system state analysis in virtual environments. Tags Mankin and Kaeli [97] propose a similar disk monitoring system: Their implementation, the Disk I/O analysis engine (DIONE), intercepts and interprets disk access operations using a sensor that resides in the Xen hypervisor outside the guest OS. Thanks to this design, DIONE is more resilient against many conventional attacks and various obfuscation techniques.…”
Section: Malware Analysis Solutionsmentioning
confidence: 99%
“…This limitation is known as the semantic gap problem. There is significant work in the semantic gap problem as it relates to memory [20,75,98,130,152] and disk [50,145,156] accesses.…”
Section: Malware Analysismentioning
confidence: 99%
“…This entire process is visualized in Figure 3.6a. Unlike previous work [156] was designed for NTFS, our approach is generalizable to any filesystem supported by tools similar to Sleuthkit. An example output from creating the file LO-PHI.txt on the desktop is shown in Figure 3.7:…”
Section: Diskmentioning
confidence: 99%