2013
DOI: 10.1007/978-3-642-41284-4_2
|View full text |Cite
|
Sign up to set email alerts
|

Hypervisor Memory Forensics

Abstract: Abstract. Memory forensics is the branch of computer forensics that aims at extracting artifacts from memory snapshots taken from a running system. Even though it is a relatively recent field, it is rapidly growing and it is attracting considerable attention from both industrial and academic researchers. In this paper, we present a set of techniques to extend the field of memory forensics toward the analysis of hypervisors and virtual machines. With the increasing adoption of virtualization techniques (both as… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
4
4
2

Relationship

0
10

Authors

Journals

citations
Cited by 38 publications
(13 citation statements)
references
References 17 publications
0
13
0
Order By: Relevance
“…Memory analysis came into limelight after 2004 work by Carrier et al [5]. There exist plenty of open-source and commodity memory analysis tools [2, 6, 9, 10, 19, 23-25, 27, 28, 30, 32].The memory analysis is also extended to the analysis of hypervisors and virtual machine [15].…”
Section: Related Workmentioning
confidence: 97%
“…Memory analysis came into limelight after 2004 work by Carrier et al [5]. There exist plenty of open-source and commodity memory analysis tools [2, 6, 9, 10, 19, 23-25, 27, 28, 30, 32].The memory analysis is also extended to the analysis of hypervisors and virtual machine [15].…”
Section: Related Workmentioning
confidence: 97%
“…Other technologies required by RO-IoT are secure network bootloader [6,46,84], live memory forensics [43,52,86,96,102,107], PKI [31,35,44], and TEE (e.g., ARM TrustZone) [15,16,28,40,50,78,82,85].…”
Section: Related Work and Backgroundmentioning
confidence: 99%
“…Actaeon [83], a plugin to the Volatility framework to analyze volatile memory containing type 1 and/or type 2 hypervisors. When using a hardware device to perform volatile memory acquisition, the memory dump might contain a hypervisor.…”
Section: Tracingmentioning
confidence: 99%