Ajou University repository

Future of Kernel Object-Based Memory Forensics
Citations

SCOPUS

0

Citation Export

Publication Year
2023-01-01
Journal
2023 International Conference on Platform Technology and Service, PlatCon 2023 - Proceedings
Publisher
Institute of Electrical and Electronics Engineers Inc.
Citation
2023 International Conference on Platform Technology and Service, PlatCon 2023 - Proceedings, pp.64-66
Keyword
Digital ForensicsKernel ObjectMemory
Mesh Keyword
Forensic TechniquesKernel objectMemory forensicsObject basedObject structureObjects-basedOperating system kernelPrior-knowledgeString searchSystem version
All Science Classification Codes (ASJC)
Artificial IntelligenceComputer Networks and CommunicationsComputer Science ApplicationsInformation Systems and ManagementSafety, Risk, Reliability and QualityMedia Technology
Abstract
There are various techniques (String Search, Signature, List Traversal, Kernel Object, etc.) to perform memory forensics. Among them, Kernel Object-based memory forensics techniques that utilize the object structure of the kernel are considered the most reliable. Kernel Object-based memory forensics techniques require prior knowledge of the object structure of the operating system kernel used in the memory dump. However, reverse engineering the kernel for a vast number of operating system versions and architectures to identify the object structure is labor- and time-consuming. To solve this problem, academic researchers have developed methods to efficiently identify the structure of various kernel objects. Various studies have been conducted to identify key features that kernel objects leave in memory, or to use automation technology. We will review these works and discuss what further research can be done and the challenges that need to be considered.
Language
eng
URI
https://aurora.ajou.ac.kr/handle/2018.oak/36977
https://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=85175403533&origin=inward
DOI
https://doi.org/10.1109/platcon60102.2023.10255186
Journal URL
http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=10255091
Type
Conference
Show full item record

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

SHON, TAE SHIK Image
SHON, TAE SHIK손태식
Department of Cyber Security
Read More

Total Views & Downloads

File Download

  • There are no files associated with this item.