Development of Kernel Mode RAM Driver for RAM Image on Windows
Öz
In the
field of computer forensics live analysis through immediate intervention is an
important way of gathering electronic evidence. The way to obtain evidence from
volatile data using live analysis is to take an image of the RAM (Random Access
Memory). The entire RAM has to be copied in order to import data from this
image. However, since the user mode is the default mode in Windows operating
systems only the running processes can be accessed. Therefore, RAM imaging software needs to work
at Kernel Mode level. In this study, a RAM driver was developed using WDK
(Window Driver Kit) to enable RAM imaging software to run in Kernel Mode. The
developed driver works on Windows 8, 8.1 and 10 (32 bit and 64 bit) operating
systems. Virtual addresses, physical addresses and table pages for RAM can be
accessed using the developed RAM driver. In this way, image acquisition
software using this driver is able to carry out bit-to-bit copying of RAM. In
addition, a program to import a RAM image in c ++ using this driver has also
been developed. When the image retrieval software is installed in RAM it
occupies a meager 156 KB of space. Compared to the existing image acquisition
software, the developed RAM driver and software seem to use the least RAM. In
addition, there are no examples of Kernel Mode RAM Drivers developed using WDK
in the literature.
Anahtar Kelimeler
Kaynakça
- [1] Amari, K. (2009). Techniques and tools for recovering and analyzing data from volatile memory. SANS Institute InfoSec Reading Room.
- [2] Ariffin, K. A. Z., Mahmood, A. K., Jaafar, J., & Shamsuddin, S. (2015). Tracking File's Metadata from Computer Memory Analysis. In Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing (CIT/IUCC/DASC/PICOM), 2015 IEEE International Conference on (pp. 975-980). IEEE. https://doi.org/10.1109/CIT/IUCC/DASC/PICOM.2015.147
- [3] Butler, J., & Murdock, J. (2011). Physical Memory Forensics for Files and Cache. Craigchamberlain.Dreamhosters.Com. Retrieved fromhttp://www.craigchamberlain.dreamhosters.com/blackhat2011/materials/Butler/BH_US_11_ButlerMurdock_Physical_Memory_ForensicsWP.pdf%5Cnpapers2://publication/uuid/0D588947-26F8-4823-86C4-B1E231D50CD4
- [4] Vidas, T. (2007). The Acquisition and Analysis of Random Access Memory. Journal of Digital Forensic Practice, 1(4), 315–323. https://doi.org/10.1080/15567280701418171
- [5] Dolan-Gavitt, B. (2007). The VAD tree: A process-eye view of physical memory. Digital Investigation, 4(SUPPL.), 62–64. https://doi.org/10.1016/j.diin.2007.06.008
- [6] Garcia, G. L. (2007). Forensic physical memory analysis: an overview of tools and techniques. In TKK T-110.5290 Seminar on Network Security, 305–320.
- [7] Russinovich,M., Solomon, A., Ionescu, A., Windows Internals (6th Edition), Part 2, Microsoft Press, 2012.
- [8] Petroni, N. L., Walters, Aa., Fraser, T., & Arbaugh, W. A. (2006). FATKit: A framework for the extraction and analysis of digital forensic data from volatile system memory. Digital Investigation, 3(4), 197–210. https://doi.org/10.1016/j.diin.2006.10.001
Ayrıntılar
Birincil Dil
İngilizce
Konular
Mühendislik
Bölüm
Araştırma Makalesi
Yazarlar
Ahmet Ali Süzen
*
0000-0002-5871-1652
Türkiye
Ecir Uğur Küçüksille
Bu kişi benim
0000-0002-3293-9878
Yayımlanma Tarihi
25 Ağustos 2019
Gönderilme Tarihi
19 Şubat 2019
Kabul Tarihi
19 Nisan 2019
Yayımlandığı Sayı
Yıl 2019 Cilt: 23 Sayı: 2