Memory forensics using virtual machine introspection for Malware analysis

Chin Wei Tien, Jian Wei Liao, Shun Chieh Chang, Sy Yen Kuo

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

28 Scopus citations

Abstract

A security sandbox is a technology that is often used to detect advanced malware. However, current sandboxes are highly dependent on VM hypervisor types and versions. Thus, in this paper, we introduce a new sandbox design, using memory forensics techniques, to provide an agentless sandbox solution that is independent of the VM hypervisor. In particular, we leverage the VM introspection method to monitor malware running memory data outside the VM and analyze its system behaviors, such as process, file, registry, and network activities. We evaluate the feasibility of this method using 20 advanced and 8 script-based malware samples. We furthermore demonstrate how to analyze malware behavior from memory and verify the results with three different sandbox types. The results show that we can analyze suspicious malware activities, which is also helpful for cyber security defense.

Original languageEnglish
Title of host publication2017 IEEE Conference on Dependable and Secure Computing
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages518-519
Number of pages2
ISBN (Electronic)9781509055692
DOIs
StatePublished - 18 10 2017
Externally publishedYes
Event2017 IEEE Conference on Dependable and Secure Computing - Taipei, Taiwan
Duration: 07 08 201710 08 2017

Publication series

Name2017 IEEE Conference on Dependable and Secure Computing

Conference

Conference2017 IEEE Conference on Dependable and Secure Computing
Country/TerritoryTaiwan
CityTaipei
Period07/08/1710/08/17

Bibliographical note

Publisher Copyright:
© 2017 IEEE.

Keywords

  • Advanced malware analysis
  • Cyber security
  • Security sandbox
  • Virtual machine introspection

Fingerprint

Dive into the research topics of 'Memory forensics using virtual machine introspection for Malware analysis'. Together they form a unique fingerprint.

Cite this