Title
When hardware meets software: a bulletproof solution to forensic memory acquisition
Abstract
The acquisition of volatile memory of running systems has become a prominent and essential procedure in digital forensic analysis and incident responses. In fact, unencrypted passwords, cryptographic material, text fragments and latest-generation malware may easily be protected as encrypted blobs on persistent storage, while living seamlessly in the volatile memory of a running system. Likewise, systems' run-time information, such as open network connections, open files and running processes, are by definition live entities that can only be observed by examining the volatile memory of a running system. In this context, tampering of volatile data while an acquisition is in progress or during transfer to an external trusted entity is an ongoing issue as it may irremediably invalidate the collected evidence. To overcome such issues, we present SMMDumper, a novel technique to perform atomic acquisitions of volatile memory of running systems. SMMDumper is implemented as an x86 firmware, which leverages the System Management Mode of Intel CPUs to create a complete and reliable snapshot of the state of the system that, with a minimal hardware support, is resilient to malware attacks. To the best of our knowledge, SMMDumper is the first technique that is able to atomically acquire the whole volatile memory, overcoming the SMM-imposed 4GB barrier while providing integrity guarantees and running on commodity systems. Experimental results show that the time SMMDumper requires to acquire and transfer 6GB of physical memory of a running system is reasonable to allow for a real-world adoption in digital forensic analyses and incident responses.
Year
DOI
Venue
2012
10.1145/2420950.2420962
ACSAC
Keywords
Field
DocType
volatile data,commodity system,physical memory,forensic memory acquisition,atomic acquisition,volatile memory,time smmdumper,incident response,latest-generation malware,digital forensic analysis,whole volatile memory,bulletproof solution,system management mode,forensic
x86,Extended memory,Computer security,Computer science,Real-time computing,Memory management,Computer hardware,Volatile memory,Memory map,Malware,Operating system,Firmware,Embedded system,System Management Mode
Conference
Citations 
PageRank 
References 
15
0.58
7
Authors
5
Name
Order
Citations
PageRank
Alessandro Reina1212.01
Fattori, A.2946.19
Fabio Pagani3173.34
Lorenzo Cavallaro488652.85
Danilo Bruschi577170.35