Skip to main content

Secure Virtual Machine for Real Time Forensic Tools on Commodity Workstations

  • Conference paper
  • First Online:
Innovative Security Solutions for Information Technology and Communications (SECITC 2016)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 10006))

Included in the following conference series:

Abstract

Forensic analysis of volatile memory is a crucial part in the Incident Response process. Traditionally, it requires acquiring and transferring a memory dump from the affected workstation over to the analyst’s system, where it is analyzed using established forensic tools such as Volatility or Rekall. Hardware-based virtualization support of modern x86 CPUs was previously used on endpoints to acquire volatile memory in a way that can’t be interfered by malware, but which doesn’t support reusing exiting forensic tools to perform live analysis. We introduce a system that leverages a small, security-oriented hypervisor (HV) to run the original endpoint’s OS inside a virtual machine (VM), alongside another VM dedicated to live forensic analysis using existing forensic tools. The HV enforces isolation between the analyzed OS and the forensic VM, while allowing reliable remote connection to the forensic VM through a dedicated physical network card.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Data Breach Investigations Report (DBIR). http://www.verizonenterprise.com/DBIR/2015/

  2. BusyBox. http://www.busybox.net/about.html

  3. Dropbear SSH. https://matt.ucc.asn.au/dropbear/dropbear.html

  4. FTK Imager version 3.2.0 – AccessData. http://accessdata.com/product-download/digital-forensics/ftk-imager-version-3.2.0

  5. Immunity Inc: Knowing You’re Secure. http://www.immunityinc.com/products/eljefe/

  6. Memoryze – FireEye. https://www.fireeye.com/services/freeware/memoryze.html

  7. MIG: Mozilla InvestiGator. http://mig.mozilla.org/

  8. Next-Generation Endpoint Protection – CrowdStrike Falcon Host. http://www.crowdstrike.com/products/falcon-host/

  9. OpenAttestation - OpenStack. https://wiki.openstack.org/wiki/OpenAttestation

  10. Products – MoonSols. http://www.moonsols.com/products/

  11. Rekall Memory Forensic Framework. http://www.rekall-forensic.com/index.html

  12. Rekall Memory Forensic Framework. http://www.rekall-forensic.com/faq.html

  13. RSA ECAT – Advanced Endpoint Threat Detection – EMC. http://www.emc.com/security/rsa-ecat.htm

  14. TrouSerS - The open-source TCG Software Stack - FAQ. http://trousers.sourceforge.net/faq.html#1.1

  15. The Volatility Foundation - Open Source Memory Forensics. http://www.volatilityfoundation.org/

  16. vSphere ESXi Bare-Metal Hypervisor | United States. https://www.vmware.com/products/esxi-and-esx/overview

  17. Welcome to Python.org. https://www.python.org/

  18. Intel Trusted Execution Technology Software Development Guide, July 2015. http://www.intel.com/content/dam/www/public/us/en/documents/guides/intel-txt-software-development-guide.pdf

  19. Balogh, S.: Memory acquisition by using network card. J. Cyber Secur. Mobil. 3(1), 65–76 (2014)

    Article  Google Scholar 

  20. Barham, P., Dragovic, B., Fraser, K., Hand, S., Harris, T., Ho, A., Neugebauer, R., Pratt, I., Warfield, A.: Xen and the art of virtualization. In: Proceedings of the Nineteenth ACM Symposium on Operating Systems Principles, SOSP 2003, pp. 164–177. ACM, New York (2003)

    Google Scholar 

  21. Breuk, R., Spruyt, A.: Integrating DMA attacks in exploitation frameworks pp. 2011–2012 (2012). https://homepages.staff.os3.nl/~delaat/rp/2011-2012/p14/report.pdf. Accessed 14 Jan 2014

  22. Chen, X., Garfinkel, T., Lewis, E.C., Subrahmanyam, P., Waldspurger, C.A., Boneh, D., Dwoskin, J., Ports, D.R.: Overshadow: a virtualization-based approach to retrofitting protection in commodity operating systems. In: Proceedings of the 13th International Conference on Architectural Support for Programming Languages and Operating Systems, ASPLOS XIII, pp. 2–13. ACM, New York (2008)

    Google Scholar 

  23. Cheng, Y., Ding, X.: Virtualization based password protection against malware in untrusted operating systems. In: Katzenbeisser, S., Weippl, E., Camp, L.J., Volkamer, M., Reiter, M., Zhang, X. (eds.) Trust 2012. LNCS, vol. 7344, pp. 201–218. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  24. Cheng, Y., Ding, X.: Guardian: hypervisor as security foothold for personal computers. In: Huth, M., Asokan, N., Čapkun, S., Flechais, I., Coles-Kemp, L. (eds.) TRUST 2013. LNCS, vol. 7904, pp. 19–36. Springer, Heidelberg (2013)

    Chapter  Google Scholar 

  25. Cheng, Y., Ding, X., Deng, R.H.: AppShield: protecting applications against untrusted operating system. Technical report, School of Information Systems, Singapore Management University, November 2013

    Google Scholar 

  26. Cohen, M., Bilby, D., Caronni, G.: Distributed forensics and incident response in the enterprise. Digit. Invest. 8, S101–S110 (2011)

    Article  Google Scholar 

  27. Cohen, M.: WinPMEM (2012). https://volatility.googlecode.com/svn-history/r2091/branches/scudette/tools/windows/winpmem/README

  28. Dewan, P., Durham, D., Khosravi, H., Long, M., Nagabhushan, G.: A hypervisor-based system for protecting software runtime memory and persistent storage. In: Proceedings of the 2008 Spring Simulation Multiconference, pp. 828–835. Society for Computer Simulation International (2008)

    Google Scholar 

  29. Dolan-Gavitt, B., Payne, B., Lee, W.: Leveraging forensic tools for virtual machine introspection (2011). https://smartech.gatech.edu/handle/1853/38424

  30. Hizver, J., Chiueh, T.C.: Real-time deep virtual machine introspection and its applications. In: Proceedings of the 10th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments, VEE 2014, pp. 3–14. ACM, New York (2014)

    Google Scholar 

  31. Hofmann, O.S., Kim, S., Dunn, A.M., Lee, M.Z., Witchel, E.: InkTag: secure applications on an untrusted operating system. In: Proceedings of the Eighteenth International Conference on Architectural Support for Programming Languages and Operating Systems, pp. 265–278. ACM (2013)

    Google Scholar 

  32. Kivity, A., Kamay, Y., Laor, D., Lublin, U., Liguori, A.: KVM: the Linux virtual machine monitor, pp. 225–230, July 2007. http://www.kernel.org/doc/ols/2007/ols2007v1-pages-225-230.pdf

  33. Lengyel, T.K., Maresca, S., Payne, B.D., Webster, G.D., Vogl, S., Kiayias, A.: Scalability, fidelity and stealth in the DRAKVUF dynamic malware analysis system. In: Proceedings of the 30th Annual Computer Security Applications Conference, pp. 386–395. ACM (2014)

    Google Scholar 

  34. Luţaş, A., Lukács, S., Coleşa, A., Luţaş, D.: Proposed processor extensions for significant speedup of hypervisor memory introspection. In: Conti, M., Schunter, M., Askoxylakis, I. (eds.) TRUST 2015. LNCS, vol. 9229, pp. 249–267. Springer, Heidelberg (2015)

    Chapter  Google Scholar 

  35. Martignoni, L., Fattori, A., Paleari, R., Cavallaro, L.: Live and trustworthy forensic analysis of commodity production systems. In: Jha, S., Sommer, R., Kreibich, C. (eds.) RAID 2010. LNCS, vol. 6307, pp. 297–316. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  36. Martin, A.: FireWire memory dump of a windows XP computer: a forensic approach. Black Hat DC, pp. 1–13 (2007). http://www.friendsglobal.com/papers/FireWire%20Memory%20Dump%20of%20Windows%20XP.pdf

  37. Moser, A., Cohen, M.I.: Hunting in the enterprise: forensic triage and incident response. Digit. Invest. 10(2), 89–98 (2013)

    Article  Google Scholar 

  38. Newsome, J., McCune, J.M., Zhou, Z., Gligor, V.D.: Building verifiable trusted path on commodity x86 computers. In: 2012 IEEE Symposium on Security and Privacy, SP 2012, pp. 616–630. IEEE, May 2012

    Google Scholar 

  39. Payne, B.D.: Simplifying virtual machine introspection using LibVMI. Sandia report (2012). http://prod.sandia.gov/techlib/access-control.cgi/2012/127818.pdf

  40. Payne, B.D., De Carbone, M.D.P., Lee, W.: Secure and flexible monitoring of virtual machines. In: Twenty-Third Annual Computer Security Applications Conference, ACSAC 2007, pp. 385–397. IEEE (2007)

    Google Scholar 

  41. Reina, A., Fattori, A., Pagani, F., Cavallaro, L., Bruschi, D.: When hardware meets software: a bulletproof solution to forensic memory acquisition. In: Proceedings of the 28th Annual Computer Security Applications Conference, pp. 79–88. ACM (2012)

    Google Scholar 

  42. Schatz, B.: BodySnatcher: towards reliable volatile memory acquisition by software. Digit. Invest. 4, 126–134 (2007)

    Article  Google Scholar 

  43. Seshadri, A., Luk, M., Qu, N., Perrig, A.: SecVisor: a tiny hypervisor to provide lifetime kernel code integrity for commodity OSes. ACM SIGOPS Oper. Syst. Rev. 41(6), 335–350 (2007)

    Article  Google Scholar 

  44. Stewin, P., Bystrov, I.: Understanding DMA malware. In: Flegel, U., Markatos, E., Robertson, W. (eds.) DIMVA 2012. LNCS, vol. 7591, pp. 21–41. Springer, Heidelberg (2013)

    Chapter  Google Scholar 

  45. Stüttgen, J., Cohen, M.: Anti-forensic resilient memory acquisition. Digit. Invest. 10, S105–S115 (2013)

    Article  Google Scholar 

  46. Vömel, S., Freiling, F.C.: Correctness, atomicity, and integrity: defining criteria for forensically-sound memory acquisition. Digit. Invest. 9(2), 125–137 (2012)

    Article  Google Scholar 

  47. Wang, J., Stavrou, A., Ghosh, A.: HyperCheck: a hardware-assisted integrity monitor. In: Jha, S., Sommer, R., Kreibich, C. (eds.) RAID 2010. LNCS, vol. 6307, pp. 158–177. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  48. Yu, M., Lin, Q., Li, B., Qi, Z., Guan, H.: Vis: virtualization enhanced live acquisition for native system. In: Proceedings of the Second Asia-Pacific Workshop on Systems, p. 13. ACM (2011)

    Google Scholar 

  49. Zaharia, M., Katti, S., Grier, C., Paxson, V., Shenker, S., Stoica, I., Song, D.: Hypervisors as a foothold for personal computer security: an agenda for the research community. Technical report, UCB/EECS-2012-12, EECS Department, University of California, Berkeley (2012)

    Google Scholar 

  50. Zhong, X., Xiang, C., Yu, M., Qi, Z., Guan, H.: A virtualization based monitoring system for mini-intrusive live forensics. Int. J. Parallel Program. 43(3), 455–471 (2015)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Dan Luţaş .

Editor information

Editors and Affiliations

A Annex 1

A Annex 1

See Annex Table 3.

Table 3. Details about the way MiniSecHV partitions the system memory and devices between the hypervisor, the analyzed VM and the forensic VM

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing AG

About this paper

Cite this paper

Luţaş, D., Coleşa, A., Lukács, S., Luţaş, A. (2016). Secure Virtual Machine for Real Time Forensic Tools on Commodity Workstations. In: Bica, I., Reyhanitabar, R. (eds) Innovative Security Solutions for Information Technology and Communications. SECITC 2016. Lecture Notes in Computer Science(), vol 10006. Springer, Cham. https://doi.org/10.1007/978-3-319-47238-6_14

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-47238-6_14

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-47237-9

  • Online ISBN: 978-3-319-47238-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics