Technique to Interrogate an Image of RAM
Using Mr. Aaron Walters' Python script, nistpe.py, which generates hash values for sections within Microsoft Windows portable executables (PE), I will present a technique allowing industry, academia, law-enforcement, and other government bodies to create custom reference sets that detect sectio...
Saved in:
Published in: | 2009 Fifth International Conference on IT Security Incident Management and IT Forensics pp. 111 - 119 |
---|---|
Main Author: | |
Format: | Conference Proceeding |
Language: | English |
Published: |
IEEE
01-09-2009
|
Subjects: | |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | Using Mr. Aaron Walters' Python script, nistpe.py, which generates hash values for sections within Microsoft Windows portable executables (PE), I will present a technique allowing industry, academia, law-enforcement, and other government bodies to create custom reference sets that detect sections within a raw bit image of random access memory. The technique identifies PE sections within a raw bit image of random access memory by comparing SHA-1 hash values from page aligned segments to SHA-1 reference file entries. This technique expands on the ldquoimmutable sections of known executablesrdquo reported earlier. Being able to identify PEs by hash values may facilitate volatile memory analysis and warn of malicious logic. |
---|---|
ISBN: | 076953807X 9780769538075 |
DOI: | 10.1109/IMF.2009.10 |