Lisa Rzepka, Jennifer R. Ottmann, Felix Freiling, Harald Baier
{"title":"Causal Inconsistencies are Normal in Windows Memory Dumps (too)","authors":"Lisa Rzepka, Jennifer R. Ottmann, Felix Freiling, Harald Baier","doi":"10.1145/3680293","DOIUrl":null,"url":null,"abstract":"Main memory contains valuable information for criminal investigations, e.g., process information or keys for disk encryption. Taking snapshots of memory is therefore common practice during a digital forensic examination. Inconsistencies in such memory dumps can, however, hamper their analysis. In this paper, we perform a systematic assessment of causal inconsistencies in memory dumps taken on a Windows 10 machine using the kernel-level acquisition tool WinPmem. We use two approaches to measure the quantity of inconsistencies in Windows 10: (1) causal inconsistencies within self-injected memory data structures using a known methodology transferred from the Linux operating system, and (2) inconsistencies in the memory management data structures of the Windows kernel using a novel measurement technique based on properties of the virtual address descriptor (VAD) tree. Our evaluation is based on a dataset of more than 180 memory dumps. As a central result, both types of inconsistency measurement reveal that a high number of inconsistencies is the norm rather than the exception. We also correlate workload and execution time of the memory acquisition tool to the number of inconsistencies in the respective memory snapshot. By controlling these factors it is possible to (somewhat) control the level of inconsistencies in Windows memory dumps.","PeriodicalId":202552,"journal":{"name":"Digital Threats: Research and Practice","volume":"16 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Digital Threats: Research and Practice","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3680293","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Main memory contains valuable information for criminal investigations, e.g., process information or keys for disk encryption. Taking snapshots of memory is therefore common practice during a digital forensic examination. Inconsistencies in such memory dumps can, however, hamper their analysis. In this paper, we perform a systematic assessment of causal inconsistencies in memory dumps taken on a Windows 10 machine using the kernel-level acquisition tool WinPmem. We use two approaches to measure the quantity of inconsistencies in Windows 10: (1) causal inconsistencies within self-injected memory data structures using a known methodology transferred from the Linux operating system, and (2) inconsistencies in the memory management data structures of the Windows kernel using a novel measurement technique based on properties of the virtual address descriptor (VAD) tree. Our evaluation is based on a dataset of more than 180 memory dumps. As a central result, both types of inconsistency measurement reveal that a high number of inconsistencies is the norm rather than the exception. We also correlate workload and execution time of the memory acquisition tool to the number of inconsistencies in the respective memory snapshot. By controlling these factors it is possible to (somewhat) control the level of inconsistencies in Windows memory dumps.
主存储器包含对刑事调查有价值的信息,如进程信息或磁盘加密密钥。因此,拍摄内存快照是数字取证检查中的常见做法。然而,这种内存转储中的不一致性会妨碍分析。在本文中,我们使用内核级采集工具 WinPmem 对 Windows 10 机器上的内存转储中的因果不一致性进行了系统评估。我们使用两种方法来测量 Windows 10 中不一致的数量:(1)使用从 Linux 操作系统移植过来的已知方法测量自注入内存数据结构中的因果不一致;(2)使用基于虚拟地址描述符(VAD)树属性的新型测量技术测量 Windows 内核内存管理数据结构中的不一致。我们的评估基于 180 多个内存转储数据集。主要结果是,这两种不一致性测量方法都显示,大量不一致性是常态而非例外。我们还将内存获取工具的工作量和执行时间与相应内存快照中的不一致性数量联系起来。通过控制这些因素,我们可以(在一定程度上)控制 Windows 内存转储中的不一致程度。