Главная
Study mode:
on
1
Intro
2
Agenda
3
Introduction
4
Process Address Space
5
Paging
6
Overview
7
PTE Subversions
8
PTE Remapping
9
PTE Erasure
10
Evaluation - Memory Forensics
11
Evaluation - Live Forensics
12
Considerations
13
Modified PFN Remapping on Windows
14
MAS Remapping Detection
15
PTE Subversion Detection - Windows
16
PTE Subversion Detection - Linux
17
Shared Memory Subversion Detection
18
Test environment
19
Detection Evaluation - Windows
20
Detection Evaluation - Linux
21
False Positives - Windows
22
False Positives - Linux
23
Comparison - Attacker's Point of View
24
Conclusion
25
Limitations
26
Future Work
Description:
Explore advanced anti-forensic techniques for hiding process memory in this 37-minute Black Hat conference talk. Delve into three novel methods that prevent malicious user space memory from appearing in analysis tools and make it inaccessible to security analysts. Learn about process address space, paging, PTE subversions, remapping, and erasure. Evaluate the effectiveness of these techniques against memory and live forensics. Examine considerations for modified PFN remapping on Windows, MAS remapping detection, and PTE subversion detection on both Windows and Linux. Analyze shared memory subversion detection, test environments, and detection evaluation across operating systems. Compare these techniques from an attacker's perspective, and discuss limitations and future work in this field of anti-forensic research.

Hiding Process Memory via Anti-Forensic Techniques

Black Hat
Add to list