Vmmf: Virtual Machine Memory Forensics Based on Event Trigger Mechanism

Yong Gang Li,Chao Yuan Cui,Yun Wu,Bing Yu Sun
DOI: https://doi.org/10.12783/dtcse/iceiti2016/6143
2016-01-01
Abstract:Virtualization is increasing rapidly recent years. Virtual machines have become not only attack objects but also criminal tools for computer crimes. Memory forensics technology can collect the evidence of virtual machine crimes effectively. Traditional memory forensics tools are deployed into the host where attackers always try to hide or delete the data generated during attack process. As a result, they can be bypassed or cheated in virtual machines. Besides, to get the complete information traditional tools always expand the forensics scale leading to massive redundant information. For the sake of these problems, we propose a new method of virtual machine memory forensics based on event trigger mechanism named VMMF. The experiment results show that the new method can get the code section, data section, kernel stack content, dynamic-link library file, and execution path of the suspicious process in Linux. It just focuses on the suspicious process content reducing redundant information.
What problem does this paper attempt to address?