Virtual machine memory forensics

A Huseinović, S Ribić - 2013 21st Telecommunications Forum …, 2013 - ieeexplore.ieee.org
Forensic analysis of virtual machines is not an easy task. In this paper, simple cases of
virtual machine memory … The process list from VMware virtual machine was obtained in three …

A KVM virtual machine memory forensics method based on VMCS

S Zhang, L Wang, X Han - 2014 Tenth International Conference …, 2014 - ieeexplore.ieee.org
Virtual Machine) virtual machine memory forensics has been proposed. By analyzing the
memory image of a host machine, active virtual machines … picture of the virtual machine’s states …

Hypervisor memory forensics

M Graziano, A Lanzi, D Balzarotti - … , RAID 2013, Rodney Bay, St. Lucia …, 2013 - Springer
… For example, if a Windows user is running a second Windows OS inside a virtual machine,
thanks to our techniques a memory forensic tool to list the running processes should be able …

Leveraging virtual machine introspection with memory forensics to detect and characterize unknown malware using machine learning techniques at hypervisor

MAA Kumara, CD Jaidhar - Digital Investigation, 2017 - Elsevier
… Advantages of using VMI with digital forensics are described in (… memory dump to perform
memory forensics. In a virtualization environment, frequent acquisition of the live VM's memory

Memory forensics using virtual machine introspection for Malware analysis

CW Tien, JW Liao, SC Chang… - 2017 IEEE Conference …, 2017 - ieeexplore.ieee.org
… using memory forensic techniques, which does not require the capturing of system calls. By
… the advantages of virtual machine (VM) introspection, we can watch the live memory data of …

Memory dump and forensic analysis based on virtual machine

L Guangqi, W Lianhai, Z Shuhui… - … on Mechatronics and …, 2014 - ieeexplore.ieee.org
… Finally, using the memory forensics analysis module to … on the virtual machine memory dump
and forensic analysis … Xeon E5-2620 GHZ 2GHZ*6;Memory capacity: 8G DDR3*2;The host …

Memory forensics: The path forward

A Case, GG Richard III - Digital investigation, 2017 - Elsevier
… would also work for virtual machine guests where the analyst did not have host access,
as hardware virtualization extensions allow for nesting of virtual machines. The downside is …

HyperLink: Virtual machine introspection and memory forensic analysis without kernel source code

J Xiao, L Lu, H Wang, X Zhu - 2016 IEEE international …, 2016 - ieeexplore.ieee.org
… Existing introspection and memory forensic tools all face one challenge, which is to re-… In
summary, existing introspection and memory forensic tools require a very high development …

The evolution of volatile memory forensics

H Nyholm, K Monteith, S Lyles, M Gallegos… - … of Cybersecurity and …, 2022 - mdpi.com
… , called virtual machines, are … , so the virtual machines can be isolated from other virtual
machines or programs on the same hardware. However, the hypervisor and the virtual machine

Live digital forensics in a virtual machine

L Zhang, D Zhang, L Wang - 2010 International Conference on …, 2010 - ieeexplore.ieee.org
forensics on a subject system with virtual machines hosted in? This paper discusses how
virtual machines can be used both as forensic … data associated with virtual machines from the …