دانلود مقاله ISI انگلیسی شماره 155516
ترجمه فارسی عنوان مقاله

حافظه اسکن با یارا

عنوان انگلیسی
Scanning memory with Yara
کد مقاله سال انتشار تعداد صفحات مقاله انگلیسی
155516 2017 12 صفحه PDF
منبع

Publisher : Elsevier - Science Direct (الزویر - ساینس دایرکت)

Journal : Digital Investigation, Volume 20, March 2017, Pages 34-43

ترجمه کلمات کلیدی
تجزیه و تحلیل حافظه، مهندسی معکوس، داخلی، سیستم عامل، تجزیه و تحلیل قانونی، تشخیص بدافزار، تشخیص نفوذ،
کلمات کلیدی انگلیسی
Memory analysis; Reverse engineering; Windows internals; Operating system; Forensic analysis; Malware detection; Intrusion detection;
پیش نمایش مقاله
پیش نمایش مقاله  حافظه اسکن با یارا

چکیده انگلیسی

Memory analysis has been successfully utilized to detect malware in many high profile cases. The use of signature scanning to detect malicious tools is becoming an effective triaging and first response technique. In particular, the Yara library and scanner has emerged as the defacto standard in malware signature scanning for files, and there are many open source repositories of yara rules. Previous attempts to incorporate yara scanning in memory analysis yielded mixed results. This paper examines the differences between applying Yara signatures on files and in memory and how yara signatures can be developed to effectively search for malware in memory. For the first time we document a technique to identify the process owner of a physical page using the Windows PFN database. We use this to develop a context aware Yara scanning engine which can scan all processes simultaneously using a single pass over the physical image.