SlideShare a Scribd company logo
Memory Forensics using Virtual
Machine Introspection for Cloud
Computing
Tobias Zillner, BSc MSc MSc
About Me
Tobias Zillner, BSc MSc MSc
• Vienna, Austria
• Founder of Zillner IT-Security
• Independent Security Consultant & Researcher
• Consulting, Audit, Advisory, Training
• Security Research
• Internet of Things, Smart Homes
• Wireless Security
• www.zillner.tech
SDR Enthusiast
What is it about?
And why do we need it?
Outline
Introduction & Background
Virtual Machine Introspection (VMI)
Use cases
Prototype
Summary
Motivation
Relocation of systems and services into cloud environments is on the rise
Users loose direct access / control over their systems
Forensic methods are limited in the cloud
Enable the user to perform their own forensic investigations
Forensic as a Service
Memory forensics &
Virtual machine Introspection
Forensic Process
Collection Examination Analysis Reporting
Media Data Information Evidence
Hardware virtualization
One / Multiple guest OS on virtualized hardware
Managed by Virtual Machine Monitor (VMM) – Hypervisor
Provides interfaces and controls interactions with hardware
• CPU, memory, network, storage,…
Hypervisor on own OS – Host OS
Native vs. hosted virtualization
Hardware
Hypervisor
Guest OS
Application
Application
Application
Guest OSApplication
Application
Application
Hardware
Hypervisor
Guest
OS
Application
Application
Application
Guest
OS
Application
Application
Application
Host OS
Application
Application
Native virtualization Hosted virtualization
Virtual machine Introspection
“Virtual Introspection (VI) is the process by which the
state of a virtual machine (VM) is observed from
either the Virtual Machine Monitor (VMM), or from
some virtual machine other than the one being
examined. “ 1
1
:	Brian	Hay	and	Kara	Nance.	Forensics	examination	of	volatile	system	data	using	
virtual	introspection.	SIGOPS	Oper.	Syst.	Rev.,	42(3):74	82,	April	2008
Semantic gap
Difference between the presentation of data from volatile memory by the OS
and the raw data format
Requires VMI to perform the same translation of the the raw memory data
as the OS
At least some knowledge about the guest OS is necessary
http://libvmi.com/docs/gcode-intro.html
How does it work?
Advantages
No altering of the target system
Very hard to detect the monitoring
Live analysis of memory content
Data size for analysis (storage much larger than memory)
Detection of advanced memory only malware
More reliable data
• No data corruption through malware
Countermeasures
Detection
• Timing analysis - unusual patterns in the frequency at which it is scheduled
for execution
• Page fault analysis - the target VM may be able to detect unusual patterns
in the distribution of page faults
Direct Kernel Structure Manipulation (DKSM)
• VMI assumes that OS implement certain kernel- and data structures
• DKSM modifies this structures and prevents monitoring
• Sytanx based: targeted deletion/addition/manipulation of data structures
• Sematic: semantics of the data structures are changed
• Combined: mix of syntax and semantics manipulation
Fields of application
Rootkit detection
• Manipulation of memory access
• Interception of system calls
Cryptographic key extraction
• On the fly encrypted container
• Network forensics
IDS / IPS
Examples
Prototype
Solution approach
Combining existing tools for a novel approach
Open Source
Minimal overhead
Transparent for the user
Architecture
Cloud Solution
• Open Nebula
Cloud Management Server
Cloud Node
Host OS – Ubuntu
Guest VM
Memory Forensic Services
VMI Library – LibVMI
Forensic Tool – Volatility
Hypervisor - Xen
Cloud	Management	Server
Cloud	Node
VM1 VM2
Cloud	Control	Services
Dom	U Dom	0Dom	U
Hypervisor
Cloud	Management	Server
Cloud	Node
VM1 VM2
VMI	
Library
Forensic
Tool
Memory	
Forensic
Service
Cloud	Control	Services Memory	Forensic Service
Dom	U Dom	0Dom	U
Hypervisor
Open nebula extensions
www.opennebula.org
Memory forensic services
Self developed management and control services
Client – Server model
Platform independent
PKI for secure communication
Command whitelisting
Forensic Process
Collection Examination Analysis Reporting
Media Data Information Evidence
Forensic Process
Collection Examination Analysis Reporting
Media Data Information Evidence
• OS on Cloud Node
• Data provided by LibVMI
• Collected by Volatility
Forensic Process
Collection Examination Analysis Reporting
Media Data Information Evidence
• OS on Cloud Node
• Collected data checked by Volatility
• Data extraction for forensic purpose
Forensic Process
Collection Examination Analysis Reporting
Media Data Information Evidence
• Partially OS on Cloud Node
• Collected data checked by Volatility
• Partially on user system
• Analysis with additional tools by user
Forensic Process
Collection Examination Analysis Reporting
Media Data Information Evidence
• Completely on user system
Advantages
User gets easy access to the data
No changes on the target VM necessary
Memory analysis not on the possibly compromised system
No stop/pausing of the analyzed machine required
Operation of the VM does not get influenced
Analysis can be done either local or over the network
• Reduction of local load / network load
Usage of existing authentication and authorization system
Disadvantages
Configuration necessary
Knowledge about the guest OS required
Installation overhead for cloud provider
Additional attack surface
Security is crucial for the added services
User segregation is very important
LibVMI config example
Volatility / Libvmi usage
Use case
Modifying of data structures, which display the processes currently
running on the system
System call interception
Interrupt hooking
Modifying the kernel memory image
Intercepting calls handled by the VFS
Virtual memory subversion
Kernel level root kit detection
Use case
Enduser VM in Iaas cloud
Demo
Summary
Summary
Investigations in cloud environments get more and more common
Hypervisor forensics VMI is a very interesting solution approach
Fully Open Source based working prototype
Enables fast responses to security incidents
Lot of room for enhancements
Different use cases for VMI in clouds possible
Black hat sound bytes
Hypervisor forensics / VMI are very powerful and interesting
technologies
FaaS gives power to the end user
Memory analysis is a huge benefit for forensic investigations
Q & A
Please fill out the Black Hat Feedback Form
Contact
Tobias Zillner
tobias@zillner.tech
www.zillner.tech
+43 664 8829 8290

More Related Content

PDF
Is it an internal affair
PDF
CNIT 50: 9. NSM Operations
PPTX
Exploiting appliances presentation v1.1-vids-removed
PDF
UKC - Feb 2013 - Analyzing the security of Windows 7 and Linux for cloud comp...
PDF
How we breach small and medium enterprises (SMEs)
ODP
Cs seminar 20070426
PPT
The Good, the bad, and the ugly of Thin Client/Server Computing
PPTX
Zoura Subscribed 2013 LinkBermuda Metered Cloud Services
Is it an internal affair
CNIT 50: 9. NSM Operations
Exploiting appliances presentation v1.1-vids-removed
UKC - Feb 2013 - Analyzing the security of Windows 7 and Linux for cloud comp...
How we breach small and medium enterprises (SMEs)
Cs seminar 20070426
The Good, the bad, and the ugly of Thin Client/Server Computing
Zoura Subscribed 2013 LinkBermuda Metered Cloud Services

What's hot (20)

PPT
Firewall
PDF
Intrusion detection
PDF
CNIT 121: 3 Pre-Incident Preparation
PPTX
Web application security part 01
PDF
CNIT 121: 8 Forensic Duplication
PPT
Information Security Lesson 13 - Advanced Security - Eric Vanderburg
PPTX
Dealing with legacy code
PDF
CNIT 152: 6 Scoping & 7 Live Data Collection
PDF
CNIT 121: 6 Discovering the Scope of the Incident & 7 Live Data Collection
PDF
CNIT 121: 2 IR Management Handbook
PDF
CNIT 125 7. Security Assessment and Testing
PDF
CNIT 121: 4 Getting the Investigation Started on the Right Foot & 5 Initial D...
PDF
CNIT 121: 17 Remediation Introduction (Part 1)
PPTX
Latest presentation
PPTX
Virtual Machine Introspection - Future of the Cloud
PPTX
POTASSIUM: Penetration Testing as a Service
PDF
CISSP Prep: Ch 7. Security Assessment and Testing
PDF
7. Security Operations
PDF
CNIT 121: 9 Network Evidence
PPTX
Thick client pentesting_the-hackers_meetup_version1.0pptx
Firewall
Intrusion detection
CNIT 121: 3 Pre-Incident Preparation
Web application security part 01
CNIT 121: 8 Forensic Duplication
Information Security Lesson 13 - Advanced Security - Eric Vanderburg
Dealing with legacy code
CNIT 152: 6 Scoping & 7 Live Data Collection
CNIT 121: 6 Discovering the Scope of the Incident & 7 Live Data Collection
CNIT 121: 2 IR Management Handbook
CNIT 125 7. Security Assessment and Testing
CNIT 121: 4 Getting the Investigation Started on the Right Foot & 5 Initial D...
CNIT 121: 17 Remediation Introduction (Part 1)
Latest presentation
Virtual Machine Introspection - Future of the Cloud
POTASSIUM: Penetration Testing as a Service
CISSP Prep: Ch 7. Security Assessment and Testing
7. Security Operations
CNIT 121: 9 Network Evidence
Thick client pentesting_the-hackers_meetup_version1.0pptx
Ad

Viewers also liked (20)

PDF
11.cyber forensics in cloud computing
PDF
Cloud Application Logging for Forensics
PDF
Cloud Forensics- An IS Approach
PDF
Booting an image as a forensically sound vm in virtual box
PPTX
Adding event reconstruction to a cloud forensic readiness
PDF
Cloud Computing Forensic Science
PDF
SAS Cloud Computing and MapReduce
PDF
Big Data Analysis and Business Intelligence
PPT
Open / Free Cloud platforms and Open Hardware Systems
PDF
Virtualization & Cloud Computing Presentation
PPTX
Lupus érythémateux disséminé1
PDF
Cloud Breach - Forensics Audit Planning
PPT
Cloud Monitoring And Forensic Using Security Metrics
PDF
Red hat cloud platforms
PDF
6 STEPS TO CREATE A SUCCESSFUL BUSINESS INTELLIGENCE STRATEGY
PPSX
Cloud Forensics
PPTX
CS298_presentation
PDF
Transforming Application Delivery with PaaS and Linux Containers
PDF
(130928) #fitalk cloud storage forensics - dropbox
PDF
Cloud Computing Security (Final Year Project) by Pavlos Stefanis
11.cyber forensics in cloud computing
Cloud Application Logging for Forensics
Cloud Forensics- An IS Approach
Booting an image as a forensically sound vm in virtual box
Adding event reconstruction to a cloud forensic readiness
Cloud Computing Forensic Science
SAS Cloud Computing and MapReduce
Big Data Analysis and Business Intelligence
Open / Free Cloud platforms and Open Hardware Systems
Virtualization & Cloud Computing Presentation
Lupus érythémateux disséminé1
Cloud Breach - Forensics Audit Planning
Cloud Monitoring And Forensic Using Security Metrics
Red hat cloud platforms
6 STEPS TO CREATE A SUCCESSFUL BUSINESS INTELLIGENCE STRATEGY
Cloud Forensics
CS298_presentation
Transforming Application Delivery with PaaS and Linux Containers
(130928) #fitalk cloud storage forensics - dropbox
Cloud Computing Security (Final Year Project) by Pavlos Stefanis
Ad

Similar to Memory forensics using VMI for cloud computing (20)

PDF
31c3 Presentation - Virtual Machine Introspection
PPTX
VMI based malware detection in virtual environment
PDF
IRJET - Analysis of Virtual Machine in Digital Forensics
PPTX
Malware Analysis and Defeating using Virtual Machines
PPTX
Bridging the Semantic Gap in Virtualized Environment
PPT
На страже ваших денег и данных
PDF
2010 2013 sandro suffert memory forensics introdutory work shop - public
PDF
One-Byte Modification for Breaking Memory Forensic Analysis
PDF
Malware Collection and Analysis via Hardware Virtualization
ODP
Hacktivity2014: Virtual Machine Introspection to Detect and Protect
PPTX
Virtual Machine Forensics
PDF
Cloud Security with LibVMI
PPTX
10 Cloud Security.pptx
PDF
XPDS14 - Zero-Footprint Guest Memory Introspection from Xen - Mihai Dontu, Bi...
PDF
Práctica de informática forense taller práctico
PPTX
Memory forensics
PDF
(120513) #fitalk an introduction to linux memory forensics
PDF
(120513) #fitalk an introduction to linux memory forensics
PDF
thesis
PPT
Linux Forensics
31c3 Presentation - Virtual Machine Introspection
VMI based malware detection in virtual environment
IRJET - Analysis of Virtual Machine in Digital Forensics
Malware Analysis and Defeating using Virtual Machines
Bridging the Semantic Gap in Virtualized Environment
На страже ваших денег и данных
2010 2013 sandro suffert memory forensics introdutory work shop - public
One-Byte Modification for Breaking Memory Forensic Analysis
Malware Collection and Analysis via Hardware Virtualization
Hacktivity2014: Virtual Machine Introspection to Detect and Protect
Virtual Machine Forensics
Cloud Security with LibVMI
10 Cloud Security.pptx
XPDS14 - Zero-Footprint Guest Memory Introspection from Xen - Mihai Dontu, Bi...
Práctica de informática forense taller práctico
Memory forensics
(120513) #fitalk an introduction to linux memory forensics
(120513) #fitalk an introduction to linux memory forensics
thesis
Linux Forensics

More from Priyanka Aash (20)

PPTX
AI Code Generation Risks (Ramkumar Dilli, CIO, Myridius)
PDF
From Chatbot to Destroyer of Endpoints - Can ChatGPT Automate EDR Bypasses (1...
PDF
Cracking the Code - Unveiling Synergies Between Open Source Security and AI.pdf
PDF
Oh, the Possibilities - Balancing Innovation and Risk with Generative AI.pdf
PDF
Lessons Learned from Developing Secure AI Workflows.pdf
PDF
Cyber Defense Matrix Workshop - RSA Conference
PDF
A Constitutional Quagmire - Ethical Minefields of AI, Cyber, and Privacy.pdf
PDF
Securing AI - There Is No Try, Only Do!.pdf
PDF
GenAI Opportunities and Challenges - Where 370 Enterprises Are Focusing Now.pdf
PDF
Coordinated Disclosure for ML - What's Different and What's the Same.pdf
PDF
10 Key Challenges for AI within the EU Data Protection Framework.pdf
PDF
Techniques for Automatic Device Identification and Network Assignment.pdf
PDF
Keynote : Presentation on SASE Technology
PDF
Keynote : AI & Future Of Offensive Security
PDF
Redefining Cybersecurity with AI Capabilities
PDF
Demystifying Neural Networks And Building Cybersecurity Applications
PDF
Finetuning GenAI For Hacking and Defending
PDF
(CISOPlatform Summit & SACON 2024) Kids Cyber Security .pdf
PDF
(CISOPlatform Summit & SACON 2024) Regulation & Response In Banks.pdf
PDF
(CISOPlatform Summit & SACON 2024) Cyber Insurance & Risk Quantification.pdf
AI Code Generation Risks (Ramkumar Dilli, CIO, Myridius)
From Chatbot to Destroyer of Endpoints - Can ChatGPT Automate EDR Bypasses (1...
Cracking the Code - Unveiling Synergies Between Open Source Security and AI.pdf
Oh, the Possibilities - Balancing Innovation and Risk with Generative AI.pdf
Lessons Learned from Developing Secure AI Workflows.pdf
Cyber Defense Matrix Workshop - RSA Conference
A Constitutional Quagmire - Ethical Minefields of AI, Cyber, and Privacy.pdf
Securing AI - There Is No Try, Only Do!.pdf
GenAI Opportunities and Challenges - Where 370 Enterprises Are Focusing Now.pdf
Coordinated Disclosure for ML - What's Different and What's the Same.pdf
10 Key Challenges for AI within the EU Data Protection Framework.pdf
Techniques for Automatic Device Identification and Network Assignment.pdf
Keynote : Presentation on SASE Technology
Keynote : AI & Future Of Offensive Security
Redefining Cybersecurity with AI Capabilities
Demystifying Neural Networks And Building Cybersecurity Applications
Finetuning GenAI For Hacking and Defending
(CISOPlatform Summit & SACON 2024) Kids Cyber Security .pdf
(CISOPlatform Summit & SACON 2024) Regulation & Response In Banks.pdf
(CISOPlatform Summit & SACON 2024) Cyber Insurance & Risk Quantification.pdf

Recently uploaded (20)

PDF
Approach and Philosophy of On baking technology
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPTX
Spectroscopy.pptx food analysis technology
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
A comparative analysis of optical character recognition models for extracting...
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PPTX
Big Data Technologies - Introduction.pptx
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPTX
sap open course for s4hana steps from ECC to s4
PDF
Encapsulation theory and applications.pdf
PPTX
Machine Learning_overview_presentation.pptx
Approach and Philosophy of On baking technology
Building Integrated photovoltaic BIPV_UPV.pdf
Per capita expenditure prediction using model stacking based on satellite ima...
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Spectroscopy.pptx food analysis technology
Chapter 3 Spatial Domain Image Processing.pdf
Advanced methodologies resolving dimensionality complications for autism neur...
A comparative analysis of optical character recognition models for extracting...
Dropbox Q2 2025 Financial Results & Investor Presentation
gpt5_lecture_notes_comprehensive_20250812015547.pdf
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Assigned Numbers - 2025 - Bluetooth® Document
Big Data Technologies - Introduction.pptx
Network Security Unit 5.pdf for BCA BBA.
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Mobile App Security Testing_ A Comprehensive Guide.pdf
sap open course for s4hana steps from ECC to s4
Encapsulation theory and applications.pdf
Machine Learning_overview_presentation.pptx

Memory forensics using VMI for cloud computing