Skip to main content

Windows Physical Memory Analysis to Detect the Presence of Malicious Code

  • Conference paper
  • First Online:
Recent Findings in Intelligent Computing Techniques

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 707))

  • 879 Accesses

Abstract

The Windows Physical memory maintains information about the various activities on the system such as processes and their running threads, opened registry key, user authentication details with forensic importance. The cyber attacker modifies the code of the legitimate process to achieve malicious tasks and such malicious codes are not detected by the antivirus program. In order to detect the presence of malicious codes in the legitimate process, this paper suggests a framework. This framework is based on the memory mapped information of a process and its creation time. The techniques discussed in this paper have been verified on the Windows 7 and 8 volatile memory dump.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Soulami, T.: Inside Windows Debugging. Microsoft (2000)

    Google Scholar 

  2. Thomas, S., Sherly, K.K., Dija, S.: Extraction of memory forensic artifacts from Windows 7 RAM image. In: Proceedings of the IEEE Conference on Information and Communication Technologies (2013)

    Google Scholar 

  3. Hausknecht, K., Foit, D., Buric, J.: RAM Data Significance in Digital Forensics. MIPRO, Opatija, Croatia (2015)

    Book  Google Scholar 

  4. Zhang, S., Wang, L., Zhang, R.: Exploratory study on memory analysis of Windows 7 operating system. In: 3rd International Conference on Advanced Computer Theory and Engineering (2010)

    Google Scholar 

  5. Zhang, R., Wang, L., Zhang, S.: Windows memory analysis based on KPCR. In: 5th International Conference on Information Assurance and Security (2009)

    Google Scholar 

  6. Zhang, S., Wang, L., Zhang, L.: Extracting Windows Registry Information from Physical Memory (2011)

    Google Scholar 

  7. White, A., Schatz, B., Foo, E.: Surveying the user space through user allocations. Digit. Investig. S3–S12 (2012)

    Article  Google Scholar 

  8. Cohen, M.: Forensic analysis of windows user space applications through heap allocation. In: 3rd IEEE International Workshop on Security and Forensics in Communication Systems (2015)

    Google Scholar 

  9. Van Baar, R., Alink, W., VanBallegoojj, A.R.: Forensic memory analysis: file mapped in memory. Digit. Investig. S52–S57 (2008)

    Google Scholar 

  10. Dolan-Gavitt, B.: The VAD tree: the process-eye view of physical memory. Digit. Investig. S62–S64 (2007)

    Google Scholar 

  11. Idika, N., Mathu, A.P.: A Survey of Malware Detection Techniques (2007)

    Google Scholar 

  12. Russinovich, M., Solomon, D., Lonescu, A.: Windows Internals, Part 2, p. 195, 6th edn. Microsoft Press (2009)

    Google Scholar 

  13. Microsoft: Microsoft Portable Executable and Common Object File Format Specification. http://courses.cs.washington.edu/courses/cse378/03wi/lectures/LinkerFiles/coff.pdf (2016)

  14. Pot, J.: Windows 10 leaps ahead of 7 amongst steam gamers. http://www.digitaltrends.com/computing/steam-users-windows-10-market-share (2016)

  15. Ahmed, W., Aslam, B.: A Comparison of Windows Physical Memory Acquisition Tools, Milcom Cyber Security and Trusted Computing (2015)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Dinesh N. Patil .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Patil, D.N., Meshram, B.B. (2019). Windows Physical Memory Analysis to Detect the Presence of Malicious Code. In: Sa, P., Bakshi, S., Hatzilygeroudis, I., Sahoo, M. (eds) Recent Findings in Intelligent Computing Techniques . Advances in Intelligent Systems and Computing, vol 707. Springer, Singapore. https://doi.org/10.1007/978-981-10-8639-7_1

Download citation

Publish with us

Policies and ethics