Inception: Virtual Space in Memory Space in Real Space - Memory Forensics of Immersive Virtual Reality with the HTC Vive

被引:17
作者
Casey, Peter [1 ]
Lindsay-Decusati, Rebecca [1 ]
Baggili, Ibrahim [1 ]
Breitinger, Frank [1 ]
机构
[1] Univ New Haven, 300 Boston Post Rd, West Haven, CT 06516 USA
基金
美国国家科学基金会;
关键词
Memory forensics; Data recovery; Virtual reality; Reverse engineering; VOLATILE MEMORY; ACQUISITION; EXTRACTION;
D O I
10.1016/j.diin.2019.04.007
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Virtual Reality (VR) has become a reality. With the technology's increased use cases, comes its misuse. Malware affecting the Virtual Environment (VE) may prevent an investigator from ascertaining virtual information from a physical scene, or from traditional "dead" analysis. Following the trend of anti-forensics, evidence of an attack may only be found in memory, along with many other volatile data points. Our work provides the primary account for the memory forensics of Immersive VR systems, and in specific the HTC Vive. Our approach is capable of reconstituting artifacts from memory that are relevant to the VE, and is also capable of reconstructing a visualization of the room setup a VR player was immersed into. In specific, we demonstrate that the VE, location, state and class of VR devices can be extracted from memory. Our work resulted in the first open source VR memory forensics plugin for the Volatility Framework. We discuss our findings, and our replicable approach that may be used in future memory forensics research. (C) 2019 The Author(s). Published by Elsevier Ltd on behalf of DFRWS.
引用
收藏
页码:S13 / S21
页数:9
相关论文
共 27 条
[1]  
Alvarex V. M., 2018, YARA
[2]   Forensic analysis of Telegram Messenger on Android smartphones [J].
Anglano, Cosimo ;
Canonico, Massimo ;
Guazzone, Marco .
DIGITAL INVESTIGATION, 2017, 23 :31-49
[3]  
Bailey D, 2018, 4 3 BILLION SALES 20
[4]  
Balogh S., 2014, J CYBER SECURITY, V3, P65, DOI DOI 10.13052/JCSM2245-1439.314
[5]  
BETZ C, 2005, MEMPARSER ANAL TOOL
[6]  
Bilby D., 2006, Low Down and Dirty: Anti-Forensic Rootkits
[7]   Memory forensics: The path forward [J].
Case, Andrew ;
Richard, Golden G., III .
DIGITAL INVESTIGATION, 2017, 20 :23-33
[8]   Immersive Virtual Reality Attacks and the Human Joystick [J].
Casey, Peter ;
Baggili, Ibrahim ;
Yarramreddy, Ananya .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (02) :550-562
[9]   Scanning memory with Yara [J].
Cohen, Michael .
DIGITAL INVESTIGATION, 2017, 20 :34-43
[10]  
de Guzman J. A., 2018, CORR