Live forensics of software attacks on cyber-physical systems

被引:29
作者
Al-Sharif, Ziad A. [1 ]
Al-Saleh, Mohammed, I [2 ]
Alawneh, Luay M. [1 ]
Jararweh, Yaser, I [2 ]
Gupta, Brij [3 ]
机构
[1] Jordan Univ Sci & Technol, Software Engn Dept, Irbid 22110, Jordan
[2] Jordan Univ Sci & Technol, Comp Sci Dept, Irbid 22110, Jordan
[3] Natl Inst Technol, Kurukshetra, Haryana, India
来源
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE | 2020年 / 108卷
关键词
Digital forensics; Memory forensics; Program's execution behavior; Execution state; Execution path; Digital evidence; Evidence collection process; SECURITY; CHALLENGES; ARCHITECTURE; NETWORKS; SCIENCE;
D O I
10.1016/j.future.2018.07.028
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Increasingly, Cyber-physical Systems are expected to operate in different environments and interconnect with a diverse set of systems, equipment, and networks. This openness to heterogeneity, diversity, and complexity introduces a new level of vulnerabilities, which adds to the consistent need for security including the digital forensics capabilities. Digital investigators utilize the information on the attacker's computer to find clues that may help in proving a case. One aspect is the digital evidence that can be extracted from the main memory (RAM), which includes live information about running programs. A program's states, represented by variables' values, vary in their scope and duration. This paper explores RAM artifacts of Java programs. Because JVMs can run on various platforms, we compare the same program on three different implementations of JVM from forensic perspectives. Our investigation model assumes no information is provided by the underlying OS or JVM. Our results show that a program's states can still be extracted even after the garbage collector is explicitly invoked, the software is stopped, or the JVM is terminated. This research helps investigators identify the software used to launch the attack and understand its internal flows. Investigators can utilize this information to accuse the perpetrators and recover from attacks. (C) 2018 Elsevier B.V. All rights reserved.
引用
收藏
页码:1217 / 1229
页数:13
相关论文
共 71 条
[1]   Forensic-by-Design Framework for Cyber-Physical Cloud Systems [J].
Ab Rahman, Nurul Hidayah ;
Glisson, William Bradley ;
Yang, Yanjiang ;
Choo, Kim-Kwang Raymond .
IEEE CLOUD COMPUTING, 2016, 3 (01) :50-59
[2]   Smart cyber society: Integration of capillary devices with high usability based on Cyber-Physical System [J].
Ahmad, Awais ;
Paul, Anand ;
Rathore, M. Mazhar ;
Chang, Hangbae .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2016, 56 :493-503
[3]  
Al-Saleh M., 2013, 2 INT C CYB SEC CYB, P189
[4]   Investigating the detection capabilities of antiviruses under concurrent attacks [J].
Al-Saleh, Mohammed I. ;
AbuHjeela, Fatima M. ;
Al-Sharif, Ziad A. .
INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2015, 14 (04) :387-396
[5]   Utilizing data lifetime of TCP buffers in digital forensics: Empirical study [J].
Al-Saleh, Mohammed I. ;
Al-Sharif, Ziad A. .
DIGITAL INVESTIGATION, 2012, 9 (02) :119-124
[6]  
Al-Sharif Z., 2016, P 3 INT C DIG SEC FO, P12
[7]  
Al-Sharif Z.A., 2015, INT TECHNOLOGY MANAG, P24
[8]  
Al-Sharif Z. A., 2018, INFORM TECHNOLOGY NE, P179, DOI [10.1007/978-3-319-54978-1, DOI 10.1007/978-3-319-54978-1]
[9]  
Ammann Paul, 2016, Introduction to Software Testing, V2nd, DOI 10.1017/9781316771273
[10]   Achieving Sustainable Ultra-Dense Heterogeneous Networks for 5G [J].
An, Jianping ;
Yang, Kai ;
Wu, Jinsong ;
Ye, Neng ;
Guo, Song ;
Liao, Zhifang .
IEEE COMMUNICATIONS MAGAZINE, 2017, 55 (12) :84-90