Katana: Robust, Automated, Binary-Only Forensic Analysis of Linux Memory Snapshots

Fabian Franzen, Tobias Holl, Manuel Andreas, Julian Kirsch, Jens Grossklags

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

3 Scopus citations

Abstract

The development and research of tools for forensically analyzing Linux memory snapshots have stalled in recent years as they cannot deal with the high degree of configurability and fail to handle security advances like structure layout randomization. Existing tools such as Volatility and Rekall require a pre-generated profile of the operating system, which is not always available, and can be invalidated by the smallest source code or configuration changes in the kernel. In this paper, we create a reference model of the control and data flow of selected representative Linux kernels. Using this model, ABI properties, and Linux's own runtime information, we apply a configuration-and instruction-set-agnostic structural matching between the reference model and the loaded kernel to obtain enough information to drive all practically relevant forensic analyses. We implemented our approach in Katana 1, and evaluated it against Volatility. Katana is superior where no perfect profile information is available. Furthermore, we show correct functionality on an extensive set of 85 kernels with different configurations and 45 realistic snapshots taken while executing popular Linux distributions or recent versions of Android from version 8.1 to 11. Our approach translates to other CPU architectures in the Internet-of-Things (IoT) device domain such as MIPS and ARM64 as we show by analyzing a TP-Link router and a smart camera. We also successfully generalize to modified Linux kernels such as Android.

Original languageEnglish
Title of host publicationProceedings of 25th International Symposium on Researchin Attacks, Intrusions and Defenses, RAID 2022
PublisherAssociation for Computing Machinery
Pages214-231
Number of pages18
ISBN (Electronic)9781450397049
DOIs
StatePublished - 26 Oct 2022
Event25th International Symposium on Researchin Attacks, Intrusions and Defenses, RAID 2022 - Limassol, Cyprus
Duration: 26 Oct 202228 Oct 2022

Publication series

NameACM International Conference Proceeding Series

Conference

Conference25th International Symposium on Researchin Attacks, Intrusions and Defenses, RAID 2022
Country/TerritoryCyprus
CityLimassol
Period26/10/2228/10/22

Keywords

  • automated profile generation
  • binary analysis
  • memory forensics

Fingerprint

Dive into the research topics of 'Katana: Robust, Automated, Binary-Only Forensic Analysis of Linux Memory Snapshots'. Together they form a unique fingerprint.

Cite this