학술논문

Trail of Bytes: New Techniques for Supporting Data Provenance and Limiting Privacy Breaches
Document Type
Periodical
Source
IEEE Transactions on Information Forensics and Security IEEE Trans.Inform.Forensic Secur. Information Forensics and Security, IEEE Transactions on. 7(6):1876-1889 Dec, 2012
Subject
Signal Processing and Analysis
Computing and Processing
Communication, Networking and Broadcast Technologies
Monitoring
Virtual machine monitors
Semantics
Forensics
Virtual machining
Couplings
Computer security
information security
intrusion detection
system recovery
checkpointing
virtual machine monitors
operating systems
Language
ISSN
1556-6013
1556-6021
Abstract
Forensic analysis of computer systems requires that one first identify suspicious objects or events, and then examine them in enough detail to form a hypothesis as to their cause and effect. Sadly, while our ability to gather vast amounts of data has improved significantly over the past two decades, it is all too often the case that we lack detailed information just when we need it the most. In this paper, we attempt to improve on the state of the art by providing a forensic platform that transparently monitors and records data access events within a virtualized environment using only the abstractions exposed by the hypervisor. Our approach monitors accesses to objects on disk and follows the causal chain of these accesses across processes, even after the objects are copied into memory. Our forensic layer records these transactions in a tamper evident version-based audit log that allows for faithful, and efficient, reconstruction of the recorded events and the changes they induced. To demonstrate the utility of our approach, we provide an extensive empirical evaluation, including a real-world case study demonstrating how our platform can be used to reconstruct valuable information about the what, when, and how, after a compromise has been detected. We also extend our earlier work by providing a tracking mechanism that can monitor data exfiltration attempts across multiple disks and also block attempts to copy data over the network.