Skip to content

Membrane: A Posteriori Detection of Malicious Code Loading by Memory Paging Analysis

Notifications You must be signed in to change notification settings

CrySyS/membrane

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

9 Commits
 
 
 
 
 
 
 
 

Repository files navigation

Membrane: A Posteriori Detection of Malicious Code Loading by Memory Paging Analysis

Membrane is a memory forensics tool to detect code loading behavior by stealthy malware. Instead of trying to detect the code loading itself, we focus on the changes it causes on the memory paging of the Windows operating system. As our method focuses on the anomalies caused by code loading, we are able to detect a wide range of code loading techniques. Our results indicate that we can detect code loading malware behavior with 86-98% success in most cases, including advanced targeted attacks. Our method is generic enough and hence could significantly raise the bar for attackers to remain stealthy and persist for an extended period of time.

Corresponding article:

G. Pék, Zs. Lázár, Z. Várnagy, M. Félegyházi, L. Buttyán, Membrane: A Posteriori Detection of Malicious Code Loading by Memory Paging Analysis (Accepted paper), ESORICS, 2016.

Source

This repository contains the memory traversal part of the Membrane source code. Please find the traditional Volatility extension in the membrane directory. As snapshot creation can be a heavy-duty operation, we further designed and implemented a live monitoring version of Membrane called Membrane Live by extending a virtual machine introspection-based malware analysis tool called DRAKVUF.

About

Membrane: A Posteriori Detection of Malicious Code Loading by Memory Paging Analysis

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages