Finding Malware
Finding malware → malware often runs in system memory rather than on disk, so memory forensics analyzes active processes, dynamic link libraries, threads, buffers, and other in-memory artifacts to detect malicious code that may evade traditional file-based scans.
Memory Injection Attacks
Memory injection attacks → attacks where malicious code is inserted directly into the memory of a running process, allowing the attacker to execute code without writing files to disk and making detection more difficult.
DLL Injection
Dynamic link library injection (DLL injection) → memory injection technique where an attacker forces a running process to load a malicious dynamic link library, causing the malicious code to execute within the context of a trusted process.
Buffer Overflow Attack
Buffer overflow attack → attack that occurs when a program writes more data to a memory buffer than it can handle, causing excess data to overwrite adjacent memory and potentially allowing attackers to execute arbitrary code or crash the system.
Bounds Checking
Bounds checking → security practice that ensures data written to memory stays within allocated limits, preventing buffer overflow attacks by rejecting or safely handling oversized input.
Race Condition
Race condition → vulnerability that occurs when the outcome of a process depends on the timing or order of events, allowing attackers to manipulate execution flow by triggering actions at precisely the right moment.
TOCTOU
Time-of-check to time-of-use (TOCTOU) → race condition where a system checks a resource’s state and then uses it later, allowing attackers to change the resource between the check and the use.
Malicious Updates
Malicious updates → attack technique where attackers distribute compromised software updates, emphasizing the need to verify update sources, download directly from developers, and treat every installation as potentially malicious.
Automatic Updates
Automatic updates → update mechanism that installs patches without user intervention, improving security by reducing exposure time but still requiring trusted sources and integrity verification.