Suppr超能文献

基于内存逆向分析的腾讯会议取证

Tencent Meeting forensics based on memory reverse analysis.

作者信息

Yu Shilong, Li Binglong, Zhu Lin, Zhang Heyu, Yang Sen, Li Zhangxiao, Feng Wenzheng

机构信息

School of Cryptographic Engineering, Information Engineering University, Zhengzhou, China.

School of Cyber Science and Engineering, Huazhong University of Science and Technology, Wuhan, China.

出版信息

PeerJ Comput Sci. 2025 Jun 17;11:e2963. doi: 10.7717/peerj-cs.2963. eCollection 2025.

Abstract

Tencent Meeting, an instant meeting software, is widely used at present, but no research has been conducted on its forensics. Since the real-time data generated by such software during meetings will not be stored in the computer disk, the traditional disk forensics method against such software is no longer applicable and needs to obtain evidence through memory analysis. To extract meeting data transmitted during meetings, this article proposes a method for Tencent Meeting forensics based on memory reverse analysis. First, by analyzing the process storage and metadata format of Tencent Meeting in memory, an inverse metadata extraction algorithm is designed. Then, by analyzing the data structure of Tencent Meeting in memory, a meeting data stream engraving algorithm is developed. Finally, the experimental results indicate that the proposed method can effectively extract metadata information such as meeting time, meeting number, topic, and data flow information such as participants, message records, as well as transmitted files from the memory of Tencent Meeting, providing crucial digital evidence for digital crime investigation. Compared with other forensic analysis methods for instant meeting software, our proposed forensic method for Tencent Meeting conducts memory reverse analysis with the entire memory file, enabling the extraction of more comprehensive and abundant forensic data.

摘要

腾讯会议是一款当下被广泛使用的即时会议软件,但目前尚未有针对其取证的研究。由于此类软件在会议期间产生的实时数据不会存储在计算机磁盘中,传统的针对此类软件的磁盘取证方法不再适用,需要通过内存分析来获取证据。为了提取会议期间传输的会议数据,本文提出了一种基于内存逆向分析的腾讯会议取证方法。首先,通过分析腾讯会议在内存中的进程存储和元数据格式,设计了一种逆向元数据提取算法。然后,通过分析腾讯会议在内存中的数据结构,开发了一种会议数据流刻写算法。最后,实验结果表明,该方法能够有效地从腾讯会议的内存中提取会议时间、会议编号、主题等元数据信息,以及参与者、消息记录等数据流信息和传输的文件,为数字犯罪调查提供关键的数字证据。与其他即时会议软件的取证分析方法相比,我们提出的腾讯会议取证方法对整个内存文件进行内存逆向分析,能够提取更全面、丰富的取证数据。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/b58f/12193465/7448b2d08303/peerj-cs-11-2963-g001.jpg

文献AI研究员

20分钟写一篇综述,助力文献阅读效率提升50倍。

立即体验

用中文搜PubMed

大模型驱动的PubMed中文搜索引擎

马上搜索

文档翻译

学术文献翻译模型,支持多种主流文档格式。

立即体验