Virtual Machines
Virtual Machines
C. VirtualBox
Oracle VirtualBox is an open source type 2 hypervisor for
virtualization of window and Linux operating systems from
Oracle Corporation. Creation and management of guest virtual
machines is very much user friendly. Intel VT-x and AMD-
Fig. 3. Windows SandBox Architecture.
V hardware-assisted virtualization is supported on VirtualBox.
It supports nested virtualization that is one of the challenges
for digital forensics experts [7]. Nested virtual machines runs
is illustrated in Fig. 3. To use windows sandbox you must on hypervisor which is on top of other virtual machine, this
start the sandbox first and copy the executable file you wish stacking of hypervisor recursively increases overhead but at the
to run from the host file system and paste the executable same time provides extra layer of security and decouples the
file in sandbox. Once the file copied, you can run it as a VM from physical host [12]. Eventually it comes with extra
normal application. Windows Sandbox gives two options; one overhead for digital forensic investigation.
is to run a full desktop in sandbox. Second option is just
the application in sandbox and as known as rails. Sandbox D. Shade Sandboxie
has many advantages over tradition virtual machines creates
Shade Sandboxie is an application based sandboxing. It
a virtual machine and installs complete operating systems
creates isolated environment to execute suspicious code. Such
where resources are shared among host operating system and
an environment is used to track and notice code behavior and
virtual machines. In case of windows, only few files used for
output activity, it creates functional layer of network security
sandbox from host file system it is dynamically generated
against ATPs and other cyber threats. Applications run inside
image. Memory management is dynamic based on payload
simulated virtual environment without hardware virtualization
system allocates memory to the sandbox. Process scheduling
support. Running malicious code and browsing websites with
is integrated where sandbox and host systems are managed
potential threats will not affect the host Operating System [13].
together . Windows sandbox is secure as it runs on a separate
kernel that provided by Microsoft’s hypervisor keeping it
isolated from the host kernel. Virtualization in case of sandbox E. QEMU (Quick Emulator)
is hardware-based illustrated in Fig. 1. Thus to implement type- QEMU is the hosted virtual machine monitor it operates
1 hypervisor host system must support virtualization, which in different modes. System emulation mode where it em-
can be enabled or disabled from BIOS of the host system. ulates hardware including processor, peripheral devices. In
Any malicious code will not affect the host kernel and will user mode, it runs programs using different instruction set
not persist as soon as sandbox is closed. WSB can be accessed rather than its instruction set by cross-compilation and cross
remotely from server where Sandbox is created in two modes debugging. KVM hosting mode, QEMU emulates hardware
1.WSB with full desktop 2.WSB Rails in Rails a specific but guest operating system runs on KVM. XEN hosting mode,
application is launched on sandbox it is similar as Application here also QEMU emulates hardware and XEN run the guest
VM. Remote clients can access and launch the WSB from operating systems [14].
server, once it is closed no files or changes are saved in host
server[10].
F. BitBox
B. Qubes Disposable VM BitBox is secure firefox encased in virtual machine with
linux OS on oracle virual box. Only drawback of this is
Qubes OS developed with focus on Security through iso- the setup, which takes 2GB of disk space. Developed by
lation approach. Virtualization is based on Xen hypervisor. German cyber Security Company Rohde and Schwarz to
Domains created with different security levels, which runs on prevent cyber-attacks such as APTs, Zero-day exploits and
virtual machine. Work domain is more secure than Shopping Ransomwares[15].
domain. Dom0 is the administrative domain it can access all
the hardware directly, such as graphics devices, input output IV. C HALLENGES P OSED BY D ISPOSABLE V IRTUAL
devices like keyboard and mouse. This administrative domain M ACHINES IN D IGITAL F ORENSICS
manages the virtual disks of the other VMs, it stores these
virtual disk images on its file system. Disk space saved by That, in essence, attackers can start a disposable VM to
storing virtual disk on same file systems and accessed in carry out their act and close the disposable VM, which leaves
read only mode. Qubes allows users to launch disposable VM no traces for forensics expert. Existing Virtual machine foren-
directly from dom0’s start menu or from an AppVM you have sic techniques are not going to yield significant results. The
to choose open with disposable VM. In disposable VM you disposable virtual machines not designed with digital forensics
www.ijacsa.thesai.org 794 | P a g e
(IJACSA) International Journal of Advanced Computer Science and Applications,
Vol. 12, No. 2, 2021
and evidence integrity in mind, instead the objective was to TABLE II. D ISPOSABLE VM C HALLENGES .
completely isolate applications from host operating system
and leave a pristine system without leaving any traces behind. Investigation Stage Challenge
Image creation No persistent files of disposable VM exist on disk
However, not any significant work has been done in disposable drive
virtual machine forensic. We could not find any substantial Information identification Host OS or the Hypervisor do not maintain activity
information about disposable virtual machine or lightweight logs of disposable VM
Analysis Snapshots or .vdi files are not available
VM forensics. Forensic investigation begins with identifying Presentation No specific format of reporting is available
the system, which contains potential evidence or involved in
suspicious activity. First step is to identify the incident and
next is to acquire evidence to prove the incident. When it existence in host computer. Even after files are deleted most
comes to disposable virtual machines, no traces are left. The of the time operating system do not completely delete the
very nature of disposable virtual machines architecture is the files instead removes the file reference from master file table.
main challenge in data identification and subsequent collection Specifically for large size, files such as virtual machine files
of evidence. Mostly no artifacts left after closing disposable still exist in the disk. Each of these files can be extracted from
virtual machines. Possible solution could be capturing the the unallocated space of the secondary disk. Data recovery
sandbox or the disposable virtual machine instances while they tools like best disc, handy recovery and R-studio etc. com-
are active other possible solution is to perform data carving monly used to recover data from the disk image.
from memory dumps log files of hypervisor. In presence
of hypervisor, it is difficult to take, the memory dump of C. Analysis
the physical memory it is difficult to extract the data from
Virtual machine analysis: regular virtual machines can be
memory reserved fur virtual machine monitors. One possible
Analyzed by mounting it as disk drive or by accessing it
way to use memory acquisition tools like volatility, Rekall and
through a hypervisor. In case of disposable virtual machines,
Layout Expert [16].It might be able to analyze virtual machine
it is not possible; files related to disposable VM are deleted.
processes running on the machine even after capturing memory
Virtual machine files could be recovered by identifying its
dumps it is difficult to analyze the memory dump for virtual
format based on hypervisor. Files with extensions like .VDI,
machine data. Here we use the standard forensic investigation
.VMDK is used by popular hypervisors [20]. Other options to
steps to discuss the challenges posed by disposable VMs at
investigate the virtual machine is by picking a snapshot of VM
each stage. Stage of forensic investigation are as follows:
and further analyzing snapshot to extract the vital information
1. Forensic Image creation 2. Identification and Recovery 3.
that can be presented as evidence. This provision of snapshot
Analysis 4. Presentation and Documentation[17].
is not available for disposable virtual machines. Only option
left for disposable VM is to analyze host operating system log
A. Forensic Image Creation files, registry entries, etc.
Disk image of suspected system is created from physical
D. Presentation and Documentation
machine. At this stage, integrity of the image created must be
preserved. This is performed using tools like DD, DDRescue, Documenting and presenting the evidence found during in-
Encase and Photorec etc.[18][19]. Investigator never uses the vestigation is the final stage of forensic investigation. Evidence
original disk to conduct investigation; instead, image of the includes time stamps, who accessed and when accessed data
disk used to conduct analysis and further investigation. This or performed an activity. Forensics tools have their proprietary
image used to collect the information about virtual machine format of reports. There are no specific forensic tools for
and hypervisor used. Information included execution time disposable VM forensics, so there exists no specific reporting
logs, temporary files, snapshots and Internet activity log files formats for disposable VM. It is preferable to use the same
etc. Therefore, investigator must collect the image carefully reports as virtual machine. In Table II we have presented the
without tampering its integrity to extract vital information. challenges posed by disposable VM at every stage of forensic
Write blockers are used to prevent accidental writes on to the investigation.
original disk. MD5 hashing is one of the method to ensure
the integrity. Forensic tools allow us to complete this task V. C ONCLUSION
by mounting disk image for further analysis of the Virtual
In this paper, the investigators have explored challenges
machines and Hypervisor. Graphical user interface such as
posed by lightweight VM to the digital forensics experts at
Dymanage and AIR are developed for DD find DD rescue.
every stage of digital forensics investigation. We discovered
In case of disposable virtual machines, data is not persistent
that there is not much research done in disposable VM foren-
so it is not possible to create disk image of disposable virtual
sics. These challenges needs to be addressed by conducting
machines.
experiments on disposable VM. One of the possible thing is to
compare the complete system image before and after running
B. Identifcation and Recovery disposable virtual machine on various platforms and in this
way we find possible traces or changes in the system.
At first, host machine is analyzed to find the traces of
virtual machine in hypervisor. Host operating system maintains
ACKNOWLEDGMENT
log files, which lead to extract traces of virtual machine. Win-
dows operating system maintains registry entries, prefetched The authors would like to acknowledge the support of
files, shared DLL, log files, thumbnails, icons, temporary files, the Deanship of Scientific Research at Prince Sattam Bin
and system event logs etc. that can prove the virtual machine Abdulaziz University, Al-Kharj, Saudi Arabia.
www.ijacsa.thesai.org 795 | P a g e
(IJACSA) International Journal of Advanced Computer Science and Applications,
Vol. 12, No. 2, 2021
www.ijacsa.thesai.org 796 | P a g e
© 2021. This work is licensed under
https://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding
the ProQuest Terms and Conditions, you may use this content in accordance
with the terms of the License.