A new model for forensic data extraction from encrypted mobile devices
暂无分享,去创建一个
[1] David Naccache,et al. Forensic smartphone analysis using adhesives: Transplantation of Package on Package components , 2018 .
[2] Breaking Mobile Firmware Encryption through Near-Field Side-Channel Analysis , 2019, ASHES@CCS.
[3] Jason Smith,et al. SIMON and SPECK: Block Ciphers for the Internet of Things , 2015, IACR Cryptol. ePrint Arch..
[4] Shukor Abd Razak,et al. A Review of Mobile Forensic Investigation Process Models , 2020, IEEE Access.
[5] Halefom H. Abraha. How compatible is the US ‘CLOUD Act’ with cloud computing? A brief analysis , 2019, International Data Privacy Law.
[6] Aurelien Vasselle,et al. Laser-Induced Fault Injection on Smartphone Bypassing the Secure Boot-Extended Version , 2020, IEEE Transactions on Computers.
[7] C. Aring,et al. A CRITICAL REVIEW , 1939, Journal of neurology and psychiatry.
[8] Nicolas Christin,et al. Toward a general collection methodology for Android devices , 2011, Digit. Investig..
[9] Roee Hay,et al. fastboot oem vuln: Android Bootloader Vulnerabilities in Vendor Customizations , 2017, WOOT.
[10] Mark Mohammad Tehranipoor,et al. A Survey on Chip to System Reverse Engineering , 2016, JETC.
[11] Asaf Shabtai,et al. Shattered Trust: When Replacement Smartphone Components Attack , 2018, WOOT.
[12] Christopher James Hargreaves,et al. Recovery of Encryption Keys from Memory Using a Linear Scan , 2008, 2008 Third International Conference on Availability, Reliability and Security.
[13] Thomas Zefferer,et al. Mobile Device Encryption Systems , 2013, SEC.
[14] Jesse D. Kornblum. Implementing BitLocker Drive Encryption for forensic analysis , 2009, Digit. Investig..
[15] Stefan Axelsson,et al. Forensics acquisition - Analysis and circumvention of samsung secure boot enforced common criteria mode , 2018, Digit. Investig..
[16] Richard P. Ayers,et al. Guidelines on Mobile Device Forensics , 2014 .
[17] Urs Gasser,et al. Encryption Policy and Its International Impacts: A Framework for Understanding Extraterritorial Ripple Effects , 2018 .
[18] Carlos Liguori. Exploring Lawful Hacking as a Possible Answer to the "Going Dark" Debate , 2020 .
[19] Sherali Zeadally,et al. Mobile Forensics: Advances, Challenges, and Research Opportunities , 2017, IEEE Security & Privacy.
[20] Reema Shah. Law Enforcement and Data Privacy: A Forward-Looking Approach , 2015 .
[21] Luis Javier García Villalba,et al. Methodology for Forensics Data Reconstruction on Mobile Devices with Android Operating System Applying In-System Programming and Combination Firmware , 2020, Applied Sciences.
[22] Sieteng Soh,et al. Cloud forensics: Technical challenges, solutions and comparative analysis , 2015, Digit. Investig..
[23] Sergei Skorobogatov,et al. The bumpy road towards iPhone 5c NAND mirroring , 2016, ArXiv.
[24] Steven Penney,et al. Law Enforcement Access to Encrypted Data: Legislative Responses and the Charter , 2019, McGill Law Journal.
[25] Nhien-An Le-Khac,et al. Leveraging Electromagnetic Side-Channel Analysis for the Investigation of IoT Devices , 2019, Digit. Investig..
[26] Ragib Hasan,et al. Cloud Forensics: A Meta-Study of Challenges, Approaches, and Open Problems , 2013, ArXiv.
[27] Stephanie K. Pell. You Can’t Always Get What You Want: How Will Law Enforcement Get What it Needs in a Post-CALEA, Cybersecurity-Centric Encryption Era? , 2016 .
[28] Eleni Kosta,et al. Looking for some light through the lens of "cryptowar" history: Policy options for law enforcement authorities against "going dark" , 2018, Comput. Law Secur. Rev..
[29] Georgios Kambourakis,et al. A critical review of 7 years of Mobile Device Forensics , 2013, Digit. Investig..
[30] Svein Yngvar Willassen. Forensic Analysis of Mobile Phone Internal Memory , 2005, IFIP Int. Conf. Digital Forensics.
[31] Yixin Luo,et al. Improving the reliability of chip-off forensic analysis of NAND flash memory devices , 2017, Digit. Investig..
[32] Ruben de Vries,et al. Android 7 File Based Encryption and the Attacks Against It , 2017 .
[33] Ian Walden. 'The Sky is Falling!' - Responses to the 'Going Dark' problem , 2018, Comput. Law Secur. Rev..
[34] Mark Roeloffs,et al. Forensic Data Recovery from Flash Memory , 2007 .
[35] Eoghan Casey,et al. The growing impact of full disk encryption on digital forensics , 2011, Digit. Investig..
[36] Kristen M. Jacobsen. Game of Phones, Data Isn't Coming: Modern Mobile Operating System Technology and Its Chilling Effect on Law Enforcement , 2016 .