A new model for forensic data extraction from encrypted mobile devices

[1]  David Naccache,et al.  Forensic smartphone analysis using adhesives: Transplantation of Package on Package components , 2018 .

[2]  Breaking Mobile Firmware Encryption through Near-Field Side-Channel Analysis , 2019, ASHES@CCS.

[3]  Jason Smith,et al.  SIMON and SPECK: Block Ciphers for the Internet of Things , 2015, IACR Cryptol. ePrint Arch..

[4]  Shukor Abd Razak,et al.  A Review of Mobile Forensic Investigation Process Models , 2020, IEEE Access.

[5]  Halefom H. Abraha How compatible is the US ‘CLOUD Act’ with cloud computing? A brief analysis , 2019, International Data Privacy Law.

[6]  Aurelien Vasselle,et al.  Laser-Induced Fault Injection on Smartphone Bypassing the Secure Boot-Extended Version , 2020, IEEE Transactions on Computers.

[7]  C. Aring,et al.  A CRITICAL REVIEW , 1939, Journal of neurology and psychiatry.

[8]  Nicolas Christin,et al.  Toward a general collection methodology for Android devices , 2011, Digit. Investig..

[9]  Roee Hay,et al.  fastboot oem vuln: Android Bootloader Vulnerabilities in Vendor Customizations , 2017, WOOT.

[10]  Mark Mohammad Tehranipoor,et al.  A Survey on Chip to System Reverse Engineering , 2016, JETC.

[11]  Asaf Shabtai,et al.  Shattered Trust: When Replacement Smartphone Components Attack , 2018, WOOT.

[12]  Christopher James Hargreaves,et al.  Recovery of Encryption Keys from Memory Using a Linear Scan , 2008, 2008 Third International Conference on Availability, Reliability and Security.

[13]  Thomas Zefferer,et al.  Mobile Device Encryption Systems , 2013, SEC.

[14]  Jesse D. Kornblum Implementing BitLocker Drive Encryption for forensic analysis , 2009, Digit. Investig..

[15]  Stefan Axelsson,et al.  Forensics acquisition - Analysis and circumvention of samsung secure boot enforced common criteria mode , 2018, Digit. Investig..

[16]  Richard P. Ayers,et al.  Guidelines on Mobile Device Forensics , 2014 .

[17]  Urs Gasser,et al.  Encryption Policy and Its International Impacts: A Framework for Understanding Extraterritorial Ripple Effects , 2018 .

[18]  Carlos Liguori Exploring Lawful Hacking as a Possible Answer to the "Going Dark" Debate , 2020 .

[19]  Sherali Zeadally,et al.  Mobile Forensics: Advances, Challenges, and Research Opportunities , 2017, IEEE Security & Privacy.

[20]  Reema Shah Law Enforcement and Data Privacy: A Forward-Looking Approach , 2015 .

[21]  Luis Javier García Villalba,et al.  Methodology for Forensics Data Reconstruction on Mobile Devices with Android Operating System Applying In-System Programming and Combination Firmware , 2020, Applied Sciences.

[22]  Sieteng Soh,et al.  Cloud forensics: Technical challenges, solutions and comparative analysis , 2015, Digit. Investig..

[23]  Sergei Skorobogatov,et al.  The bumpy road towards iPhone 5c NAND mirroring , 2016, ArXiv.

[24]  Steven Penney,et al.  Law Enforcement Access to Encrypted Data: Legislative Responses and the Charter , 2019, McGill Law Journal.

[25]  Nhien-An Le-Khac,et al.  Leveraging Electromagnetic Side-Channel Analysis for the Investigation of IoT Devices , 2019, Digit. Investig..

[26]  Ragib Hasan,et al.  Cloud Forensics: A Meta-Study of Challenges, Approaches, and Open Problems , 2013, ArXiv.

[27]  Stephanie K. Pell You Can’t Always Get What You Want: How Will Law Enforcement Get What it Needs in a Post-CALEA, Cybersecurity-Centric Encryption Era? , 2016 .

[28]  Eleni Kosta,et al.  Looking for some light through the lens of "cryptowar" history: Policy options for law enforcement authorities against "going dark" , 2018, Comput. Law Secur. Rev..

[29]  Georgios Kambourakis,et al.  A critical review of 7 years of Mobile Device Forensics , 2013, Digit. Investig..

[30]  Svein Yngvar Willassen Forensic Analysis of Mobile Phone Internal Memory , 2005, IFIP Int. Conf. Digital Forensics.

[31]  Yixin Luo,et al.  Improving the reliability of chip-off forensic analysis of NAND flash memory devices , 2017, Digit. Investig..

[32]  Ruben de Vries,et al.  Android 7 File Based Encryption and the Attacks Against It , 2017 .

[33]  Ian Walden 'The Sky is Falling!' - Responses to the 'Going Dark' problem , 2018, Comput. Law Secur. Rev..

[34]  Mark Roeloffs,et al.  Forensic Data Recovery from Flash Memory , 2007 .

[35]  Eoghan Casey,et al.  The growing impact of full disk encryption on digital forensics , 2011, Digit. Investig..

[36]  Kristen M. Jacobsen Game of Phones, Data Isn't Coming: Modern Mobile Operating System Technology and Its Chilling Effect on Law Enforcement , 2016 .