Forensics acquisition — Analysis and circumvention of samsung secure boot enforced common criteria mode
نویسندگان
چکیده
منابع مشابه
Kindle Forensics: Acquisition & Analysis
The Amazon Kindle eBook reader supports a wide range of capabilities beyond reading books. This functionality includes an inbuilt cellular data connection known as Whispernet. The Kindle provides web browsing, an application framework, eBook delivery and other services over this connection. The historic data left by user interaction with this device may be of forensic interest. Analysis of the ...
متن کاملForensics Acquisition and Analysis of Instant Messaging and VoIP Applications
The advent of the Internet has significantly transformed the daily activities of millions of people, with one of them being the way people communicate where Instant Messaging (IM) and Voice over IP (VoIP) communications have become prevalent. Although IM applications are ubiquitous communication tools nowadays, it was observed that the relevant research on the topic of evidence collection from ...
متن کاملMemory Forensics: Review of Acquisition and Analysis Techniques
This document presents an overview of the most common memory forensics techniques used in the acquisition and analysis of a system’s volatile memory. Memory forensics rose from obscurity in 2005 in response to a challenge issued by the Digital Forensics Research Workshop (DFRWS). Since then, investigators and researchers alike have begun to recognise the important role that memory forensics can...
متن کاملAcquisition and analysis of compromised firmware using memory forensics
To a great degree, research in memory forensics concentrates on the acquisition and analysis of kerneland user-space software from physical memory to date. With the system firmware, a much more privileged software layer exists in modern computer systems though that has recently become the target in sophisticated computer attacks more often. Compromise strategies used by high profile rootkits ar...
متن کاملSmartphone Volatile Memory Acquisition for Security Analysis and Forensics Investigation
In this paper, we first identify the need to be equipped with the capability to perform raw volatile memory data acquisition from live smartphones. We then investigate and discuss the potential of different approaches to achieve this task on Symbian smartphones. Based on our initial analysis, we propose a simple, flexible and portable approach which can have a full-coverage view of the memory s...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Digital Investigation
سال: 2018
ISSN: 1742-2876
DOI: 10.1016/j.diin.2018.01.008