Vis enkel innførsel

dc.contributor.authorAlendal, Gunnar
dc.contributor.authorDyrkolbotn, Geir Olav
dc.contributor.authorAxelsson, Stefan
dc.date.accessioned2019-02-14T13:16:54Z
dc.date.available2019-02-14T13:16:54Z
dc.date.created2018-06-14T13:10:13Z
dc.date.issued2018
dc.identifier.citationDigital Investigation. The International Journal of Digital Forensics and Incident Response. 2018, 24 S60-S67.nb_NO
dc.identifier.issn1742-2876
dc.identifier.urihttp://hdl.handle.net/11250/2585527
dc.description.abstractThe acquisition of data from mobile phones have been a mainstay of criminal digital forensics for a number of years now. However, this forensic acquisition is getting more and more difficult with the increasing security level and complexity of mobile phones (and other embedded devices). In addition, it is often difficult or impossible to get access to design specifications, documentation and source code. As a result, the forensic acquisition methods are also increasing in complexity, requiring an ever deeper understanding of the underlying technology and its security mechanisms. Forensic acquisition techniques are turning to more offensive solutions to bypass security mechanisms, through security vulnerabilities. Common Criteria mode is a security feature that increases the security level of Samsung devices, and thus make forensic acquisition more difficult for law enforcement. With no access to design documents or source code, we have reverse engineered how the Common Criteria mode is actually implemented and protected by Samsung's secure bootloader. We present how this security mode is enforced, security vulnerabilities therein, and how the discovered security vulnerabilities can be used to circumvent Common Criteria mode for further forensic acquisition.nb_NO
dc.language.isoengnb_NO
dc.publisherElseviernb_NO
dc.relation.urihttps://doi.org/10.1016/j.diin.2018.01.008
dc.rightsAttribution-NonCommercial-NoDerivatives 4.0 Internasjonal*
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/4.0/deed.no*
dc.titleForensics Acquisition — Analysis and Circumvention of Samsung Secure Boot enforced Common Criteria Modenb_NO
dc.title.alternativeForensics Acquisition — Analysis and Circumvention of Samsung Secure Boot enforced Common Criteria Modenb_NO
dc.typeJournal articlenb_NO
dc.typePeer reviewednb_NO
dc.description.versionpublishedVersionnb_NO
dc.source.pagenumberS60-S67nb_NO
dc.source.volume24nb_NO
dc.source.journalDigital Investigation. The International Journal of Digital Forensics and Incident Responsenb_NO
dc.identifier.doi10.1016/j.diin.2018.01.008
dc.identifier.cristin1591211
dc.relation.projectNorges forskningsråd: 248094nb_NO
dc.description.localcode© 2018 The Author(s). Published by Elsevier Ltd on behalf of DFRWS. This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/).nb_NO
cristin.unitcode194,63,30,0
cristin.unitnameInstitutt for informasjonssikkerhet og kommunikasjonsteknologi
cristin.ispublishedtrue
cristin.fulltextoriginal
cristin.qualitycode1


Tilhørende fil(er)

Thumbnail

Denne innførselen finnes i følgende samling(er)

Vis enkel innførsel

Attribution-NonCommercial-NoDerivatives 4.0 Internasjonal
Med mindre annet er angitt, så er denne innførselen lisensiert som Attribution-NonCommercial-NoDerivatives 4.0 Internasjonal