Vis enkel innførsel

dc.contributor.advisorDyrkolbotn, Geir Olav
dc.contributor.advisorFranke, Katrin
dc.contributor.advisorAxelsson, Stefan
dc.contributor.advisorØverlier, Lasse
dc.contributor.authorAlendal, Gunnar
dc.date.accessioned2022-03-14T15:04:15Z
dc.date.available2022-03-14T15:04:15Z
dc.date.issued2022
dc.identifier.isbn978-82-326-5328-7
dc.identifier.issn2703-8084
dc.identifier.urihttps://hdl.handle.net/11250/2985115
dc.description.abstractThe increased use of consumer electronics like computers, mobile phones, smart watches, external hard drives, etc. has made digital forensics more important for law enforcement. Consumer products now contain more information about a person’s life than ever before, useful in any criminal investigation. Gaining access to forensically valuable data is often crucial for a successful law enforcement investigation. At the same time, the mandatory security and complexity of these devices have increased, making successful acquisition of forensically valuable data more difficult. Successful acquisition now requires law enforcement to understand the underlying technology and possibly bypass security schemes protecting the user data. This thesis contributes with knowledge in this setting, by looking at different security challenges law enforcement meet when trying to acquire data from digital devices, and especially mobile phones. This thesis aims at increasing the knowledge on how law enforcement can use security vulnerabilities in digital forensic acquisition of modern mobile phones, improve the effectiveness of such use and gain knowledge on new attack surfaces.en_US
dc.language.isoengen_US
dc.publisherNTNUen_US
dc.relation.ispartofseriesDoctoral theses at NTNU;2022:94
dc.relation.haspartPaper 1: Alendal, Gunnar; Dyrkolbotn, Geir Olav; Axelsson, Stefan. Forensics Acquisition — Analysis and Circumvention of Samsung Secure Boot enforced Common Criteria Mode. Digital Investigation. The International Journal of Digital Forensics and Incident Response 2018 ;Volum 24. s. S60-S67en_US
dc.relation.haspartPaper 2: Alendal, Gunnar; Axelsson, Stefan; Dyrkolbotn, Geir Olav. Exploiting Vendor-Defined Messages in the USB Power Delivery Protocol. IFIP Advances in Information and Communication Technology 2019 ;Volum 569. s. 101-118en_US
dc.relation.haspartPaper 3: Alendal, Gunnar; Axelsson, Stefan; Dyrkolbotn, Geir Olav. Leveraging The USB Power Delivery Implementation For Digital Forensic Acquisition. IFIP Advances in Information and Communication Technology 2021 ;Volum 612. s. 111-133en_US
dc.relation.haspartPaper 4: Alendal, Gunnar; Dyrkolbotn, Geir Olav; Axelsson, Stefan.Digital Forensic Acquisition Kill Chain – Analysis and Demonstration. IFIP Advances in Information and Communication Technology 2021 ;Volum 612. s. 3-19en_US
dc.relation.haspartPaper 5: Alendal, Gunnar; Axelsson, Stefan; Dyrkolbotn, Geir Olav. Chip chop — smashing the mobile phone secure chip for fun and digital forensics. Forensic Science International: Digital Investigation 2021 ;Volum 37. s. -en_US
dc.relation.haspartPaper 6: Alendal, Gunnar. Breaking Android Security by Abusing Implicit HW Trust. In submission. This paper under submission and is therefore not included.en_US
dc.titleDigital Forensic Acquisition of mobile phones in the Era of Mandatory Security: Offensive Techniques, Security Vulnerabilities and Exploitationen_US
dc.typeDoctoral thesisen_US


Tilhørende fil(er)

Thumbnail
Thumbnail

Denne innførselen finnes i følgende samling(er)

Vis enkel innførsel