hh.sePublikationer
Ändra sökning
RefereraExporteraLänk till posten
Permanent länk

Direktlänk
Referera
Referensformat
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annat format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annat språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf
Forensics acquisition – Analysis and circumvention of samsung secure boot enforced common criteria mode
NTNU, Gjøvik, Norway.
NTNU, Gjøvik, Norway & Norwegian Defence Cyber Academy (NDCA), Jørstadmoen, Norway.
Högskolan i Halmstad, Akademin för informationsteknologi, Halmstad Embedded and Intelligent Systems Research (EIS).
2018 (Engelska)Ingår i: Digital Investigation. The International Journal of Digital Forensics and Incident Response, ISSN 1742-2876, E-ISSN 1873-202X, Vol. 24, nr Suppl., s. S60-S67Artikel i tidskrift (Refereegranskat) Published
Abstract [en]

The acquisition of data from mobile phones have been a mainstay of criminal digital forensics for a number of years now. However, this forensic acquisition is getting more and more difficult with the increasing security level and complexity of mobile phones (and other embedded devices). In addition, it is often difficult or impossible to get access to design specifications, documentation and source code. As a result, the forensic acquisition methods are also increasing in complexity, requiring an ever deeper understanding of the underlying technology and its security mechanisms. Forensic acquisition techniques are turning to more offensive solutions to bypass security mechanisms, through security vulnerabilities. Common Criteria mode is a security feature that increases the security level of Samsung devices, and thus make forensic acquisition more difficult for law enforcement. With no access to design documents or source code, we have reverse engineered how the Common Criteria mode is actually implemented and protected by Samsung's secure bootloader. We present how this security mode is enforced, security vulnerabilities therein, and how the discovered security vulnerabilities can be used to circumvent Common Criteria mode for further forensic acquisition. © 2018 The Author(s). Published by Elsevier Ltd on behalf of DFRWS.

Ort, förlag, år, upplaga, sidor
Kidlington: Elsevier, 2018. Vol. 24, nr Suppl., s. S60-S67
Nyckelord [en]
Common criteria, CC mode, Mobile security, Mobile device management, Forensic acquisition, Smart phone, Samsung secure boot
Nationell ämneskategori
Datavetenskap (datalogi) Inbäddad systemteknik Datorsystem Telekommunikation
Identifikatorer
URN: urn:nbn:se:hh:diva-36642DOI: 10.1016/j.diin.2018.01.008ISI: 000428307900008OAI: oai:DiVA.org:hh-36642DiVA, id: diva2:1199082
Projekt
Ars Forensica
Anmärkning

Funding: Research Council of Norway programme IKTPLUSS, under the R&D project Ars Forensica grant agreement 248094/O70.

Tillgänglig från: 2018-04-19 Skapad: 2018-04-19 Senast uppdaterad: 2018-04-20Bibliografiskt granskad

Open Access i DiVA

Fulltext saknas i DiVA

Övriga länkar

Förlagets fulltext

Personposter BETA

Axelsson, Stefan

Sök vidare i DiVA

Av författaren/redaktören
Axelsson, Stefan
Av organisationen
Halmstad Embedded and Intelligent Systems Research (EIS)
I samma tidskrift
Digital Investigation. The International Journal of Digital Forensics and Incident Response
Datavetenskap (datalogi)Inbäddad systemteknikDatorsystemTelekommunikation

Sök vidare utanför DiVA

GoogleGoogle Scholar

doi
urn-nbn

Altmetricpoäng

doi
urn-nbn
Totalt: 1182 träffar
RefereraExporteraLänk till posten
Permanent länk

Direktlänk
Referera
Referensformat
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annat format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annat språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf