1 |
NIST Special Publication 800-101 Revision1, "Guidelines on Mobile Device Forensics", May 2014.
|
2 |
ISO/IEC 27043, "Information technology - Security techniques - Incident investigation principles and processes", March 2015.
|
3 |
Mumba, Emilio Raymond and Hein S. Venter, "Mobile forensics using the harmonised digital forensic investigation process", 2014 Information Security for South Africa IEEE, 2014.
|
4 |
Murphy, Cynthia A. "Developing process for mobile device forensics", 2009.
|
5 |
Goel, Archit, Anurag Tyagi and Ankit Agarwal, "Smartphone forensic investigation process model", International Journal of Computer Science & Security (IJCSS), pp. 322-341, 6(5), 2012.
|
6 |
TTAS.KO-12.0059, "이동 전화 포렌식 가이드라인", 한국정보통신기술협회, 2007.
|
7 |
이정훈, 천우성, "디지털 증거 수집과 분석을 위한 스마트폰 포렌식 적용 연구", 정보보호학회지, 21(6), pp. 56-65, 2011.
|
8 |
이무영, "디지털 증거 압수수색에 있어서 관련성 개념에 관한 연구 - 모바일 포렌식을 중심으로 -", 서울대학교 융합과학기술대학원, 2015.
|
9 |
Konstantia Barmpatsalou, Dimitrios Damopoulos, Georgios Kambourakis and Vasilios Katos, "A critical review of 7 years of Mobile Device Forensics", Digital Investigation, 10(4), pp. 323-349, December 2013.
DOI
|
10 |
Marcel Breeuwsma, Martien de Jongh, Coert Klaver, Ronald van der Knijff and Mark Roeloffs, "Forensic Data Recovery from Flash Memory", SMALL SCALE DIGITAL DEVICE FORENSICS JOURNAL, 1(1), pp. 1-7, June 2007.
|
11 |
이규안, "JTAG 방식을 이용한 모바일 포렌식 기법 연구", 숭실대학교, 2010.
|
12 |
Ing. M.F. Breeuwsma, "Forensic imaging of embedded system using JTAG", Digital Investigation, 3, pp. 32-42, 2006.
DOI
|
13 |
Yang, Seung Jei, et al. "New acquisition method based on firmware update protocols for Android smartphones", Digital Investigation, 14, pp. S68-S76, 2015.
DOI
|
14 |
Namheun Son, Yunho Lee, Dohyun Kim, Joshua I. James, Sangjin Lee and Kyungho Lee, "A study of user data integrity during acquisition of Android devices", Digital Investigation, 10, pp. S3-S11, 2013.
DOI
|
15 |
Android Developer, "https://developer.android.com/", 2016.
|
16 |
오정훈, 이상진, "안드로이드 스마트폰 포렌식 분석 방법에 관한 연구", 고려대학교 정보보호대학원, 2012.
|
17 |
Cellebrite UFED, "http://www.cellebrite.com/", 2016.
|
18 |
XRY, https://www.msab.com/, 2016.
|
19 |
형사소송법 제106조 3항, "http://www.law.go.kr/법령/형사소송법", 2016.
|
20 |
Jonathan Zdziarski, "Identifying back doors, attack points, and surveillance mechanisms in iOS devices", Digital Investigation, 11, pp. 3-19, 2014.
DOI
|
21 |
evasi0n, "http://evasi0n.com/", 2106
|
22 |
PanGu, "http://en.7.pangu.io/", 2016.
|
23 |
TaiG, "http://www.taig.com/en/", 2016.
|
24 |
libimobiledevice, " http://www.libimobiledevice.org/", 2016.
|
25 |
Joe Sylve, Andrew Case, Lodovico Marziale and Golden G. Richarda, "Acquisition and analysis of volatile memory from android devices", Digital Investigation, 8(3), pp. 175-184, February 2012.
DOI
|
26 |
LiME, "https://github.com/504ensicsLabs/LiME", 2016.
|
27 |
Fabio Casadei, Antonio Savoldi and Paolo Gubian, "Forensics and SIM cards: an Overview", International Journal of Digital Evidence, 5(1), Fall 2006.
|