1 |
Wireshark, https://www.wireshark.org/, Accessed at 2021.12.29.
|
2 |
Boztas, A., Riethoven, A. R. J., & Roeloffs, M. (2015). Smart TV forensics: Digital traces on televisions. Digital Investigation, 12, S72-S80.
DOI
|
3 |
Jo, W., Shin, Y., Kim, H., Yoo, D., Kim, D., Kang, C., ... & Shon, T. (2019). Digital forensic practices and methodologies for AI speaker ecosystems. Digital Investigation, 29, S80-S93.
DOI
|
4 |
Shin, Y., Kim, H., Kim, S., Yoo, D., Jo, W., & Shon, T. (2020). Certificate Injection-Based Encrypted Traffic Forensics in AI Speaker Ecosystem. Forensic Science International: Digital Investigation, 33, 301010.
DOI
|
5 |
Nemayire, T., Ogbole, A., Park, S., Kim, K., Jeong, Y., & Jang, Y. (2019). A 2018 Samsung Smart TV Data Acquisition Method Analysis. 디지털포렌식연구, 13(3), 205-218.
DOI
|
6 |
보안뉴스, 아파트 월패드 해킹 이슈 일파만파... 해킹 아파트 리스트 유포중, https://www.boannews.com/media/view.asp?idx=102768, Accessed at 2021.12.29.
|
7 |
Burp suite, https://portswigger.net/burp, Accessed at 2021.12.29.
|
8 |
Lee, S., Jo, W., Eo, S., & Shon, T. (2019). ExtSFR: scalable file recovery framework based on an Ext file system. Multimedia Tools and Applications, 1-19.
|
9 |
A. V. Konradi, Performance Optimization of the VDFS Verified File System, MASSACHUSETTS INSTITUTE OF TECHNOLOGY,
|