1 |
G. Lee, H. Hwang, K. Kim and T. Chang, "Analysis Scheme on Backup Files of Samsung Smartphone available in Forensic," KIPS Transactions on Computer and Communication Systems, 2(8), pp. 349-356, Aug. 2013
DOI
|
2 |
J. Rongen and Z. Geradts, "Extraction and Forensic Analysis of Artifacts on Wearables," International Journal of Forensic Science and Pathology, vol. 5, no. 1, pp. 312-318, Jan. 2017
|
3 |
J. Park, H. Chung, Y. Son and S. Lee, "Design and Implementation of Analysis Techniques for Fragmented Pages in the Flash Memory Image of Smartphones," Journal of the Korea Institute of Information Security and Cryptology, 22(4), pp. 827-839, Jan. 2012
|
4 |
S. Jeon, K. Byun, J. Bang, G. Lee and S. Lee, "The Method of Recovery for Deleted Record in the Unallocated Space of SQLite Database," Journal of the Korea Institute of Information Security and Cryptology, 21(3), pp. 143-154, Jun. 2011
|
5 |
MD5sum, "Generate MD5 hashes of files," [Internet], http://www.pc-tools.net/win32/md5sums/
|
6 |
B.R. Joshi and R. Hubbard, "Forensics Analysis of Solid State Drive (SSD)," 2016 Universal Technology Management Conference (UTMC), pp. 1-12, May. 2016
|
7 |
M. Saxena and M.M. Swift, "FlashVM: Virtual Memory Management on Flash," USENIX Annual Technical Conference, Jun. 2010
|
8 |
MD-NEXT, [Internet], http://www.hancomgmd.com/product/mobile-forensic-solution/mobile-forensic-software/#md_next
|
9 |
Final Mobile Forensic, [Internet], http://www.finaldata.co.kr/mobile/
|
10 |
UFED Supported Devices, [Internet], http://lang.cellebrite.com/mobile-forensics/support/ufed-supported-devices
|
11 |
S.Y. Willassen, "Forensics and the GSM mobile telephone system," International Journal of Digital Evidence, vol. 2, no. 1, Jan. 2003
|
12 |
GSMA, "Global Mobile Trends," [Internet], https://www.gsma.com/globalmobiletrends
|
13 |
Google, "Android 7.0 Nougat," [Internet], https://developer.android.com/about/versions/nougat/index.html
|
14 |
K. Kim, D. Hong and J. Ryu, "Forensic Data Acquisition from Cell Phone using JTAG Interface," Proceedings of the 2008 International Conference on Security & Management, pp. 410-414, Jul. 2008.
|
15 |
L. Pierce and S. Tragoudas, "Multi-level secure JTAG architecture," On-Line Testing Symposium (IOLTS) IEEE 17th International, pp. 208-209, Jul. 2011.
|
16 |
E. Casey and G.J. Stellatos. "The impact of full disk encryption on digital forensics," ACM SIGOPS Operating Systems Review, vol. 42, no. 3, pp. 93-98, Apr. 2008
DOI
|
17 |
ARM, "TrustZone," [Internet], https://developer.arm.com/technologies/trustzone
|
18 |
Samsung, "Knox," [Internet], https://www.samsungknox.com/en/knox-platfo rm/knox-security
|
19 |
J.S. Dwoskin and R.B. Lee. "Hardware-rooted trust for secure key management and transient trust," CCS '17 Proceedings of the 14th ACM conference on Computer and communications security, pp. 389-400, Oct. 2007.
|
20 |
Google, "Verified Boot," [Internet], https://source.android.com/security/verifiedboot/
|
21 |
T. Vidas, C. Zhang and N. Christin. "Toward a general collection methodology for Android devices," Digital Investigation, vol. 8, pp. S14-S24, Aug. 2011
DOI
|
22 |
N. Son, Y. Lee, D. Kim, J. James, S. Lee and K. Lee, "A study of user data integrity during acquisition of Android devices," Digital Investigation, vol. 10, pp. S3-S11, Aug. 2013
DOI
|
23 |
Google, "Android Debug Bridge," [Internet], https://developer.android.com/studio/command-line/adb.html?hl=ko
|
24 |
Z. Jovanovic and D. Redd, Android forensics techniques, International Academy of Design and Technology, Bulleproof, Jan. 2012
|
25 |
Google, "Android Full Disk Encryption," [Internet], https://source.android.com/security/encryption/full-disk
|
26 |
R.E. Tulloss, "IEEE Standard Test Access Port and Boundary-Scan Architecture," IEEE 1149.1-1990, Feb. 1990
|
27 |
Riff Box, "Flasher," [Internet], http://www.riffbox.org/
|
28 |
Octupus, "Octopus Box," [Internet], https://octoplusbox.com/en/features/jtag/
|
29 |
S. Yang, J. Choi, K. Kim and T. Chang, "New acquisition method based on firmware update protocols for Android smartphones," Digital Investigation, vol. 14, no. 1, pp. S68-S76, Aug. 2015
DOI
|
30 |
E. Nikolay, "Android Backup Extractor," [Internet], https://github.com/nelenkov/android-backup-extractor
|
31 |
A. Hoog, Android forensics: investigation, analysis and mobile security for Google Android, 1st Ed., Syngress, Jun. 2011
|