1 |
Gal Beniamini, "TrustZone TEEs - An Attacker's Perspective", BlueHat IL 2017, 2017.01.24.
|
2 |
Supreme Prosecutor's Office, "Regulation for the collection, analysis and management of digital evidence" 2017.3.1.
|
3 |
National Police Agency, "Digital Evidence Processing Standards Guidelines", 2006.12.28.
|
4 |
National Police Agency, "Rules for the collection and processing of digital evidence", 2017.09.01.
|
5 |
Sammons, J, "The Basics of Digital Forensics: The Primer for Getting Started in Digital Forensics "USA:Syngress, pp.70-71, 2012
|
6 |
Telecommunications Technology Association, "Guidelines for Collection, Acquisition and Preservation of Digital-Evidence", TTAS.KO-12.0058/R1, 2017.12.13.
|
7 |
S. H. Jeong, Y. H. Lee, and S. J. Lee, "A Study of Acquisition and Analysis on the Bios Firmware Image File in the Digital Forensics," KIPS Transactions on Computer and Communication Systems, Vol.5, No.12, pp.491-498, 2016, DOI: 10.3745/KTCCS.2016.5.12.491.
DOI
|
8 |
Distributed Management Task Force, Inc, "System Management BIOS (SMBIOS) Reference Specification", DSP0134, 2017.01.13
|
9 |
Sung-min Jang, Jung-heum Park and Chan-ung Pak, "The Research for Digital Evidence Acquisition Procedure within a Full Disk Encryption Environment", KIISC, 25(1), pp. 39-48, Feb. 2015
|