2016
DOI: 10.1186/s13635-016-0041-4
|View full text |Cite
|
Sign up to set email alerts
|

A flexible framework for mobile device forensics based on cold boot attacks

Abstract: Mobile devices, like tablets and smartphones, are common place in everyday life. Thus, the degree of security these devices can provide against digital forensics is of particular interest. A common method to access arbitrary data in main memory is the cold boot attack. The cold boot attack exploits the remanence effect that causes data in DRAM modules not to lose the content immediately in case of a power cut-off. This makes it possible to restart a device and extract the data in main memory. In this paper, we… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 17 publications
0
2
0
Order By: Relevance
“…We can therefore conclude that the items chosen to measure ND were appropriate for the measurement. [38] and then other factors such as policies [32], [39], [40], nature of data [41] and type of data [15], [42] have a small contribution to inconsistencies in the evidence extraction process. From this Table 16, two factors emerged in a very significant way, namely the factor of the extraction method which is at B = 1.030 and the device factor at B = 0.078; these positive values indicate that as independent variables increase the consistency metric, even a dependent variable increases it, this is supported by the literature [28].…”
Section: Nature Of Data Factorsmentioning
confidence: 99%
“…We can therefore conclude that the items chosen to measure ND were appropriate for the measurement. [38] and then other factors such as policies [32], [39], [40], nature of data [41] and type of data [15], [42] have a small contribution to inconsistencies in the evidence extraction process. From this Table 16, two factors emerged in a very significant way, namely the factor of the extraction method which is at B = 1.030 and the device factor at B = 0.078; these positive values indicate that as independent variables increase the consistency metric, even a dependent variable increases it, this is supported by the literature [28].…”
Section: Nature Of Data Factorsmentioning
confidence: 99%
“…Others have addressed the general forensic challenges and proposed solutions based on the cloud computing environments [4,29]. Additionally, the emerging spread of mobile devices and their applications put more pressure on researchers to investigate the potential forensic artifacts that can be found in their RAM [30] and the cache of their applications [31].…”
Section: Related Workmentioning
confidence: 99%