2021 IEEE 2nd International Conference on Information Technology, Big Data and Artificial Intelligence (ICIBA) 2021
DOI: 10.1109/iciba52610.2021.9688162
|View full text |Cite
|
Sign up to set email alerts
|

A research of digital forensic method based on the Checkm8 heap vulnerability

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 2 publications
0
1
0
Order By: Relevance
“…The BFU extraction was using Cellebrite UFED Premium capability and did not utilize the checkm8 exploit, which using physical extraction method from DFU mode. While the checkm8 could be combined with tools like checkra1n and libmobiledevice, forensic investigator can gain access to semi-encrypted data on certain iPhone models through jailbreak, even when the device is locked [17]. However, checkm8 method has limitations in device and iOS version compatibility, we aimed to explore the potential of BFU data extraction capabilities for future forensic applications.…”
Section: Data Extraction Scenariomentioning
confidence: 99%
“…The BFU extraction was using Cellebrite UFED Premium capability and did not utilize the checkm8 exploit, which using physical extraction method from DFU mode. While the checkm8 could be combined with tools like checkra1n and libmobiledevice, forensic investigator can gain access to semi-encrypted data on certain iPhone models through jailbreak, even when the device is locked [17]. However, checkm8 method has limitations in device and iOS version compatibility, we aimed to explore the potential of BFU data extraction capabilities for future forensic applications.…”
Section: Data Extraction Scenariomentioning
confidence: 99%