2019
DOI: 10.1007/978-3-030-23547-5_8
|View full text |Cite
|
Sign up to set email alerts
|

Digital Forensics of Raspberry Pi Used for MITM

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 7 publications
0
3
0
Order By: Relevance
“…2) Cold Boot Attacks/Liquid Nitrogen Memory Analysis: Dynamic random-access memory (DRAMs) are assumed to lose their data as soon as the system shuts down, however, studies have shown that they are capable of preserving data for several seconds after power loss, with only a small portion of data being discarded [63]. There is evidence that such data preservation in DRAMs poses a security risk [64], since systems that rely on data encryption and passwords frequently store sensitive data in DRAM with the expectation that a restart or removal of the DRAM will delete the data.…”
Section: E Alternative Approaches To Breaking Encryptionmentioning
confidence: 99%
“…2) Cold Boot Attacks/Liquid Nitrogen Memory Analysis: Dynamic random-access memory (DRAMs) are assumed to lose their data as soon as the system shuts down, however, studies have shown that they are capable of preserving data for several seconds after power loss, with only a small portion of data being discarded [63]. There is evidence that such data preservation in DRAMs poses a security risk [64], since systems that rely on data encryption and passwords frequently store sensitive data in DRAM with the expectation that a restart or removal of the DRAM will delete the data.…”
Section: E Alternative Approaches To Breaking Encryptionmentioning
confidence: 99%
“…A Raspberry Pi‐based adversary model is proposed by Gupta et al. [29] for demonstrating MITM attack. They have created a rogue wireless access point that captures critical user information.…”
Section: Related Workmentioning
confidence: 99%
“…They have executed their work for different machine learning algorithms for three kinds of cyber-attacks to verify the system's best option. A Raspberry Pi-based adversary model is proposed by Gupta et al [29] for demonstrating MITM attack. They have created a rogue wireless access point that captures critical user information.…”
Section: Kali Linux-based Real-time Attack Modelsmentioning
confidence: 99%