New flash memory acquisition methods based on firmware update protocols for LG Android smartphones
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Park, Juhyun | - |
dc.contributor.author | Jang, Yun-Hwan | - |
dc.contributor.author | Park, Yongsu | - |
dc.date.accessioned | 2022-07-11T17:21:26Z | - |
dc.date.available | 2022-07-11T17:21:26Z | - |
dc.date.created | 2021-05-12 | - |
dc.date.issued | 2018-06 | - |
dc.identifier.issn | 1742-2876 | - |
dc.identifier.uri | https://scholarworks.bwise.kr/hanyang/handle/2021.sw.hanyang/149933 | - |
dc.description.abstract | Since criminals are committing offenses using smartphones in many cases, smartphone forensic techniques are being considered important by criminal investigators. In this paper, we present a new methodology to analyze firmware update protocols using fuzz testing. This approach has enabled us to find five new methods to acquire data evidence from LG Android smartphones, released from 2011 to 2016. We conducted extensive experiments to obtain data evidence for 48 LG smartphone models (100 devices in total). Furthermore, we deal with diverse digital forensic issues such as integrity of evidence or decompression/decryption of data using our methods. | - |
dc.language | 영어 | - |
dc.language.iso | en | - |
dc.publisher | ELSEVIER SCI LTD | - |
dc.title | New flash memory acquisition methods based on firmware update protocols for LG Android smartphones | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Park, Yongsu | - |
dc.identifier.doi | 10.1016/j.diin.2018.04.002 | - |
dc.identifier.scopusid | 2-s2.0-85047080806 | - |
dc.identifier.wosid | 000436607300004 | - |
dc.identifier.bibliographicCitation | DIGITAL INVESTIGATION, v.25, pp.42 - 54 | - |
dc.relation.isPartOf | DIGITAL INVESTIGATION | - |
dc.citation.title | DIGITAL INVESTIGATION | - |
dc.citation.volume | 25 | - |
dc.citation.startPage | 42 | - |
dc.citation.endPage | 54 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.description.journalClass | 1 | - |
dc.description.isOpenAccess | N | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Interdisciplinary Applications | - |
dc.subject.keywordPlus | DEVICES | - |
dc.subject.keywordAuthor | Digital forensics | - |
dc.subject.keywordAuthor | Android forensics | - |
dc.subject.keywordAuthor | Smartphone forensics | - |
dc.subject.keywordAuthor | Android physical acquisition | - |
dc.subject.keywordAuthor | Firmware update protocol | - |
dc.identifier.url | https://www.sciencedirect.com/science/article/pii/S1742287617303948?via%3Dihub | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
222, Wangsimni-ro, Seongdong-gu, Seoul, 04763, Korea+82-2-2220-1365
COPYRIGHT © 2021 HANYANG UNIVERSITY.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.