Article ID | Journal | Published Year | Pages | File Type |
---|---|---|---|---|
6884467 | Digital Investigation | 2018 | 8 Pages |
Abstract
With no access to design documents or source code, we have reverse engineered how the Common Criteria mode is actually implemented and protected by Samsung's secure bootloader. We present how this security mode is enforced, security vulnerabilities therein, and how the discovered security vulnerabilities can be used to circumvent Common Criteria mode for further forensic acquisition.
Related Topics
Physical Sciences and Engineering
Computer Science
Computer Networks and Communications
Authors
Gunnar Alendal, Geir Olav Dyrkolbotn, Stefan Axelsson,