Hardware Man-in-the-Middle Attacks on Smartphones

<p>With the democratization of smartphones, law enforcement agencies are increasingly faced with the necessity of extracting data from criminal devices. Several vulnerabilities can be exploited to extract these data, but they are usually quickly fixed by a software update as soon as they are d...

Full description

Saved in:
Bibliographic Details
Main Authors: Mohamed Amine Khelif (Author), Jordane Lorandel (Author), Olivier Romain (Author)
Format: Book
Published: Forensic Science Today - Peertechz Publications, 2020-04-28.
Subjects:
Online Access:Connect to this object online.
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:<p>With the democratization of smartphones, law enforcement agencies are increasingly faced with the necessity of extracting data from criminal devices. Several vulnerabilities can be exploited to extract these data, but they are usually quickly fixed by a software update as soon as they are discovered by the manufacturers. We propose a new hardware/protocol based attack targeting data communication bus of a smartphone. This attack is more robust to countermeasures, and allows to have a real-time access to the data exchanged for further processing.</p>
DOI:10.17352/fst.000016