Hardware Man-in-the-Middle Attacks on Smartphones
<p>With the democratization of smartphones, law enforcement agencies are increasingly faced with the necessity of extracting data from criminal devices. Several vulnerabilities can be exploited to extract these data, but they are usually quickly fixed by a software update as soon as they are d...
Saved in:
Main Authors: | , , |
---|---|
Format: | Book |
Published: |
Forensic Science Today - Peertechz Publications,
2020-04-28.
|
Subjects: | |
Online Access: | Connect to this object online. |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
MARC
LEADER | 00000 am a22000003u 4500 | ||
---|---|---|---|
001 | peertech__10_17352_fst_000016 | ||
042 | |a dc | ||
100 | 1 | 0 | |a Mohamed Amine Khelif |e author |
700 | 1 | 0 | |a Jordane Lorandel |e author |
700 | 1 | 0 | |a Olivier Romain |e author |
245 | 0 | 0 | |a Hardware Man-in-the-Middle Attacks on Smartphones |
260 | |b Forensic Science Today - Peertechz Publications, |c 2020-04-28. | ||
520 | |a <p>With the democratization of smartphones, law enforcement agencies are increasingly faced with the necessity of extracting data from criminal devices. Several vulnerabilities can be exploited to extract these data, but they are usually quickly fixed by a software update as soon as they are discovered by the manufacturers. We propose a new hardware/protocol based attack targeting data communication bus of a smartphone. This attack is more robust to countermeasures, and allows to have a real-time access to the data exchanged for further processing.</p> | ||
540 | |a Copyright © Mohamed Amine Khelif et al. | ||
546 | |a en | ||
655 | 7 | |a Research Article |2 local | |
856 | 4 | 1 | |u https://doi.org/10.17352/fst.000016 |z Connect to this object online. |