Hardware Man-in-the-Middle Attacks on Smartphones

<p>With the democratization of smartphones, law enforcement agencies are increasingly faced with the necessity of extracting data from criminal devices. Several vulnerabilities can be exploited to extract these data, but they are usually quickly fixed by a software update as soon as they are d...

Full description

Saved in:
Bibliographic Details
Main Authors: Mohamed Amine Khelif (Author), Jordane Lorandel (Author), Olivier Romain (Author)
Format: Book
Published: Forensic Science Today - Peertechz Publications, 2020-04-28.
Subjects:
Online Access:Connect to this object online.
Tags: Add Tag
No Tags, Be the first to tag this record!

MARC

LEADER 00000 am a22000003u 4500
001 peertech__10_17352_fst_000016
042 |a dc 
100 1 0 |a Mohamed Amine Khelif  |e author 
700 1 0 |a  Jordane Lorandel  |e author 
700 1 0 |a Olivier Romain  |e author 
245 0 0 |a Hardware Man-in-the-Middle Attacks on Smartphones 
260 |b Forensic Science Today - Peertechz Publications,   |c 2020-04-28. 
520 |a <p>With the democratization of smartphones, law enforcement agencies are increasingly faced with the necessity of extracting data from criminal devices. Several vulnerabilities can be exploited to extract these data, but they are usually quickly fixed by a software update as soon as they are discovered by the manufacturers. We propose a new hardware/protocol based attack targeting data communication bus of a smartphone. This attack is more robust to countermeasures, and allows to have a real-time access to the data exchanged for further processing.</p> 
540 |a Copyright © Mohamed Amine Khelif et al. 
546 |a en 
655 7 |a Research Article  |2 local 
856 4 1 |u https://doi.org/10.17352/fst.000016  |z Connect to this object online.