Hardware Man-in-the-Middle Attacks on Smartphones
<p>With the democratization of smartphones, law enforcement agencies are increasingly faced with the necessity of extracting data from criminal devices. Several vulnerabilities can be exploited to extract these data, but they are usually quickly fixed by a software update as soon as they are d...
Saved in:
Main Authors: | Mohamed Amine Khelif (Author), Jordane Lorandel (Author), Olivier Romain (Author) |
---|---|
Format: | Book |
Published: |
Forensic Science Today - Peertechz Publications,
2020-04-28.
|
Subjects: | |
Online Access: | Connect to this object online. |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Hardware, estimating, and mill design
by: Lowndes, William S. (William Shepherd), 1866- [Editor] -
Principles and Available Hardware in DECT
by: Ezhilmathi Alavandar, et al.
Published: (2022) -
Data breaching in cloud computing caused by man-in-the-middle (MITM) attack. / Siti Naquiah Ahmad Tarmizi Lim
by: Ahmad Tarmizi Lim, Siti Naquiah -
SPORT FACILITIES - SPORT ACTIVITIES HARDWARE
by: Zoran Mašić, et al.
Published: (2008) -
FPGA hardware kit for remote training platforms
by: Muhammad Alhammami
Published: (2024)