메뉴 건너뛰기




Volumn 8712 LNCS, Issue PART 1, 2014, Pages 202-218

TrustDump: Reliable memory acquisition on smartphones

Author keywords

Memory Acquisition; Non Maskable Interrupt; TrustZone

Indexed keywords

COMPUTER CRIME; MALWARE; SECURITY OF DATA; SECURITY SYSTEMS; SMARTPHONES;

EID: 84906505419     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-319-11203-9_12     Document Type: Conference Paper
Times cited : (45)

References (35)
  • 1
    • 85080362568 scopus 로고    scopus 로고
    • A virtual machine introspection based architecture for intrusion detection
    • Garfinkel, T., Rosenblum, M.: A virtual machine introspection based architecture for intrusion detection. In: NDSS (2003)
    • (2003) NDSS
    • Garfinkel, T.1    Rosenblum, M.2
  • 2
    • 77950853188 scopus 로고    scopus 로고
    • Stealthy malware detection through vmm-based "out-of-thebox" semantic view reconstruction
    • Jiang, X., Wang, X., Xu, D.: Stealthy malware detection through vmm-based "out-of-thebox" semantic view reconstruction. In: ACMConference on Computer and Communications Security, pp. 128-138 (2007)
    • (2007) ACMConference on Computer and Communications Security , pp. 128-138
    • Jiang, X.1    Wang, X.2    Xu, D.3
  • 3
    • 84876945112 scopus 로고    scopus 로고
    • Space traveling across vm: Automatically bridging the semantic gap in virtual machine introspection via online kernel data redirection
    • Fu, Y., Lin, Z.: Space traveling across vm: Automatically bridging the semantic gap in virtual machine introspection via online kernel data redirection. In: IEEE Symposium on Security and Privacy, pp. 586-600 (2012)
    • (2012) IEEE Symposium on Security and Privacy , pp. 586-600
    • Fu, Y.1    Lin, Z.2
  • 6
    • 84893231124 scopus 로고    scopus 로고
    • Spider: Stealthy binary program instrumentation and debugging via hardware virtualization
    • Deng, Z., Zhang, X., Xu, D.: Spider: stealthy binary program instrumentation and debugging via hardware virtualization. In: ACSAC, pp. 289-298 (2013)
    • (2013) ACSAC , pp. 289-298
    • Deng, Z.1    Zhang, X.2    Xu, D.3
  • 7
    • 85060493868 scopus 로고    scopus 로고
    • Droidscope: Seamlessly reconstructing the os and dalvik semantic views for dynamic android malware analysis
    • USENIX Association
    • Yan, L.K., Yin, H.: Droidscope: Seamlessly reconstructing the os and dalvik semantic views for dynamic android malware analysis. In: Proceedings of the 21st USENIX Conference on Security Symposium, Security 2012, p. 29. USENIX Association (2012)
    • (2012) Proceedings of the 21st USENIX Conference on Security Symposium, Security 2012 , pp. 29
    • Yan, L.K.1    Yin, H.2
  • 8
    • 77952132371 scopus 로고    scopus 로고
    • Flicker: An execution infrastructure for tcb minimization
    • McCune, J.M., Parno, B., Perrig, A., Reiter, M.K., Isozaki, H.: Flicker: an execution infrastructure for tcb minimization. In: EuroSys, pp. 315-328 (2008)
    • (2008) EuroSys , pp. 315-328
    • McCune, J.M.1    Parno, B.2    Perrig, A.3    Reiter, M.K.4    Isozaki, H.5
  • 11
    • 84883443579 scopus 로고    scopus 로고
    • Spectre: A dependable introspection framework via system management mode
    • Zhang, F., Leach, K., Sun, K., Stavrou, A.: Spectre: A dependable introspection framework via system management mode. In: DSN, pp. 1-12 (2013)
    • (2013) DSN , pp. 1-12
    • Zhang, F.1    Leach, K.2    Sun, K.3    Stavrou, A.4
  • 13
    • 78249271707 scopus 로고    scopus 로고
    • Hypercheck: A hardware-assisted integrity monitor
    • In: Jha, S., Sommer, R., Kreibich, C. (eds.) Springer, Heidelberg
    • Wang, J., Stavrou, A., Ghosh, A.: Hypercheck: A hardware-assisted integrity monitor. In: Jha, S., Sommer, R., Kreibich, C. (eds.) RAID 2010. LNCS, vol. 6307, pp. 158-177. Springer, Heidelberg (2010)
    • (2010) RAID 2010. LNCS , vol.6307 , pp. 158-177
    • Wang, J.1    Stavrou, A.2    Ghosh, A.3
  • 14
    • 80755169488 scopus 로고    scopus 로고
    • Sice: A hardware-level strongly isolated computing environment for x86 multi-core platforms
    • Azab, A.M., Ning, P., Zhang, X.: Sice: a hardware-level strongly isolated computing environment for x86 multi-core platforms. In: ACM Conference on Computer and Communications Security, pp. 375-388 (2011)
    • (2011) ACM Conference on Computer and Communications Security , pp. 375-388
    • Azab, A.M.1    Ning, P.2    Zhang, X.3
  • 15
    • 84906509985 scopus 로고    scopus 로고
    • ARM: TrustZone Introduction
    • ARM: TrustZone Introduction, http://www.arm.com/products/processors/ technologies/trustzone/index.php
  • 16
    • 51849104627 scopus 로고    scopus 로고
    • Trustzone: Integrated hardware and software security
    • Alves, T., Felton, D.: Trustzone: Integrated hardware and software security. ARM White Paper 3(4) (2004)
    • (2004) ARM White Paper , vol.3 , Issue.4
    • Alves, T.1    Felton, D.2
  • 17
    • 84906490767 scopus 로고    scopus 로고
    • ARM: Cortex-A8 Technical Reference Manual
    • ARM: Cortex-A8 Technical Reference Manual, http://infocenter.arm.com/ help/topic/com.arm.doc.ddi0344k/DDI0344K cortex a8 r3p2 trm.pdf
  • 18
    • 84906518789 scopus 로고    scopus 로고
    • ARM: Cortex-A9 Technical Reference Manual
    • ARM: Cortex-A9 Technical Reference Manual, http://infocenter.arm.com/ help/topic/com.arm.doc.ddi0388f/DDI0388F cortex a9 r2p2 trm.pdf
  • 19
    • 84906500239 scopus 로고    scopus 로고
    • ARM: ARM Cortex-A15 MPCore Processor Technical Reference Manual
    • ARM: ARM Cortex-A15 MPCore Processor Technical Reference Manual, http://infocenter.arm.com/help/index.jsp?topic=/com.arm.doc.ddi0438i/index.html
  • 20
    • 84906509986 scopus 로고    scopus 로고
    • ARM: Interrupt Behavior of Cortex-M1
    • ARM: Interrupt Behavior of Cortex-M1, http://infocenter.arm.com/help/ index.jsp?topic=/com.arm.doc.dai0211a/index.html
  • 21
    • 84906500240 scopus 로고    scopus 로고
    • ARM: Cortex-M4 Devices Generic User Guide
    • ARM: Cortex-M4 Devices Generic User Guide, http://infocenter.arm.com/ help/index.jsp?topic=/com.arm.doc.dui0553a/Cihfaaha.html
  • 22
    • 84906490765 scopus 로고    scopus 로고
    • Freescale: Imx53qsb: i.mx53 quick start board
    • Freescale: Imx53qsb: i.mx53 quick start board, http://www.freescale.com/ webapp/sps/site/prod summary.jsp?code=IMX53QSB&tid= vanIMXQUICKSTART
  • 23
    • 84906490766 scopus 로고    scopus 로고
    • Adeneo Embedded: Reference BSPs for Freescale i.MX53 Quick Start Board
    • Adeneo Embedded: Reference BSPs for Freescale i.MX53 Quick Start Board, http://www.adeneo-embedded.com/en/Products/Board-Support-Packages/Freescale-i. MX53-QSB
  • 24
    • 84906509984 scopus 로고    scopus 로고
    • Paul Bakker: PolarSSL
    • Paul Bakker: PolarSSL, https://polarssl.org/
  • 25
    • 84906500238 scopus 로고    scopus 로고
    • Michael Coppola: Suterusu Rootkit: Inline Kernel Function Hooking on x86 and ARM
    • Michael Coppola: Suterusu Rootkit: Inline Kernel Function Hooking on x86 and ARM, http://poppopret.org/2013/01/07/suterusu-rootkit-inlinekernel-function- hooking-on-x86-and-arm/
  • 26
    • 84917741115 scopus 로고    scopus 로고
    • Procedures and tools for acquisition and analysis of volatile memory on android smartphones
    • SRI Security Research Institute, Edith Cowan University, Perth, Western Australia
    • Heriyanto, A.P.: Procedures and tools for acquisition and analysis of volatile memory on android smartphones. In: Proceedings of The 11th Australian Digital Forensics Conference. SRI Security Research Institute, Edith Cowan University, Perth, Western Australia (2013)
    • (2013) Proceedings of the 11th Australian Digital Forensics Conference
    • Heriyanto, A.P.1
  • 27
    • 84857917909 scopus 로고    scopus 로고
    • Acquisition and analysis of volatile memory from android devices
    • Sylve, J., Case, A.,Marziale, L., Richard III, G.G.: Acquisition and analysis of volatile memory from android devices. Digital Investigation 8(3-4), 175-184 (2012)
    • (2012) Digital Investigation , vol.8 , Issue.3-4 , pp. 175-184
    • Sylve, J.1    Case, A.2    Marziale, L.3    Richard, G.G.4
  • 28
    • 84906500236 scopus 로고    scopus 로고
    • Google: Using ddms for debugging
    • Google: Using ddms for debugging, http://developer.android.com/tools/ debugging/ddms.html
  • 29
    • 84906509983 scopus 로고    scopus 로고
    • Stevenson, A.: Boot into Recovery Mode for Rooted and Un-rooted Android devices
    • Stevenson, A.: Boot into Recovery Mode for Rooted and Un-rooted Android devices, http://androidflagship.com/605-enter-recovery-mode-rooted-un-rooted- android
  • 32
    • 3042731401 scopus 로고    scopus 로고
    • A hardware-based memory acquisition procedure for digital investigations
    • Carrier, B.D., Grand, J.: A hardware-based memory acquisition procedure for digital investigations. Digital Investigation 1(1), 50-60 (2004)
    • (2004) Digital Investigation , vol.1 , Issue.1 , pp. 50-60
    • Carrier, B.D.1    Grand, J.2
  • 33
    • 33644922345 scopus 로고    scopus 로고
    • Forensic imaging of embedded systems using jtag (boundary-scan)
    • March
    • Breeuwsma, I.M.F.: Forensic Imaging of Embedded Systems Using JTAG (Boundary-scan). Digit. Investig. 3(1) (March 2006)
    • (2006) Digit. Investig , vol.3 , Issue.1
    • Breeuwsma, I.M.F.1
  • 35
    • 51049087072 scopus 로고    scopus 로고
    • Internal forensic acquisition for mobile equipments
    • Me, G., Rossi, M.: Internal forensic acquisition for mobile equipments. In: IPDPS, pp. 1-7 (2008)
    • (2008) IPDPS , pp. 1-7
    • Me, G.1    Rossi, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.