-
1
-
-
84995614208
-
-
Australian Mobile Telecommunications Association. Lost and stolen phones, 2011. http://www.amta.org.au/pages/Lost.and.stolen.phones.
-
(2011)
Lost and stolen phones
-
-
-
6
-
-
84905048726
-
-
(accessed October 7, 2015
-
Verizon. 2014 data breach investigation report. http://www.verizonenterprise.com/DBIR/2014/ (accessed October 7, 2015).
-
2014 data breach investigation report
-
-
-
7
-
-
84894188956
-
-
Media Release,, (accessed October 7, 2015
-
Symantec. Symantec smartphone honey stick project. Media Release, 2012. https://www.symantec.com/about/news/resources/press_kits/detail.jsp?pkid=symantec-smartphone-honey-stick-project (accessed October 7, 2015).
-
(2012)
Symantec smartphone honey stick project
-
-
-
8
-
-
80055049958
-
The mobile ‘kill pill’ – poison or panacea
-
Caldwell T. The mobile ‘kill pill’ – poison or panacea. Comput Fraud Secur 2011;10:8–12.
-
(2011)
Comput Fraud Secur
, vol.10
, pp. 8-12
-
-
Caldwell, T.1
-
11
-
-
84995559005
-
System architecture
-
In, Cauley DW, Shafer K, Evers R, Koch M, editors., Indianapolis, IN, Wiley Publicati
-
Evers J, Johnston CJ. System architecture. In: Cauley DW, Shafer K, Evers R, Koch M editors. Professional blackberry. Indianapolis, IN: Wiley Publication, 2005;3–18.
-
(2005)
Professional blackberry
, pp. 3-18
-
-
Evers, J.1
Johnston, C.J.2
-
14
-
-
84995700513
-
-
(accessed October 7, 2015
-
Microsoft. Microsoft releases windows mobile 5.0, 2005. http://www.microsoft.com/en-us/news/press/2005/may05/05-10windowsmobile5pr.aspx (accessed October 7, 2015).
-
(2005)
Microsoft releases windows mobile 5.0
-
-
-
15
-
-
44649178724
-
Ghost in the machine
-
Munro K. Ghost in the machine. Itnow 2008;50(2):10.
-
(2008)
Itnow
, vol.50
, Issue.2
, pp. 10
-
-
Munro, K.1
-
17
-
-
65249112049
-
A new era of presidential security: the president and his BlackBerry
-
Harauz J, Kaufman LM. A new era of presidential security: the president and his BlackBerry. IEEE Secur Priv 2009;7(2):67–70.
-
(2009)
IEEE Secur Priv
, vol.7
, Issue.2
, pp. 67-70
-
-
Harauz, J.1
Kaufman, L.M.2
-
18
-
-
84995700516
-
-
(accessed October 7, 2015
-
Morrison G. Implementation guide for email protective markings for Australian government agencies, Australian Government Information Management Office, Department of Finance and Administration, Australia, 2005. http://www.finance.gov.au/publications/protective-markings/docs/Protective_Markings.pdf (accessed October 7, 2015).
-
(2005)
Implementation guide for email protective markings for Australian government agencies, Australian Government Information Management Office, Department of Finance and Administration, Australia
-
-
Morrison, G.1
-
20
-
-
84995574834
-
From MobileMe to iCloud
-
In, Moritz K, Larson D, Wimpsett K, editors., New York, NY, Apre
-
Mayers S, Lee M. From MobileMe to iCloud. In: Moritz K, Larson D, Wimpsett K, editors. Learn OS X lion. New York, NY: Apress, 2011;245–53.
-
(2011)
Learn OS X lion
, pp. 245-253
-
-
Mayers, S.1
Lee, M.2
-
21
-
-
84876585315
-
-
Apple, Inc, (accessed October 7, 2015
-
Apple. iOS 4.2 software update. Apple, Inc, 2010; http://support.apple.com/kb/DL1061 (accessed October 7, 2015).
-
(2010)
iOS 4.2 software update
-
-
-
22
-
-
84995574845
-
-
TIME, (accessed October 7, 2015
-
Aomoth D. App of the week: find my iPhone. TIME, 2010. http://techland.time.com/2010/11/23/app-of-the-week-find-my-iphone/ (accessed October 7, 2015).
-
(2010)
App of the week: find my iPhone
-
-
Aomoth, D.1
-
23
-
-
84995643170
-
-
Android Official Blog,, (accessed October 7, 2015
-
Poiesz B. Find your lost phone with android device manager. Android Official Blog, 2013. http://officialandroid.blogspot.com/2013/08/find-your-lost-phone-with-android.html (accessed October 7, 2015).
-
(2013)
Find your lost phone with android device manager
-
-
Poiesz, B.1
-
24
-
-
84995603897
-
-
Official Google for Work Blog,, (accessed October 7, 2015
-
Zhang H. Make mobile more manageable. Official Google for Work Blog, 2012. http://googleforwork.blogspot.com/2012/08/make-mobile-more-manageable.html (accessed October 7, 2015).
-
(2012)
Make mobile more manageable
-
-
Zhang, H.1
-
25
-
-
28044459032
-
Non-volatile memory technologies for beyond 2010
-
; 2005 June 16–18; Kyoto, Japan., Piscataway, NJ, IE
-
Shin Y. Non-volatile memory technologies for beyond 2010. In: Proceedings of Symposium on VLSI Circuits Digest of Technical Papers; 2005 June 16–18; Kyoto, Japan. Piscataway, NJ: IEEE, 2005;156–9.
-
(2005)
In Proceedings of Symposium on VLSI Circuits Digest of Technical Papers
, pp. 156-159
-
-
Shin, Y.1
-
26
-
-
84995653929
-
-
(accessed October 7, 2015
-
BlackBerry. Enforcing encryption of internal and external file systems on BlackBerry devices, 2010. http://www.manualslib.com/products/Blackberry-Enterprise-Solution-Security-Enforcing-Encryption-Of-Internal-And-External-File-Systems-On-Devices-2590666.html (accessed October 7, 2015).
-
(2010)
Enforcing encryption of internal and external file systems on BlackBerry devices
-
-
-
27
-
-
84892414616
-
ARMORED: CPU-bound encryption for android-driven ARM devices
-
; 2013 September 2–6; Regensburg, Germany., Piscataway, NJ, IE
-
Götzfried J, Müller T. ARMORED: CPU-bound encryption for android-driven ARM devices. In: Proceedings of Eight International Conference on Availability, Reliability and Security; 2013 September 2–6; Regensburg, Germany. Piscataway, NJ: IEEE, 2013;161–8.
-
(2013)
In Proceedings of Eight International Conference on Availability, Reliability and Security
, pp. 161-168
-
-
Götzfried, J.1
Müller, T.2
-
28
-
-
84920879909
-
Mobile device encryption systems
-
In, Janczewski LJ, Wolfe HB, Shenoi S, editors., Heidelberg, Germany, Springer, 4
-
Teufl P, Zefferer T, Stromberger C. Mobile device encryption systems. In: Janczewski LJ, Wolfe HB, Shenoi S, editors. IFIP advances in information and communication technology. Heidelberg, Germany: Springer, 2013;405:203–16.
-
(2013)
IFIP advances in information and communication technology
, pp. 203-216
-
-
Teufl, P.1
Zefferer, T.2
Stromberger, C.3
-
30
-
-
84995583691
-
-
(accessed October 7, 2015
-
Belfiore J. Announcing Windows Phone 8. Windows Blog, 2012. http://blogs.windows.com/windowsexperience/2012/06/20/announcing-windows-phone-8/ (accessed October 7, 2015).
-
(2012)
Announcing Windows Phone 8. Windows Blog
-
-
Belfiore, J.1
-
31
-
-
84995583689
-
-
Microsoft UK Schools Blog,, (accessed October 7, 2015
-
Godfrey R. Announcing Windows Phone 8. Microsoft UK Schools Blog, 2012. http://blogs.msdn.com/b/ukschools/archive/2012/06/27/announcing-windows-phone-8.aspx (accessed October 7, 2015).
-
(2012)
Announcing Windows Phone 8
-
-
Godfrey, R.1
-
36
-
-
84995574824
-
-
Git at Google,, (accessed October 7, 2015
-
Malchev I. Enable hardware crypto for userdata encryption. Git at Google, 2014. https://android.googlesource.com/platform/system/vold/+/bb7d9afea9479eabbc98133d3d968225a1e1019e%5E%21/#F0 (accessed October 7, 2015).
-
(2014)
Enable hardware crypto for userdata encryption
-
-
Malchev, I.1
-
40
-
-
84995700487
-
-
(accessed October 7, 2015
-
Elenkov N. Revisiting Android disk encryption, 2014. http://nelenkov.blogspot.com/2014/10/revisiting-android-disk-encryption.html (accessed October 7, 2015).
-
(2014)
Revisiting Android disk encryption
-
-
Elenkov, N.1
-
42
-
-
84995603914
-
-
ABC News,, (accessed October 7, 2015
-
Ockenden W, Sveen B. Abdilo, infamous Australian teen hacker, raided by police and ordered to surrender passwords. ABC News, 2015. http://www.abc.net.au/news/2015-04-02/infamous-australian-teenager-hacker-abdilo-raided-by-police/6368612 (accessed October 7, 2015).
-
(2015)
Abdilo, infamous Australian teen hacker, raided by police and ordered to surrender passwords
-
-
Ockenden, W.1
Sveen, B.2
-
43
-
-
84881251312
-
SoK: Secure data deletion
-
I; 2013 May 19–22; San Francisco, CA., Piscataway, NJ, IE
-
Reardon J, Basin D, Capkun S. SoK: Secure data deletion. In: Proceedings of Symposium on Security and Privacy; 2013 May 19–22; San Francisco, CA. Piscataway, NJ: IEEE, 2013;301–15.
-
(2013)
n Proceedings of Symposium on Security and Privacy
, pp. 301-315
-
-
Reardon, J.1
Basin, D.2
Capkun, S.3
-
44
-
-
34547439422
-
Long-term threats to secure archives
-
; 2006 October 31–November 2; Alexandria, VA., New York, NY, A
-
Storer MW, Greenan K, Miller EL. Long-term threats to secure archives. In: Proceedings of the Second Workshop on Storage Security and Survivability; 2006 October 31–November 2; Alexandria, VA. New York, NY: ACM, 2006;9–16.
-
(2006)
In Proceedings of the Second Workshop on Storage Security and Survivability
, pp. 9-16
-
-
Storer, M.W.1
Greenan, K.2
Miller, E.L.3
-
46
-
-
84995574873
-
-
Department of Navy Chief Information Officer, (accessed October 7, 2015
-
DON CIO Privacy Team. Methods for hard drive/disk destruction. Department of Navy Chief Information Officer, 2010. http://www.doncio.navy.mil/ContentView.aspx?ID=1867 (accessed October 7, 2015).
-
(2010)
Methods for hard drive/disk destruction
-
-
-
48
-
-
84995549833
-
-
US 056,143 (accessed 2011 November 8
-
Brown MK, Brown MS, Little HA, Totzke SW, Inventors. BlackBerry Ltd, assignee. Selectively wiping a remote device. US patent 8,056,143 (accessed 2011 November 8).
-
BlackBerry Ltd, assignee. Selectively wiping a remote device
-
-
Brown, M.K.1
Brown, M.S.2
Little, H.A.3
Totzke, S.W.4
-
50
-
-
84864986673
-
-
Wired,, (accessed October 7, 2015
-
Zetter K. Palin E-mail hacker says it was easy. Wired, 2008. http://www.wired.com/2008/09/palin-e-mail-ha/ (accessed October 7, 2015).
-
(2008)
Palin E-mail hacker says it was easy
-
-
Zetter, K.1
-
51
-
-
84984917478
-
Remotely wiping sensitive data on stolen smartphones
-
; 2014 June 4–6; Kyoto, Japan., New York, NY, A
-
Yu X, Wang Z, Sun K, Zhu WT, Gao N, Jing J. Remotely wiping sensitive data on stolen smartphones. In: Proceedings of the Ninth ACM Symposium on Information, Computer and Communications Security; 2014 June 4–6; Kyoto, Japan. New York, NY: ACM, 2014;537–42.
-
(2014)
In Proceedings of the Ninth ACM Symposium on Information, Computer and Communications Security
, pp. 537-542
-
-
Yu, X.1
Wang, Z.2
Sun, K.3
Zhu, W.T.4
Gao, N.5
Jing, J.6
-
55
-
-
79952918800
-
Smartphone remote lock and wipe system with integrity checking of SMS notification
-
; 2011 January 9–12; Las Vegas, NV., Piscataway, NJ, IE
-
Park K, Ma GI, Yi JH, Cho Y, Cho S, Park S. Smartphone remote lock and wipe system with integrity checking of SMS notification. In: Proceedings of International Conference on Consumer Electronics; 2011 January 9–12; Las Vegas, NV. Piscataway, NJ: IEEE, 2014;263–4.
-
(2014)
In Proceedings of International Conference on Consumer Electronics
, pp. 263-264
-
-
Park, K.1
Ma, G.I.2
Yi, J.H.3
Cho, Y.4
Cho, S.5
Park, S.6
-
56
-
-
84929409759
-
A model for remote access and protection of smartphones using short message service
-
Kuppusamy KS, Senthilraja R, Aghila G. A model for remote access and protection of smartphones using short message service. Int J Comput Sci En Inf Technol 2012;2(1):91–100.
-
(2012)
Int J Comput Sci En Inf Technol
, vol.2
, Issue.1
, pp. 91-100
-
-
Kuppusamy, K.S.1
Senthilraja, R.2
Aghila, G.3
-
57
-
-
84874837538
-
Smart-phone attacks and defences
-
; 2004 November 15–16; San Diego, CA., New York, NY, A
-
Guo C, Wang HJ, Zhu W. Smart-phone attacks and defences. In: Proceedings of Third Workshop on Hot Topics in Networks; 2004 November 15–16; San Diego, CA. New York, NY: ACM, 2004;235–45.
-
(2004)
In Proceedings of Third Workshop on Hot Topics in Networks
, pp. 235-245
-
-
Guo, C.1
Wang, H.J.2
Zhu, W.3
-
58
-
-
84995574854
-
-
Remote disablement of a communication device. US 375,422. (accessed 2013 February 12
-
Sennett DWA, Daly BK, Inventors. AT&T Mobility II LLC, assignee. Remote disablement of a communication device. US patent 8,375,422. (accessed 2013 February 12).
-
AT&T Mobility II LLC, assignee
-
-
Sennett, D.W.A.1
Daly, B.K.2
-
60
-
-
84981526422
-
-
(accessed October 7, 2015
-
Apple. iOS security, 2015. https://www.apple.com/business/docs/iOS_Security_Guide.pdf (accessed October 7, 2015).
-
(2015)
iOS security
-
-
-
61
-
-
84995650695
-
-
(accessed October 7, 2015
-
BlackBerry. Security technical overview of BES10 cloud solution, 2014a. https://www.blackberry.com/blackberrytraining/web/KryptonDocs/resources/BES10_Cloud_Market_Preview_Security_Technical_Overview_en.pdf (accessed October 7, 2015).
-
(2014)
Security technical overview of BES10 cloud solution
-
-
-
62
-
-
84889009370
-
-
(accessed October 7, 2015
-
BlackBerry. Blackberry enterprise solution 5.0.2: Security technical overview, 2011. http://docs.blackberry.com/en/admin/deliverables/38816/BlackBerry_Enterprise_Server_5.0_SP3_and_BlackBerry_7.1-Security_Technical_Overview-1936256-0117012254-001-5.0.3-US.pdf (accessed October 7, 2015).
-
(2011)
Blackberry enterprise solution 5.0.2: Security technical overview
-
-
-
64
-
-
80053418215
-
Design of remote control system for data protection and backup in mobile devices
-
; 2011 August 16–18; Busan, South Korea., Piscataway, NJ, IE
-
Joe I, Lee Y. Design of remote control system for data protection and backup in mobile devices. In: Proceedings of International Conference on Interaction Sciences; 2011 August 16–18; Busan, South Korea. Piscataway, NJ: IEEE, 2011;189–93.
-
(2011)
In Proceedings of International Conference on Interaction Sciences
, pp. 189-193
-
-
Joe, I.1
Lee, Y.2
-
65
-
-
84910643420
-
Mayhem in the push clouds: understanding and mitigating security hazards in mobile push-messaging services
-
; 2014 November 3–7; Scottsdale, AZ., New York, NY, A
-
Li T, Zhou X, Xing L, Lee Y, Naveed M, Wang X, et al. Mayhem in the push clouds: understanding and mitigating security hazards in mobile push-messaging services. In: Proceedings of Conference on Computer and Communications Security; 2014 November 3–7; Scottsdale, AZ. New York, NY: ACM, 2014a;978–89.
-
(2014)
In Proceedings of Conference on Computer and Communications Security
, pp. 978-989
-
-
Li, T.1
Zhou, X.2
Xing, L.3
Lee, Y.4
Naveed, M.5
Wang, X.6
-
69
-
-
84995549106
-
-
(accessed October 7, 2015
-
BlackBerry. BlackBerry device service advanced administration guide (v10.2), 2014c. http://docs.blackberry.com/en/admin/deliverables/59623/BES10_v10.2_BDS_Advanced_Admin_Guide_en.pdf (accessed October 7, 2015).
-
(2014)
BlackBerry device service advanced administration guide (v10.2)
-
-
-
70
-
-
84995658393
-
-
(accessed October 7, 2015
-
BlackBerry. BlackBerry protect user guide (v1.2.1), 2015. http://docs.blackberry.com/en/smartphone_users/deliverables/49400/BlackBerry_Protect-User_Guide-1343391475156-1.2.1-en.pdf (accessed October 7, 2015).
-
(2015)
BlackBerry protect user guide (v1.2.1)
-
-
-
71
-
-
84995666596
-
-
(accessed October 7, 2015
-
Apple n.d.b. About configuration profile. https://help.apple.com/configurator/mac/1.6/#/cadbf9e668 (accessed October 7, 2015).
-
About configuration profile
-
-
-
72
-
-
84995647671
-
-
(accessed October 7, 2015
-
ManageEngine n.d. MDM architecture. http://www.manageengine.com/products/desktop-central/mobile-device-management-mdm-architecture.html (accessed October 7, 2015).
-
ManageEngine n.d. MDM architecture
-
-
-
73
-
-
84939447921
-
-
(accessed October 7, 2015
-
Apple n.d.a. iPhone in business: manage devices. https://www.apple.com/iphone/business/it/management.html (accessed October 7, 2015).
-
iPhone in business: manage devices
-
-
-
74
-
-
84995614145
-
-
(accessed October 7, 2015
-
Microsoft. Exchange ActiveSync, 2013. http://technet.microsoft.com/en-US/library/aa998357%28v=exchg.150%29.aspx (accessed October 7, 2015).
-
(2013)
Exchange ActiveSync
-
-
-
75
-
-
84995585321
-
-
(accessed October 7, 2015
-
Microsoft. Windows Phone 8.1 security overview, 2014. http://www.microsoft.com/en-us/download/details.aspx?id=42509&751be11f-ede8-5a0c-058c-2ee190a24fa6=True (accessed October 7, 2015).
-
(2014)
Windows Phone 8.1 security overview
-
-
-
76
-
-
84917706267
-
Exchanging demands: weaknesses in SSL implementations for mobile platforms
-
; 2013 December 2–4; Perth, Australia., Perth, Australia, Edith Cowan Universi
-
Hannay P, Carpene C, Valli C, Woodward A, Johnstone M. Exchanging demands: weaknesses in SSL implementations for mobile platforms. In: Proceedings of the Eleventh Australian Information Security Management Conference; 2013 December 2–4; Perth, Australia. Perth, Australia: Edith Cowan University, 2013;42–8.
-
(2013)
In Proceedings of the Eleventh Australian Information Security Management Conference
, pp. 42-48
-
-
Hannay, P.1
Carpene, C.2
Valli, C.3
Woodward, A.4
Johnstone, M.5
-
77
-
-
84906824797
-
A study of SSL proxy attacks on android and iOS mobile applications
-
; 2014 January 10–13; Las Vegas, NV., Piscataway, NJ, IE
-
Hubbard J, Weimer K, Chen Y. A study of SSL proxy attacks on android and iOS mobile applications. In: Proceedings of the Eleventh Consumer Communications and Networking Conference; 2014 January 10–13; Las Vegas, NV. Piscataway, NJ: IEEE, 2014;86–91.
-
(2014)
In Proceedings of the Eleventh Consumer Communications and Networking Conference
, pp. 86-91
-
-
Hubbard, J.1
Weimer, K.2
Chen, Y.3
-
78
-
-
84869487159
-
Why eve and mallory love android: An analysis of android SSL (in)security
-
; 2012 October 16–18; Raleigh, NC., New York, NY, A
-
Fahl S, Harbach M, Muders T, Baumgärtner L, Freisleben B, Smith M. Why eve and mallory love android: An analysis of android SSL (in)security. In: Proceedings of the Conference on Computer and Communications Security; 2012 October 16–18; Raleigh, NC. New York, NY: ACM, 2012;50–61.
-
(2012)
In Proceedings of the Conference on Computer and Communications Security
, pp. 50-61
-
-
Fahl, S.1
Harbach, M.2
Muders, T.3
Baumgärtner, L.4
Freisleben, B.5
Smith, M.6
-
79
-
-
84869429339
-
The most dangerous code in the world: validating SSL certificates in non-browser software
-
; 2012 October 16–18; Raleigh, NC., New York, NY, A
-
Georgiev M, Iyengar S, Jana S, Anubhai R, Boneh D, Shmatikov V. The most dangerous code in the world: validating SSL certificates in non-browser software. In: Proceedings of the Conference on Computer and Communications Security; 2012 October 16–18; Raleigh, NC. New York, NY: ACM, 2012;38–49.
-
(2012)
In Proceedings of the Conference on Computer and Communications Security
, pp. 38-49
-
-
Georgiev, M.1
Iyengar, S.2
Jana, S.3
Anubhai, R.4
Boneh, D.5
Shmatikov, V.6
-
81
-
-
84995555259
-
-
(accessed October 7, 2015
-
Li T, Zhou X, Xing L, Lee Y, Naveed M, Wang X, et al. Supplement materials for mayhem in the push clouds paper, 2014b. https://sites.google.com/site/cloudmsging/ (accessed October 7, 2015).
-
(2014)
Supplement materials for mayhem in the push clouds paper
-
-
Li, T.1
Zhou, X.2
Xing, L.3
Lee, Y.4
Naveed, M.5
Wang, X.6
-
83
-
-
84995615487
-
-
CNN,, (accessed October 7, 2015
-
Pagliery J. Hackers can ‘un-brick’ stolen iPhones, CNN, 2014. http://money.cnn.com/2014/05/21/technology/security/icloud-hack/ (accessed October 7, 2015).
-
(2014)
Hackers can ‘un-brick’ stolen iPhones
-
-
Pagliery, J.1
-
84
-
-
84995666613
-
-
(accessed October 7, 2015
-
OWASP. Cross-site request forgery (CSRF), 2014. https://www.owasp.org/index.php/Cross-Site_Request_Forgery_%28CSRF%29 (accessed October 7, 2015).
-
(2014)
Cross-site request forgery (CSRF)
-
-
-
85
-
-
84995558256
-
-
(accessed October 7, 2015
-
US-CERT. CVE-2014-8346, National Vulnerability Database, 2014. http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-8346 (accessed October 7, 2015).
-
(2014)
CVE-2014-8346, National Vulnerability Database
-
-
-
86
-
-
84995650405
-
-
Hard,, (accessed October 7, 2015
-
Honan M. Yes, I was hacked. Hard, 2012b. http://www.emptyage.com/post/28679875595/yes-i-was-hacked-hard (accessed October 7, 2015).
-
(2012)
Yes, I was hacked
-
-
Honan, M.1
-
87
-
-
84889070591
-
-
(accessed October 7, 2015
-
OWASP. OWASP top 10, 2013. https://www.owasp.org/index.php/Top10 (accessed October 7, 2015).
-
(2013)
OWASP top 10
-
-
-
90
-
-
84966882723
-
-
(accessed October 12, 2015
-
The Guardian. Recycled mobile phones retain previous owner data, 2013. http://web.archive.org/web/20140529182505/http://www.theguardian.com/media-network/partner-zone-infosecurity/mobile-phones-previous-owner-data (accessed October 12, 2015).
-
(2013)
Recycled mobile phones retain previous owner data
-
-
-
92
-
-
84995585307
-
Effects of the factory reset on mobile devices
-
Schwamm R, Rowe NC. Effects of the factory reset on mobile devices. J Digit Forensics Secur Law 2014;9(2):205–20.
-
(2014)
J Digit Forensics Secur Law
, vol.9
, Issue.2
, pp. 205-220
-
-
Schwamm, R.1
Rowe, N.C.2
-
94
-
-
85034617851
-
Security analysis of Android factory resets
-
; 2015 May 21; San Jose, CA., Piscataway, NJ, IEEE, (accessed October 12, 2015
-
Simon L, Anderson R. Security analysis of Android factory resets. In: Proceedings of the Mobile Security Technologies Workshop; 2015 May 21; San Jose, CA. Piscataway, NJ: IEEE, 2015a;1–10. http://ieee-security.org/TC/SPW2015/MoST/papers/s1p3.pdf (accessed October 12, 2015).
-
(2015)
In Proceedings of the Mobile Security Technologies Workshop
, pp. 1-10
-
-
Simon, L.1
Anderson, R.2
-
97
-
-
84893904253
-
A survey of address translation technologies for flash memories
-
Ma D, Feng J, Li G. A survey of address translation technologies for flash memories. ACM Comput Surv 2014;46(3):1–39.
-
(2014)
ACM Comput Surv
, vol.46
, Issue.3
, pp. 1-39
-
-
Ma, D.1
Feng, J.2
Li, G.3
-
98
-
-
85030690084
-
On implementing deniable storage encryption for mobile devices
-
; 2013 February 24–27; San Diego, CA., Reston, VA, Internet Socie
-
Skillen A, Mannan M. On implementing deniable storage encryption for mobile devices. In: Proceedings of the Twentieth Annual Network and Distributed System Security Symposium; 2013 February 24–27; San Diego, CA. Reston, VA: Internet Society, 2013;1–17.
-
(2013)
In Proceedings of the Twentieth Annual Network and Distributed System Security Symposium
, pp. 1-17
-
-
Skillen, A.1
Mannan, M.2
-
99
-
-
85073529809
-
Data node encrypted file system: efficient secure deletion for flash memory
-
; 2013 August 14–16; Washington, D.C., Berkeley, CA, USENIX Associati
-
Reardon J, Capkun S, Basin D. Data node encrypted file system: efficient secure deletion for flash memory. In: Proceedings of the Twenty Second USENIX Security Symposium; 2013 August 14–16; Washington, D.C. Berkeley, CA: USENIX Association, 2013b;333–48.
-
(2013)
In Proceedings of the Twenty Second USENIX Security Symposium
, pp. 333-348
-
-
Reardon, J.1
Capkun, S.2
Basin, D.3
-
100
-
-
38049024525
-
A page padding method for fragmented flash storage
-
In, Gervasi O, Gavrilova ML, editors., Heidelberg, Germany, Springer, 47
-
Kim H, Kim J, Choi S, Jung H, Jung J. A page padding method for fragmented flash storage. In: Gervasi O, Gavrilova ML, editors. Lecture notes in computer science. Heidelberg, Germany: Springer, 2007;4705:164–77.
-
(2007)
Lecture notes in computer science
, pp. 164-177
-
-
Kim, H.1
Kim, J.2
Choi, S.3
Jung, H.4
Jung, J.5
-
101
-
-
80053341347
-
ShiftFlash: make flash-based storage more resilient and robust
-
Huang P, Zhou K, Wu C. ShiftFlash: make flash-based storage more resilient and robust. Perform Eval 2011;68(11):1193–206.
-
(2011)
Perform Eval
, vol.68
, Issue.11
, pp. 1193-1206
-
-
Huang, P.1
Zhou, K.2
Wu, C.3
-
102
-
-
0004610703
-
Secure deletion of data from magnetic and solid-state memory
-
; 1996 July 22–25; San Jose, CA., Berkeley, CA, USENIX Associati
-
Gutmann P. Secure deletion of data from magnetic and solid-state memory. In: Proceedings of the Sixth USENIX Security Symposium; 1996 July 22–25; San Jose, CA. Berkeley, CA: USENIX Association, 1996;1–18.
-
(1996)
In Proceedings of the Sixth USENIX Security Symposium
, pp. 1-18
-
-
Gutmann, P.1
-
103
-
-
85021672500
-
Reliably erasing data from flash-based solid state drives
-
; 2011 February 15–17, San Jose, CA., Berkeley, CA, USENIX Associati
-
Wei MYC, Grupp LM, Spada FE, Swanson S. Reliably erasing data from flash-based solid state drives. In: Proceedings of the Ninth USENIX Conference on File and Storage Technologies; 2011 February 15–17, San Jose, CA. Berkeley, CA: USENIX Association, 2011;8–20.
-
(2011)
In Proceedings of the Ninth USENIX Conference on File and Storage Technologies
, pp. 8-20
-
-
Wei, M.Y.C.1
Grupp, L.M.2
Spada, F.E.3
Swanson, S.4
-
104
-
-
3042825662
-
Remembrance of data passed: a study of disk sanitization practices
-
Garfinkel SL, Shelat A. Remembrance of data passed: a study of disk sanitization practices. IEEE Secur Priv 2003;1(1):17–27.
-
(2003)
IEEE Secur Priv
, vol.1
, Issue.1
, pp. 17-27
-
-
Garfinkel, S.L.1
Shelat, A.2
-
106
-
-
84995614187
-
-
(accessed October 12, 2015
-
Cornell University. Disk and file erasure, best practices for media destruction, 2012. http://www.it.cornell.edu/security/depth/practices/media_destruct.cfm#erasure (accessed October 12, 2015).
-
(2012)
Disk and file erasure, best practices for media destruction
-
-
-
107
-
-
78651527509
-
-
NIST Special Publication 800-88,, (accessed October 12, 2015
-
Kissel R, Regenscheid A, Scholl M, Stine K. Guidelines for media sanitization, NIST Special Publication 800-88, 2014. http://dx.doi.org/10.6028/NIST.SP.800-88r1 (accessed October 12, 2015).
-
(2014)
Guidelines for media sanitization
-
-
Kissel, R.1
Regenscheid, A.2
Scholl, M.3
Stine, K.4
-
108
-
-
84995615531
-
-
(accessed October 12, 2015
-
Australian Signals Directorate. 2015 Australian Government Information Security Manual, 2015. http://www.asd.gov.au/publications/Information_Security_Manual_2015_Controls.pdf (accessed October 12, 2015).
-
(2015)
2015 Australian Government Information Security Manual
-
-
-
109
-
-
34547403849
-
Secure deletion myths, issues, and solutions
-
; 2006 October 31–November 2; Alexandria, VA., New York, NY, A
-
Joukov N, Papaxenopoulos H, Zadok E. Secure deletion myths, issues, and solutions. In: Proceedings of the Second Workshop on Storage Security and Survivability; 2006 October 31–November 2; Alexandria, VA. New York, NY: ACM, 2006;61–6.
-
(2006)
In Proceedings of the Second Workshop on Storage Security and Survivability
, pp. 61-66
-
-
Joukov, N.1
Papaxenopoulos, H.2
Zadok, E.3
-
110
-
-
58449089219
-
Overwriting hard drive data: the great wiping controversy
-
In, Sekar R, Pujari AK, editors., Heidelberg, Germany, Springer, 53
-
Wright C, Kleiman D, Sundhar S. Overwriting hard drive data: the great wiping controversy. In: Sekar R, Pujari AK, editors. Lecture notes in computer science. Heidelberg, Germany: Springer, 2008;5352:243–57.
-
(2008)
Lecture notes in computer science
, pp. 243-257
-
-
Wright, C.1
Kleiman, D.2
Sundhar, S.3
-
111
-
-
84995604870
-
-
(accessed October 12, 2015
-
Gutmann P. Secure deletion of data from magnetic and solid-state memory, Department of Computer Science, University of Auckland, New Zealand, 2003. https://www.cs.auckland.ac.nz/~pgut001/pubs/secure_del.html (accessed October 12, 2015).
-
(2003)
Secure deletion of data from magnetic and solid-state memory, Department of Computer Science, University of Auckland, New Zealand
-
-
Gutmann, P.1
-
112
-
-
84874255976
-
Towards secure deletion on smartphones
-
, schutz und zuverlässigkeit”; 2010 October 5–7; Berlin, Germany., Bonn, Germany, Gesellschaft für Informatik e.V. (G
-
Spreitzenbarth M, Holz T. Towards secure deletion on smartphones. In: Proceedings of the Fifth Conference of the GI Special Interest Group “Sicherheit, schutz und zuverlässigkeit”; 2010 October 5–7; Berlin, Germany. Bonn, Germany: Gesellschaft für Informatik e.V. (GI), 2010;165–76.
-
(2010)
In Proceedings of the Fifth Conference of the GI Special Interest Group “Sicherheit
, pp. 165-176
-
-
Spreitzenbarth, M.1
Holz, T.2
-
113
-
-
84864762417
-
Secure file delete in NAND-based storage
-
Shin I. Secure file delete in NAND-based storage. Int J Secur Appl 2012;6(2):257–60.
-
(2012)
Int J Secur Appl
, vol.6
, Issue.2
, pp. 257-260
-
-
Shin, I.1
-
114
-
-
84899720746
-
Password-based single-file encryption and secure data deletion for solid-state drive
-
; 2014 January 9–11; Siem Reap, Cambodia., New York, NY, A
-
Choi Y, Lee D, Jeon W, Won D. Password-based single-file encryption and secure data deletion for solid-state drive. In: Proceedings of the Eighth International Conference on Ubiquitous Information Management and Communication; 2014 January 9–11; Siem Reap, Cambodia. New York, NY: ACM, 2014;1–7.
-
(2014)
In Proceedings of the Eighth International Conference on Ubiquitous Information Management and Communication
, pp. 1-7
-
-
Choi, Y.1
Lee, D.2
Jeon, W.3
Won, D.4
-
115
-
-
84907246293
-
SmSD: a smart secure deletion scheme for SSDs
-
Qin Y, Tong W, Liu J, Zhu Z. SmSD: a smart secure deletion scheme for SSDs. J Converg 2013;4(4):30–5.
-
(2013)
J Converg
, vol.4
, Issue.4
, pp. 30-35
-
-
Qin, Y.1
Tong, W.2
Liu, J.3
Zhu, Z.4
-
116
-
-
80052240214
-
SDC: secure deletion classification
-
; 2011 June 3–5; Chennai, India., Piscataway, NJ, IE
-
Gupta A, Singhal M, Gangil A, Mishra A. SDC: secure deletion classification. In: Proceedings of the International Conference on Recent Trends in Information Technology; 2011 June 3–5; Chennai, India. Piscataway, NJ: IEEE, 2011;1303–7.
-
(2011)
In Proceedings of the International Conference on Recent Trends in Information Technology
, pp. 1303-1307
-
-
Gupta, A.1
Singhal, M.2
Gangil, A.3
Mishra, A.4
-
117
-
-
84871976328
-
User-level secure deletion on log-structured file systems
-
; 2012 May 1–3; Seoul, South Korea., New York, NY, A
-
Reardon J, Marforio C, Capkun S, Basin D. User-level secure deletion on log-structured file systems. In: Proceedings of the Seventh Symposium on Information, Computer and Communications Security; 2012 May 1–3; Seoul, South Korea. New York, NY: ACM, 2012;63–73.
-
(2012)
In Proceedings of the Seventh Symposium on Information, Computer and Communications Security
, pp. 63-73
-
-
Reardon, J.1
Marforio, C.2
Capkun, S.3
Basin, D.4
-
118
-
-
84884211311
-
A novel anti-forensics technique for the android OS
-
In, 2011 October 26–28; Barcelona, Spain., Piscataway, NJ, IE
-
Albano P, Castiglione A, Cattaneo G, De Santis A. A novel anti-forensics technique for the android OS. In: Proceedings of the Sixth International Conference on Broadband and Wireless Computing, Communication and Applications; 2011 October 26–28; Barcelona, Spain. Piscataway, NJ: IEEE, 2011;380–5.
-
(2011)
Proceedings of the Sixth International Conference on Broadband and Wireless Computing, Communication and Applications
, pp. 380-385
-
-
Albano, P.1
Castiglione, A.2
Cattaneo, G.3
De Santis, A.4
-
119
-
-
84890839723
-
Security steps for smartphone users
-
; 2013 August 14–16; Johannesburg, South Africa., Piscataway, NJ, IE
-
Pieterse H, Olivier MS. Security steps for smartphone users. In: Proceedings of the Twelfth International Information Security for South Africa Conference; 2013 August 14–16; Johannesburg, South Africa. Piscataway, NJ: IEEE, 2013;1–6.
-
(2013)
In Proceedings of the Twelfth International Information Security for South Africa Conference
, pp. 1-6
-
-
Pieterse, H.1
Olivier, M.S.2
-
120
-
-
84903767570
-
Cost effective data wiping methods for mobile phone
-
Kang S, Park K, Kim J. Cost effective data wiping methods for mobile phone. Multimed Tools Appl 2013;71(2):643–55.
-
(2013)
Multimed Tools Appl
, vol.71
, Issue.2
, pp. 643-655
-
-
Kang, S.1
Park, K.2
Kim, J.3
-
122
-
-
84995615496
-
IronKey Inc, assignee
-
. US 2007/0300031 (accessed 2007 December 27
-
Jevans D, Ficcaglia R, Spencer G, Ryan S, Inventors. IronKey Inc, assignee. Memory data shredder. US patent application 2007/0300031 (accessed 2007 December 27).
-
Memory data shredder
-
-
Jevans, D.1
Ficcaglia, R.2
Spencer, G.3
Ryan, S.4
-
123
-
-
84995585322
-
-
Secure erase system for a solid state non-volatile memory device. US 2012/0079289 (accessed 2012 March 29
-
Weng WK, Wu HH, Inventors. Skymedi Corp, assignee. Secure erase system for a solid state non-volatile memory device. US patent application 2012/0079289 (accessed 2012 March 29).
-
Skymedi Corp, assignee
-
-
Weng, W.K.1
Wu, H.H.2
-
124
-
-
77249114232
-
An efficient secure deletion scheme for flash file systems
-
Lee J, Yi S, Heo J, Park H, Shin SY, Cho Y. An efficient secure deletion scheme for flash file systems. J Inf Sci Eng 2010;26(1):27–38.
-
(2010)
J Inf Sci Eng
, vol.26
, Issue.1
, pp. 27-38
-
-
Lee, J.1
Yi, S.2
Heo, J.3
Park, H.4
Shin, S.Y.5
Cho, Y.6
-
125
-
-
84995615503
-
Electronics and Telecommunications Research Institute, assignee
-
. US 117,377. 201
-
Park S, Kim J, Jung Y, Lim D, Seo Y, Cho Y, et al. Electronics and Telecommunications Research Institute, assignee. Flash memory device having secure file deletion function and method for securely deleting flash file. US patent 8,117,377. 2012.
-
Flash memory device having secure file deletion function and method for securely deleting flash file
-
-
Park, S.1
Kim, J.2
Jung, Y.3
Lim, D.4
Seo, Y.5
Cho, Y.6
-
126
-
-
79958121705
-
Secure data deletion for USB flash memory
-
Lee B, Son K, Won D, Kim S. Secure data deletion for USB flash memory. J Inform Sci Eng 2011;27(3):933–52.
-
(2011)
J Inform Sci Eng
, vol.27
, Issue.3
, pp. 933-952
-
-
Lee, B.1
Son, K.2
Won, D.3
Kim, S.4
-
127
-
-
84995555862
-
-
Implementing secure erase for solid state drives. US 250,3
-
Guyot C, Bandic ZZ, Cassuto Y, Espeseth AM, Sanvido M, Inventors. HGST Netherlands BV, assignee. Implementing secure erase for solid state drives. US patent 8,250,380, 2012.
-
(2012)
HGST Netherlands BV, assignee
-
-
Guyot, C.1
Bandic, Z.Z.2
Cassuto, Y.3
Espeseth, A.M.4
Sanvido, M.5
-
128
-
-
41749084645
-
Models and design of an adaptive hybrid scheme for secure deletion of data in consumer electronics
-
Sun K, Choi J, Lee D, Noh SH. Models and design of an adaptive hybrid scheme for secure deletion of data in consumer electronics. IEEE Trans Consumer Electron 2008;54(1):100–4.
-
(2008)
IEEE Trans Consumer Electron
, vol.54
, Issue.1
, pp. 100-104
-
-
Sun, K.1
Choi, J.2
Lee, D.3
Noh, S.H.4
-
130
-
-
84903150675
-
The TrueCrypt on-disk format-an independent view
-
Brož M, Matyáš V. The TrueCrypt on-disk format-an independent view. IEEE Secur Priv 2014;12(3):74–7.
-
(2014)
IEEE Secur Priv
, vol.12
, Issue.3
, pp. 74-77
-
-
Brož, M.1
Matyáš, V.2
-
131
-
-
66149173689
-
Lest we remember: cold-boot attacks on encryption keys
-
Halderman JA, Schoen SD, Heninger N, Clarkson W, Paul W, Calandrino JA, et al. Lest we remember: cold-boot attacks on encryption keys. Commun ACM 2009;52(5):91–8.
-
(2009)
Commun ACM
, vol.52
, Issue.5
, pp. 91-98
-
-
Halderman, J.A.1
Schoen, S.D.2
Heninger, N.3
Clarkson, W.4
Paul, W.5
Calandrino, J.A.6
-
132
-
-
84879863003
-
FROST: Forensic Recovery of Scrambled Telephones
-
; 2013 June 25–28; Alberta, Canada., Piscataway, NJ, IE
-
Müller T, Spreitzenbarth M. FROST: Forensic Recovery of Scrambled Telephones. In: Proceedings of the Eleventh International Conference on Applied Cryptography and Network Security; 2013 June 25–28; Alberta, Canada. Piscataway, NJ: IEEE, 2013;373–88.
-
(2013)
In Proceedings of the Eleventh International Conference on Applied Cryptography and Network Security
, pp. 373-388
-
-
Müller, T.1
Spreitzenbarth, M.2
-
133
-
-
84995555269
-
-
(accessed October 12, 2015
-
AMD. RAIDXpert user manual, 2010. http://www2.ati.com/relnotes/AMD_RAIDXpert_User_v2.1.pdf (accessed October 12, 2015).
-
(2010)
RAIDXpert user manual
-
-
-
134
-
-
84995604857
-
-
(accessed October 7, 2015
-
® RST), 2014. http://www.intel.com/support/chipsets/imsm/sb/CS-009337.htm (accessed October 7, 2015).
-
(2014)
® RST)
-
-
-
136
-
-
84872117044
-
TrueErase: per-file secure deletion for the storage data path
-
; 2012 December 3–7; Orlando, FL., New York, NY, A
-
Diesburg SM, Meyers C, Stanovich M, Mitchell M, Marshall J, Gould J, et al. TrueErase: per-file secure deletion for the storage data path. In: Proceedings of the Twenty Eighth Annual Computer Security Applications Conference; 2012 December 3–7; Orlando, FL. New York, NY: ACM, 2012;439–48.
-
(2012)
In Proceedings of the Twenty Eighth Annual Computer Security Applications Conference
, pp. 439-448
-
-
Diesburg, S.M.1
Meyers, C.2
Stanovich, M.3
Mitchell, M.4
Marshall, J.5
Gould, J.6
-
137
-
-
84941204024
-
Black-box forensic and antiforensic characteristics of solid-state drives
-
Bonetti G, Viglione M, Frossi A, Maggi F, Zanero S. Black-box forensic and antiforensic characteristics of solid-state drives. J Comput Virol Hacking Tech 2014;10(4):255–71.
-
(2014)
J Comput Virol Hacking Tech
, vol.10
, Issue.4
, pp. 255-271
-
-
Bonetti, G.1
Viglione, M.2
Frossi, A.3
Maggi, F.4
Zanero, S.5
-
139
-
-
84995687109
-
SanDisk IL Ltd, assignee
-
. US 089,350. 200
-
Koren R, Leibinger E, Wiesz N, Zilberman E, Tzur O, Aharonoff S, et al. SanDisk IL Ltd, assignee. Methods of sanitizing a flash-based data storage device. US patent 7,089,350. 2006.
-
Methods of sanitizing a flash-based data storage device
-
-
Koren, R.1
Leibinger, E.2
Wiesz, N.3
Zilberman, E.4
Tzur, O.5
Aharonoff, S.6
-
142
-
-
84995698947
-
-
(accessed October 7, 2015
-
Google n.d. Implementing security. https://source.android.com/devices/tech/security/implement.html (accessed October 7, 2015).
-
Implementing security
-
-
-
143
-
-
84967194749
-
Forensic collection and analysis of thumbnails in Android
-
; 2015 August 20–22; Helsinki, Finland., Piscataway, NJ, IE
-
Leom MD, D'Orazio CJ, Deegan G, Choo KKR. Forensic collection and analysis of thumbnails in Android. In: Proceedings of the Fifth International Symposium on Trust and Security in Cloud Computing; 2015 August 20–22; Helsinki, Finland. Piscataway, NJ: IEEE, 2015;1059–66.
-
(2015)
In Proceedings of the Fifth International Symposium on Trust and Security in Cloud Computing
, pp. 1059-1066
-
-
Leom, M.D.1
D'Orazio, C.J.2
Deegan, G.3
Choo, K.K.R.4
-
144
-
-
79951931878
-
Beyond the datasheet: using test beds to probe non-volatile memories’ dark secrets
-
; 2010 December 6–10 Miami, FL., Piscataway, NJ, IE
-
Grupp LM, Caulfield AM, Coburn J, Davis JD, Swanson S. Beyond the datasheet: using test beds to probe non-volatile memories’ dark secrets. In: Proceedings of the IEEE Globecom 2010 Workshop on Application of Communication Theory to Emerging Memory Technologies; 2010 December 6–10 Miami, FL. Piscataway, NJ: IEEE, 2010;1930–5.
-
(2010)
In Proceedings of the IEEE Globecom 2010 Workshop on Application of Communication Theory to Emerging Memory Technologies
, pp. 1930-1935
-
-
Grupp, L.M.1
Caulfield, A.M.2
Coburn, J.3
Davis, J.D.4
Swanson, S.5
-
145
-
-
84997309669
-
Getting real: lessons in transitioning research simulations into hardware systems
-
; 2013 February 12–15; San Jose, CA., Berkeley, CA, USENIX Associati
-
Saxena M, Zhang Y, Swift MM, Arpaci-Dusseau AC, Arpaci-Dusseau RH. Getting real: lessons in transitioning research simulations into hardware systems. In: Proceedings of the Eleventh USENIX Conference on File and Storage Technologies; 2013 February 12–15; San Jose, CA. Berkeley, CA: USENIX Association, 2013;215–28.
-
(2013)
In Proceedings of the Eleventh USENIX Conference on File and Storage Technologies
, pp. 215-228
-
-
Saxena, M.1
Zhang, Y.2
Swift, M.M.3
Arpaci-Dusseau, A.C.4
Arpaci-Dusseau, R.H.5
-
146
-
-
84995650433
-
Survey on security in cloud using homographic and disk encryption methods
-
Reddy VK, Rao JE. Survey on security in cloud using homographic and disk encryption methods. Int J Chem Eng Appl 2014;2(4):107–12.
-
(2014)
Int J Chem Eng Appl
, vol.2
, Issue.4
, pp. 107-112
-
-
Reddy, V.K.1
Rao, J.E.2
-
149
-
-
85037846870
-
Self-encrypting disks pose self-decrypting risks
-
; 2012 December 27–30; Hamburg, Germany., Hamburg, Germany, Chaos Computer Cl
-
Müller T, Latzo T, Freiling FC. Self-encrypting disks pose self-decrypting risks. In: Proceedings of the Twenty Ninth Chaos Communication Congress; 2012 December 27–30; Hamburg, Germany. Hamburg, Germany: Chaos Computer Club, 2012;1–10.
-
(2012)
In Proceedings of the Twenty Ninth Chaos Communication Congress
, pp. 1-10
-
-
Müller, T.1
Latzo, T.2
Freiling, F.C.3
-
150
-
-
84995604096
-
-
revision 1.0 ed,, (accessed October 7, 2015
-
Trusted Computing Group. TCG storage security subsystem class (SSC): Opal, specification version 2.00, revision 1.0 ed, 2012; http://www.trustedcomputinggroup.org/resources/storage_work_group_storage_security_subsystem_class_opal (accessed October 7, 2015).
-
(2012)
TCG storage security subsystem class (SSC): Opal, specification version 2.00
-
-
-
151
-
-
84995604920
-
-
(accessed October 7, 2015
-
Microsoft. Encrypted hard drive, TechNet Library, 2012. http://technet.microsoft.com/en-us/library/hh831627.aspx (accessed October 7, 2015).
-
(2012)
Encrypted hard drive, TechNet Library
-
-
-
152
-
-
34247595373
-
Authentication in transient storage device attachments
-
Rich D. Authentication in transient storage device attachments. Comput 2007;40(4):102–4.
-
(2007)
Comput
, vol.40
, Issue.4
, pp. 102-104
-
-
Rich, D.1
-
153
-
-
84995687253
-
-
(accessed October 7, 2015
-
® solid-state drive pro 1500 series (M.2), Product Specification, 2013. http://www.intel.com/content/dam/www/public/us/en/documents/product-specifications/ssd-pro-1500-series-m2-specification.pdf (accessed October 7, 2015).
-
(2013)
® solid-state drive pro 1500 series (M.2), Product Specification
-
-
-
163
-
-
80053162331
-
FRP: a nonvolatile memory research platform targeting NAND flash
-
; 2009 March 7–11; Washington, D.C., New York, NY, A
-
Davis JD, Zhang L. FRP: a nonvolatile memory research platform targeting NAND flash. In: Proceedings of the First Workshop on Integrating Solid-state Memory into the Storage Hierarchy; 2009 March 7–11; Washington, D.C. New York, NY: ACM, 2009;1–8.
-
(2009)
In Proceedings of the First Workshop on Integrating Solid-state Memory into the Storage Hierarchy
, pp. 1-8
-
-
Davis, J.D.1
Zhang, L.2
-
164
-
-
79951693063
-
BlueSSD: an open platform for cross-layer experiments for NAND flash-based SSDs
-
; 2015 June 19–23; Saint-Malo, France., New York, NY, ACM, (accessed October 12, 2015
-
Lee S, Fleming K, Park J, Ha K, Caulfield A, Swanson S, et al. BlueSSD: an open platform for cross-layer experiments for NAND flash-based SSDs. In: Proceedings of the Fifth Workshop on Architectural Research Prototyping; 2015 June 19–23; Saint-Malo, France. New York, NY: ACM, 2015;1–5; http://research.microsoft.com/pubs/198375/WARP2010_BlueSSD.pdf (accessed October 12, 2015).
-
(2015)
In Proceedings of the Fifth Workshop on Architectural Research Prototyping
, pp. 1-5
-
-
Lee, S.1
Fleming, K.2
Park, J.3
Ha, K.4
Caulfield, A.5
Swanson, S.6
-
165
-
-
84879989706
-
-
San Diego, CA, Department of Computer Science and Engineering, University of California-San Die
-
Bunker T, Wei M, Swanson SJ. Ming II: a flexible platform for NAND flash-based research. San Diego, CA: Department of Computer Science and Engineering, University of California-San Diego, 2012.
-
(2012)
Ming II: a flexible platform for NAND flash-based research
-
-
Bunker, T.1
Wei, M.2
Swanson, S.J.3
-
166
-
-
77952101825
-
The growing need for on-scene triage of mobile devices
-
Mislan RP, Casey E, Kessler GC. The growing need for on-scene triage of mobile devices. Digit Investig 2010;6(3–4):112–24.
-
(2010)
Digit Investig
, vol.6
, Issue.3-4
, pp. 112-124
-
-
Mislan, R.P.1
Casey, E.2
Kessler, G.C.3
-
168
-
-
84995647735
-
-
Wall Street Journal,, (accessed October 7, 2015
-
Barrett D, Yadron D, Wakaba D. Apple and others encrypt phones, fueling government standoff. Wall Street Journal, 2014; http://www.wsj.com/articles/apple-and-others-encrypt-phones-fueling-government-standoff-1416367801 (accessed October 7, 2015).
-
(2014)
Apple and others encrypt phones, fueling government standoff
-
-
Barrett, D.1
Yadron, D.2
Wakaba, D.3
-
169
-
-
84995647737
-
-
The Hill, (accessed October 12, 2015
-
Hattem J. Crypto wars’ return to congress. The Hill, 2014. http://thehill.com/policy/cybersecurity/221147-crypto-wars-return-to-congress (accessed October 12, 2015).
-
(2014)
Crypto wars’ return to congress
-
-
Hattem, J.1
-
173
-
-
84991957861
-
Design tradeoffs for SSD performance
-
; 2008 June 22–27;, Boston, MA, USENIX Associati
-
Agrawal N, Prabhakaran V, Wobber T, Davis JD, Manasse M, Panigrahy R. Design tradeoffs for SSD performance. In: Proceedings of the USENIX Annual Technical Conference; 2008 June 22–27; Boston, MA: USENIX Association, 2008;57–70.
-
(2008)
In Proceedings of the USENIX Annual Technical Conference
, pp. 57-70
-
-
Agrawal, N.1
Prabhakaran, V.2
Wobber, T.3
Davis, J.D.4
Manasse, M.5
Panigrahy, R.6
-
174
-
-
84995605457
-
System and method for remote wipe through voice mail
-
. EU patent EP2575384A1. (accessed 2013 April 3
-
Walker DR, Fyke SH, Inventors. BlackBerry Ltd, assignee. System and method for remote wipe through voice mail. EU patent EP2575384A1. (accessed 2013 April 3).
-
BlackBerry Ltd, assignee
-
-
Walker, D.R.1
Fyke, S.H.2
-
175
-
-
84995583577
-
System for remotely securing/locking a stolen wireless device via an email message
-
. US 987,609 (accessed 1999 November 16
-
Hasebe M, Inventor. Toshiba Corp, assignee. System for remotely securing/locking a stolen wireless device via an email message. US patent 5,987,609 (accessed 1999 November 16).
-
Toshiba Corp, assignee
-
-
Hasebe, M.1
|