메뉴 건너뛰기




Volumn 61, Issue 6, 2016, Pages 1473-1492

Remote Wiping and Secure Deletion on Mobile Devices: A Review

Author keywords

flash storage; forensic science; NAND nonvolatile flash memory; remote wiping; secure deletion; Solid state drive disk

Indexed keywords


EID: 84995549442     PISSN: 00221198     EISSN: 15564029     Source Type: Journal    
DOI: 10.1111/1556-4029.13203     Document Type: Article
Times cited : (27)

References (175)
  • 1
    • 84995614208 scopus 로고    scopus 로고
    • Australian Mobile Telecommunications Association. Lost and stolen phones, 2011. http://www.amta.org.au/pages/Lost.and.stolen.phones.
    • (2011) Lost and stolen phones
  • 6
    • 84905048726 scopus 로고    scopus 로고
    • (accessed October 7, 2015
    • Verizon. 2014 data breach investigation report. http://www.verizonenterprise.com/DBIR/2014/ (accessed October 7, 2015).
    • 2014 data breach investigation report
  • 7
    • 84894188956 scopus 로고    scopus 로고
    • Media Release,, (accessed October 7, 2015
    • Symantec. Symantec smartphone honey stick project. Media Release, 2012. https://www.symantec.com/about/news/resources/press_kits/detail.jsp?pkid=symantec-smartphone-honey-stick-project (accessed October 7, 2015).
    • (2012) Symantec smartphone honey stick project
  • 8
    • 80055049958 scopus 로고    scopus 로고
    • The mobile ‘kill pill’ – poison or panacea
    • Caldwell T. The mobile ‘kill pill’ – poison or panacea. Comput Fraud Secur 2011;10:8–12.
    • (2011) Comput Fraud Secur , vol.10 , pp. 8-12
    • Caldwell, T.1
  • 11
    • 84995559005 scopus 로고    scopus 로고
    • System architecture
    • In, Cauley DW, Shafer K, Evers R, Koch M, editors., Indianapolis, IN, Wiley Publicati
    • Evers J, Johnston CJ. System architecture. In: Cauley DW, Shafer K, Evers R, Koch M editors. Professional blackberry. Indianapolis, IN: Wiley Publication, 2005;3–18.
    • (2005) Professional blackberry , pp. 3-18
    • Evers, J.1    Johnston, C.J.2
  • 14
    • 84995700513 scopus 로고    scopus 로고
    • (accessed October 7, 2015
    • Microsoft. Microsoft releases windows mobile 5.0, 2005. http://www.microsoft.com/en-us/news/press/2005/may05/05-10windowsmobile5pr.aspx (accessed October 7, 2015).
    • (2005) Microsoft releases windows mobile 5.0
  • 15
    • 44649178724 scopus 로고    scopus 로고
    • Ghost in the machine
    • Munro K. Ghost in the machine. Itnow 2008;50(2):10.
    • (2008) Itnow , vol.50 , Issue.2 , pp. 10
    • Munro, K.1
  • 16
  • 17
    • 65249112049 scopus 로고    scopus 로고
    • A new era of presidential security: the president and his BlackBerry
    • Harauz J, Kaufman LM. A new era of presidential security: the president and his BlackBerry. IEEE Secur Priv 2009;7(2):67–70.
    • (2009) IEEE Secur Priv , vol.7 , Issue.2 , pp. 67-70
    • Harauz, J.1    Kaufman, L.M.2
  • 20
    • 84995574834 scopus 로고    scopus 로고
    • From MobileMe to iCloud
    • In, Moritz K, Larson D, Wimpsett K, editors., New York, NY, Apre
    • Mayers S, Lee M. From MobileMe to iCloud. In: Moritz K, Larson D, Wimpsett K, editors. Learn OS X lion. New York, NY: Apress, 2011;245–53.
    • (2011) Learn OS X lion , pp. 245-253
    • Mayers, S.1    Lee, M.2
  • 21
    • 84876585315 scopus 로고    scopus 로고
    • Apple, Inc, (accessed October 7, 2015
    • Apple. iOS 4.2 software update. Apple, Inc, 2010; http://support.apple.com/kb/DL1061 (accessed October 7, 2015).
    • (2010) iOS 4.2 software update
  • 22
    • 84995574845 scopus 로고    scopus 로고
    • TIME, (accessed October 7, 2015
    • Aomoth D. App of the week: find my iPhone. TIME, 2010. http://techland.time.com/2010/11/23/app-of-the-week-find-my-iphone/ (accessed October 7, 2015).
    • (2010) App of the week: find my iPhone
    • Aomoth, D.1
  • 23
    • 84995643170 scopus 로고    scopus 로고
    • Android Official Blog,, (accessed October 7, 2015
    • Poiesz B. Find your lost phone with android device manager. Android Official Blog, 2013. http://officialandroid.blogspot.com/2013/08/find-your-lost-phone-with-android.html (accessed October 7, 2015).
    • (2013) Find your lost phone with android device manager
    • Poiesz, B.1
  • 24
    • 84995603897 scopus 로고    scopus 로고
    • Official Google for Work Blog,, (accessed October 7, 2015
    • Zhang H. Make mobile more manageable. Official Google for Work Blog, 2012. http://googleforwork.blogspot.com/2012/08/make-mobile-more-manageable.html (accessed October 7, 2015).
    • (2012) Make mobile more manageable
    • Zhang, H.1
  • 25
    • 28044459032 scopus 로고    scopus 로고
    • Non-volatile memory technologies for beyond 2010
    • ; 2005 June 16–18; Kyoto, Japan., Piscataway, NJ, IE
    • Shin Y. Non-volatile memory technologies for beyond 2010. In: Proceedings of Symposium on VLSI Circuits Digest of Technical Papers; 2005 June 16–18; Kyoto, Japan. Piscataway, NJ: IEEE, 2005;156–9.
    • (2005) In Proceedings of Symposium on VLSI Circuits Digest of Technical Papers , pp. 156-159
    • Shin, Y.1
  • 26
    • 84995653929 scopus 로고    scopus 로고
    • (accessed October 7, 2015
    • BlackBerry. Enforcing encryption of internal and external file systems on BlackBerry devices, 2010. http://www.manualslib.com/products/Blackberry-Enterprise-Solution-Security-Enforcing-Encryption-Of-Internal-And-External-File-Systems-On-Devices-2590666.html (accessed October 7, 2015).
    • (2010) Enforcing encryption of internal and external file systems on BlackBerry devices
  • 28
    • 84920879909 scopus 로고    scopus 로고
    • Mobile device encryption systems
    • In, Janczewski LJ, Wolfe HB, Shenoi S, editors., Heidelberg, Germany, Springer, 4
    • Teufl P, Zefferer T, Stromberger C. Mobile device encryption systems. In: Janczewski LJ, Wolfe HB, Shenoi S, editors. IFIP advances in information and communication technology. Heidelberg, Germany: Springer, 2013;405:203–16.
    • (2013) IFIP advances in information and communication technology , pp. 203-216
    • Teufl, P.1    Zefferer, T.2    Stromberger, C.3
  • 30
    • 84995583691 scopus 로고    scopus 로고
    • (accessed October 7, 2015
    • Belfiore J. Announcing Windows Phone 8. Windows Blog, 2012. http://blogs.windows.com/windowsexperience/2012/06/20/announcing-windows-phone-8/ (accessed October 7, 2015).
    • (2012) Announcing Windows Phone 8. Windows Blog
    • Belfiore, J.1
  • 31
    • 84995583689 scopus 로고    scopus 로고
    • Microsoft UK Schools Blog,, (accessed October 7, 2015
    • Godfrey R. Announcing Windows Phone 8. Microsoft UK Schools Blog, 2012. http://blogs.msdn.com/b/ukschools/archive/2012/06/27/announcing-windows-phone-8.aspx (accessed October 7, 2015).
    • (2012) Announcing Windows Phone 8
    • Godfrey, R.1
  • 36
    • 84995574824 scopus 로고    scopus 로고
    • Git at Google,, (accessed October 7, 2015
    • Malchev I. Enable hardware crypto for userdata encryption. Git at Google, 2014. https://android.googlesource.com/platform/system/vold/+/bb7d9afea9479eabbc98133d3d968225a1e1019e%5E%21/#F0 (accessed October 7, 2015).
    • (2014) Enable hardware crypto for userdata encryption
    • Malchev, I.1
  • 40
    • 84995700487 scopus 로고    scopus 로고
    • (accessed October 7, 2015
    • Elenkov N. Revisiting Android disk encryption, 2014. http://nelenkov.blogspot.com/2014/10/revisiting-android-disk-encryption.html (accessed October 7, 2015).
    • (2014) Revisiting Android disk encryption
    • Elenkov, N.1
  • 46
    • 84995574873 scopus 로고    scopus 로고
    • Department of Navy Chief Information Officer, (accessed October 7, 2015
    • DON CIO Privacy Team. Methods for hard drive/disk destruction. Department of Navy Chief Information Officer, 2010. http://www.doncio.navy.mil/ContentView.aspx?ID=1867 (accessed October 7, 2015).
    • (2010) Methods for hard drive/disk destruction
  • 50
  • 53
  • 55
    • 79952918800 scopus 로고    scopus 로고
    • Smartphone remote lock and wipe system with integrity checking of SMS notification
    • ; 2011 January 9–12; Las Vegas, NV., Piscataway, NJ, IE
    • Park K, Ma GI, Yi JH, Cho Y, Cho S, Park S. Smartphone remote lock and wipe system with integrity checking of SMS notification. In: Proceedings of International Conference on Consumer Electronics; 2011 January 9–12; Las Vegas, NV. Piscataway, NJ: IEEE, 2014;263–4.
    • (2014) In Proceedings of International Conference on Consumer Electronics , pp. 263-264
    • Park, K.1    Ma, G.I.2    Yi, J.H.3    Cho, Y.4    Cho, S.5    Park, S.6
  • 56
    • 84929409759 scopus 로고    scopus 로고
    • A model for remote access and protection of smartphones using short message service
    • Kuppusamy KS, Senthilraja R, Aghila G. A model for remote access and protection of smartphones using short message service. Int J Comput Sci En Inf Technol 2012;2(1):91–100.
    • (2012) Int J Comput Sci En Inf Technol , vol.2 , Issue.1 , pp. 91-100
    • Kuppusamy, K.S.1    Senthilraja, R.2    Aghila, G.3
  • 58
    • 84995574854 scopus 로고    scopus 로고
    • Remote disablement of a communication device. US 375,422. (accessed 2013 February 12
    • Sennett DWA, Daly BK, Inventors. AT&T Mobility II LLC, assignee. Remote disablement of a communication device. US patent 8,375,422. (accessed 2013 February 12).
    • AT&T Mobility II LLC, assignee
    • Sennett, D.W.A.1    Daly, B.K.2
  • 60
    • 84981526422 scopus 로고    scopus 로고
    • (accessed October 7, 2015
    • Apple. iOS security, 2015. https://www.apple.com/business/docs/iOS_Security_Guide.pdf (accessed October 7, 2015).
    • (2015) iOS security
  • 61
    • 84995650695 scopus 로고    scopus 로고
    • (accessed October 7, 2015
    • BlackBerry. Security technical overview of BES10 cloud solution, 2014a. https://www.blackberry.com/blackberrytraining/web/KryptonDocs/resources/BES10_Cloud_Market_Preview_Security_Technical_Overview_en.pdf (accessed October 7, 2015).
    • (2014) Security technical overview of BES10 cloud solution
  • 62
    • 84889009370 scopus 로고    scopus 로고
    • (accessed October 7, 2015
    • BlackBerry. Blackberry enterprise solution 5.0.2: Security technical overview, 2011. http://docs.blackberry.com/en/admin/deliverables/38816/BlackBerry_Enterprise_Server_5.0_SP3_and_BlackBerry_7.1-Security_Technical_Overview-1936256-0117012254-001-5.0.3-US.pdf (accessed October 7, 2015).
    • (2011) Blackberry enterprise solution 5.0.2: Security technical overview
  • 64
    • 80053418215 scopus 로고    scopus 로고
    • Design of remote control system for data protection and backup in mobile devices
    • ; 2011 August 16–18; Busan, South Korea., Piscataway, NJ, IE
    • Joe I, Lee Y. Design of remote control system for data protection and backup in mobile devices. In: Proceedings of International Conference on Interaction Sciences; 2011 August 16–18; Busan, South Korea. Piscataway, NJ: IEEE, 2011;189–93.
    • (2011) In Proceedings of International Conference on Interaction Sciences , pp. 189-193
    • Joe, I.1    Lee, Y.2
  • 65
    • 84910643420 scopus 로고    scopus 로고
    • Mayhem in the push clouds: understanding and mitigating security hazards in mobile push-messaging services
    • ; 2014 November 3–7; Scottsdale, AZ., New York, NY, A
    • Li T, Zhou X, Xing L, Lee Y, Naveed M, Wang X, et al. Mayhem in the push clouds: understanding and mitigating security hazards in mobile push-messaging services. In: Proceedings of Conference on Computer and Communications Security; 2014 November 3–7; Scottsdale, AZ. New York, NY: ACM, 2014a;978–89.
    • (2014) In Proceedings of Conference on Computer and Communications Security , pp. 978-989
    • Li, T.1    Zhou, X.2    Xing, L.3    Lee, Y.4    Naveed, M.5    Wang, X.6
  • 69
    • 84995549106 scopus 로고    scopus 로고
    • (accessed October 7, 2015
    • BlackBerry. BlackBerry device service advanced administration guide (v10.2), 2014c. http://docs.blackberry.com/en/admin/deliverables/59623/BES10_v10.2_BDS_Advanced_Admin_Guide_en.pdf (accessed October 7, 2015).
    • (2014) BlackBerry device service advanced administration guide (v10.2)
  • 70
    • 84995658393 scopus 로고    scopus 로고
    • (accessed October 7, 2015
    • BlackBerry. BlackBerry protect user guide (v1.2.1), 2015. http://docs.blackberry.com/en/smartphone_users/deliverables/49400/BlackBerry_Protect-User_Guide-1343391475156-1.2.1-en.pdf (accessed October 7, 2015).
    • (2015) BlackBerry protect user guide (v1.2.1)
  • 71
    • 84995666596 scopus 로고    scopus 로고
    • (accessed October 7, 2015
    • Apple n.d.b. About configuration profile. https://help.apple.com/configurator/mac/1.6/#/cadbf9e668 (accessed October 7, 2015).
    • About configuration profile
  • 72
    • 84995647671 scopus 로고    scopus 로고
    • (accessed October 7, 2015
    • ManageEngine n.d. MDM architecture. http://www.manageengine.com/products/desktop-central/mobile-device-management-mdm-architecture.html (accessed October 7, 2015).
    • ManageEngine n.d. MDM architecture
  • 73
    • 84939447921 scopus 로고    scopus 로고
    • (accessed October 7, 2015
    • Apple n.d.a. iPhone in business: manage devices. https://www.apple.com/iphone/business/it/management.html (accessed October 7, 2015).
    • iPhone in business: manage devices
  • 74
    • 84995614145 scopus 로고    scopus 로고
    • (accessed October 7, 2015
    • Microsoft. Exchange ActiveSync, 2013. http://technet.microsoft.com/en-US/library/aa998357%28v=exchg.150%29.aspx (accessed October 7, 2015).
    • (2013) Exchange ActiveSync
  • 75
    • 84995585321 scopus 로고    scopus 로고
    • (accessed October 7, 2015
    • Microsoft. Windows Phone 8.1 security overview, 2014. http://www.microsoft.com/en-us/download/details.aspx?id=42509&751be11f-ede8-5a0c-058c-2ee190a24fa6=True (accessed October 7, 2015).
    • (2014) Windows Phone 8.1 security overview
  • 84
    • 84995666613 scopus 로고    scopus 로고
    • (accessed October 7, 2015
    • OWASP. Cross-site request forgery (CSRF), 2014. https://www.owasp.org/index.php/Cross-Site_Request_Forgery_%28CSRF%29 (accessed October 7, 2015).
    • (2014) Cross-site request forgery (CSRF)
  • 85
    • 84995558256 scopus 로고    scopus 로고
    • (accessed October 7, 2015
    • US-CERT. CVE-2014-8346, National Vulnerability Database, 2014. http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-8346 (accessed October 7, 2015).
    • (2014) CVE-2014-8346, National Vulnerability Database
  • 86
    • 84995650405 scopus 로고    scopus 로고
    • Hard,, (accessed October 7, 2015
    • Honan M. Yes, I was hacked. Hard, 2012b. http://www.emptyage.com/post/28679875595/yes-i-was-hacked-hard (accessed October 7, 2015).
    • (2012) Yes, I was hacked
    • Honan, M.1
  • 87
    • 84889070591 scopus 로고    scopus 로고
    • (accessed October 7, 2015
    • OWASP. OWASP top 10, 2013. https://www.owasp.org/index.php/Top10 (accessed October 7, 2015).
    • (2013) OWASP top 10
  • 88
  • 90
    • 84966882723 scopus 로고    scopus 로고
    • (accessed October 12, 2015
    • The Guardian. Recycled mobile phones retain previous owner data, 2013. http://web.archive.org/web/20140529182505/http://www.theguardian.com/media-network/partner-zone-infosecurity/mobile-phones-previous-owner-data (accessed October 12, 2015).
    • (2013) Recycled mobile phones retain previous owner data
  • 92
    • 84995585307 scopus 로고    scopus 로고
    • Effects of the factory reset on mobile devices
    • Schwamm R, Rowe NC. Effects of the factory reset on mobile devices. J Digit Forensics Secur Law 2014;9(2):205–20.
    • (2014) J Digit Forensics Secur Law , vol.9 , Issue.2 , pp. 205-220
    • Schwamm, R.1    Rowe, N.C.2
  • 94
    • 85034617851 scopus 로고    scopus 로고
    • Security analysis of Android factory resets
    • ; 2015 May 21; San Jose, CA., Piscataway, NJ, IEEE, (accessed October 12, 2015
    • Simon L, Anderson R. Security analysis of Android factory resets. In: Proceedings of the Mobile Security Technologies Workshop; 2015 May 21; San Jose, CA. Piscataway, NJ: IEEE, 2015a;1–10. http://ieee-security.org/TC/SPW2015/MoST/papers/s1p3.pdf (accessed October 12, 2015).
    • (2015) In Proceedings of the Mobile Security Technologies Workshop , pp. 1-10
    • Simon, L.1    Anderson, R.2
  • 97
    • 84893904253 scopus 로고    scopus 로고
    • A survey of address translation technologies for flash memories
    • Ma D, Feng J, Li G. A survey of address translation technologies for flash memories. ACM Comput Surv 2014;46(3):1–39.
    • (2014) ACM Comput Surv , vol.46 , Issue.3 , pp. 1-39
    • Ma, D.1    Feng, J.2    Li, G.3
  • 99
    • 85073529809 scopus 로고    scopus 로고
    • Data node encrypted file system: efficient secure deletion for flash memory
    • ; 2013 August 14–16; Washington, D.C., Berkeley, CA, USENIX Associati
    • Reardon J, Capkun S, Basin D. Data node encrypted file system: efficient secure deletion for flash memory. In: Proceedings of the Twenty Second USENIX Security Symposium; 2013 August 14–16; Washington, D.C. Berkeley, CA: USENIX Association, 2013b;333–48.
    • (2013) In Proceedings of the Twenty Second USENIX Security Symposium , pp. 333-348
    • Reardon, J.1    Capkun, S.2    Basin, D.3
  • 100
    • 38049024525 scopus 로고    scopus 로고
    • A page padding method for fragmented flash storage
    • In, Gervasi O, Gavrilova ML, editors., Heidelberg, Germany, Springer, 47
    • Kim H, Kim J, Choi S, Jung H, Jung J. A page padding method for fragmented flash storage. In: Gervasi O, Gavrilova ML, editors. Lecture notes in computer science. Heidelberg, Germany: Springer, 2007;4705:164–77.
    • (2007) Lecture notes in computer science , pp. 164-177
    • Kim, H.1    Kim, J.2    Choi, S.3    Jung, H.4    Jung, J.5
  • 101
    • 80053341347 scopus 로고    scopus 로고
    • ShiftFlash: make flash-based storage more resilient and robust
    • Huang P, Zhou K, Wu C. ShiftFlash: make flash-based storage more resilient and robust. Perform Eval 2011;68(11):1193–206.
    • (2011) Perform Eval , vol.68 , Issue.11 , pp. 1193-1206
    • Huang, P.1    Zhou, K.2    Wu, C.3
  • 102
    • 0004610703 scopus 로고    scopus 로고
    • Secure deletion of data from magnetic and solid-state memory
    • ; 1996 July 22–25; San Jose, CA., Berkeley, CA, USENIX Associati
    • Gutmann P. Secure deletion of data from magnetic and solid-state memory. In: Proceedings of the Sixth USENIX Security Symposium; 1996 July 22–25; San Jose, CA. Berkeley, CA: USENIX Association, 1996;1–18.
    • (1996) In Proceedings of the Sixth USENIX Security Symposium , pp. 1-18
    • Gutmann, P.1
  • 104
    • 3042825662 scopus 로고    scopus 로고
    • Remembrance of data passed: a study of disk sanitization practices
    • Garfinkel SL, Shelat A. Remembrance of data passed: a study of disk sanitization practices. IEEE Secur Priv 2003;1(1):17–27.
    • (2003) IEEE Secur Priv , vol.1 , Issue.1 , pp. 17-27
    • Garfinkel, S.L.1    Shelat, A.2
  • 106
    • 84995614187 scopus 로고    scopus 로고
    • (accessed October 12, 2015
    • Cornell University. Disk and file erasure, best practices for media destruction, 2012. http://www.it.cornell.edu/security/depth/practices/media_destruct.cfm#erasure (accessed October 12, 2015).
    • (2012) Disk and file erasure, best practices for media destruction
  • 108
    • 84995615531 scopus 로고    scopus 로고
    • (accessed October 12, 2015
    • Australian Signals Directorate. 2015 Australian Government Information Security Manual, 2015. http://www.asd.gov.au/publications/Information_Security_Manual_2015_Controls.pdf (accessed October 12, 2015).
    • (2015) 2015 Australian Government Information Security Manual
  • 110
    • 58449089219 scopus 로고    scopus 로고
    • Overwriting hard drive data: the great wiping controversy
    • In, Sekar R, Pujari AK, editors., Heidelberg, Germany, Springer, 53
    • Wright C, Kleiman D, Sundhar S. Overwriting hard drive data: the great wiping controversy. In: Sekar R, Pujari AK, editors. Lecture notes in computer science. Heidelberg, Germany: Springer, 2008;5352:243–57.
    • (2008) Lecture notes in computer science , pp. 243-257
    • Wright, C.1    Kleiman, D.2    Sundhar, S.3
  • 112
    • 84874255976 scopus 로고    scopus 로고
    • Towards secure deletion on smartphones
    • , schutz und zuverlässigkeit”; 2010 October 5–7; Berlin, Germany., Bonn, Germany, Gesellschaft für Informatik e.V. (G
    • Spreitzenbarth M, Holz T. Towards secure deletion on smartphones. In: Proceedings of the Fifth Conference of the GI Special Interest Group “Sicherheit, schutz und zuverlässigkeit”; 2010 October 5–7; Berlin, Germany. Bonn, Germany: Gesellschaft für Informatik e.V. (GI), 2010;165–76.
    • (2010) In Proceedings of the Fifth Conference of the GI Special Interest Group “Sicherheit , pp. 165-176
    • Spreitzenbarth, M.1    Holz, T.2
  • 113
    • 84864762417 scopus 로고    scopus 로고
    • Secure file delete in NAND-based storage
    • Shin I. Secure file delete in NAND-based storage. Int J Secur Appl 2012;6(2):257–60.
    • (2012) Int J Secur Appl , vol.6 , Issue.2 , pp. 257-260
    • Shin, I.1
  • 115
    • 84907246293 scopus 로고    scopus 로고
    • SmSD: a smart secure deletion scheme for SSDs
    • Qin Y, Tong W, Liu J, Zhu Z. SmSD: a smart secure deletion scheme for SSDs. J Converg 2013;4(4):30–5.
    • (2013) J Converg , vol.4 , Issue.4 , pp. 30-35
    • Qin, Y.1    Tong, W.2    Liu, J.3    Zhu, Z.4
  • 120
    • 84903767570 scopus 로고    scopus 로고
    • Cost effective data wiping methods for mobile phone
    • Kang S, Park K, Kim J. Cost effective data wiping methods for mobile phone. Multimed Tools Appl 2013;71(2):643–55.
    • (2013) Multimed Tools Appl , vol.71 , Issue.2 , pp. 643-655
    • Kang, S.1    Park, K.2    Kim, J.3
  • 123
    • 84995585322 scopus 로고    scopus 로고
    • Secure erase system for a solid state non-volatile memory device. US 2012/0079289 (accessed 2012 March 29
    • Weng WK, Wu HH, Inventors. Skymedi Corp, assignee. Secure erase system for a solid state non-volatile memory device. US patent application 2012/0079289 (accessed 2012 March 29).
    • Skymedi Corp, assignee
    • Weng, W.K.1    Wu, H.H.2
  • 124
    • 77249114232 scopus 로고    scopus 로고
    • An efficient secure deletion scheme for flash file systems
    • Lee J, Yi S, Heo J, Park H, Shin SY, Cho Y. An efficient secure deletion scheme for flash file systems. J Inf Sci Eng 2010;26(1):27–38.
    • (2010) J Inf Sci Eng , vol.26 , Issue.1 , pp. 27-38
    • Lee, J.1    Yi, S.2    Heo, J.3    Park, H.4    Shin, S.Y.5    Cho, Y.6
  • 126
    • 79958121705 scopus 로고    scopus 로고
    • Secure data deletion for USB flash memory
    • Lee B, Son K, Won D, Kim S. Secure data deletion for USB flash memory. J Inform Sci Eng 2011;27(3):933–52.
    • (2011) J Inform Sci Eng , vol.27 , Issue.3 , pp. 933-952
    • Lee, B.1    Son, K.2    Won, D.3    Kim, S.4
  • 128
    • 41749084645 scopus 로고    scopus 로고
    • Models and design of an adaptive hybrid scheme for secure deletion of data in consumer electronics
    • Sun K, Choi J, Lee D, Noh SH. Models and design of an adaptive hybrid scheme for secure deletion of data in consumer electronics. IEEE Trans Consumer Electron 2008;54(1):100–4.
    • (2008) IEEE Trans Consumer Electron , vol.54 , Issue.1 , pp. 100-104
    • Sun, K.1    Choi, J.2    Lee, D.3    Noh, S.H.4
  • 130
    • 84903150675 scopus 로고    scopus 로고
    • The TrueCrypt on-disk format-an independent view
    • Brož M, Matyáš V. The TrueCrypt on-disk format-an independent view. IEEE Secur Priv 2014;12(3):74–7.
    • (2014) IEEE Secur Priv , vol.12 , Issue.3 , pp. 74-77
    • Brož, M.1    Matyáš, V.2
  • 133
    • 84995555269 scopus 로고    scopus 로고
    • (accessed October 12, 2015
    • AMD. RAIDXpert user manual, 2010. http://www2.ati.com/relnotes/AMD_RAIDXpert_User_v2.1.pdf (accessed October 12, 2015).
    • (2010) RAIDXpert user manual
  • 134
    • 84995604857 scopus 로고    scopus 로고
    • (accessed October 7, 2015
    • ® RST), 2014. http://www.intel.com/support/chipsets/imsm/sb/CS-009337.htm (accessed October 7, 2015).
    • (2014) ® RST)
  • 142
    • 84995698947 scopus 로고    scopus 로고
    • (accessed October 7, 2015
    • Google n.d. Implementing security. https://source.android.com/devices/tech/security/implement.html (accessed October 7, 2015).
    • Implementing security
  • 146
    • 84995650433 scopus 로고    scopus 로고
    • Survey on security in cloud using homographic and disk encryption methods
    • Reddy VK, Rao JE. Survey on security in cloud using homographic and disk encryption methods. Int J Chem Eng Appl 2014;2(4):107–12.
    • (2014) Int J Chem Eng Appl , vol.2 , Issue.4 , pp. 107-112
    • Reddy, V.K.1    Rao, J.E.2
  • 149
    • 85037846870 scopus 로고    scopus 로고
    • Self-encrypting disks pose self-decrypting risks
    • ; 2012 December 27–30; Hamburg, Germany., Hamburg, Germany, Chaos Computer Cl
    • Müller T, Latzo T, Freiling FC. Self-encrypting disks pose self-decrypting risks. In: Proceedings of the Twenty Ninth Chaos Communication Congress; 2012 December 27–30; Hamburg, Germany. Hamburg, Germany: Chaos Computer Club, 2012;1–10.
    • (2012) In Proceedings of the Twenty Ninth Chaos Communication Congress , pp. 1-10
    • Müller, T.1    Latzo, T.2    Freiling, F.C.3
  • 150
    • 84995604096 scopus 로고    scopus 로고
    • revision 1.0 ed,, (accessed October 7, 2015
    • Trusted Computing Group. TCG storage security subsystem class (SSC): Opal, specification version 2.00, revision 1.0 ed, 2012; http://www.trustedcomputinggroup.org/resources/storage_work_group_storage_security_subsystem_class_opal (accessed October 7, 2015).
    • (2012) TCG storage security subsystem class (SSC): Opal, specification version 2.00
  • 151
    • 84995604920 scopus 로고    scopus 로고
    • (accessed October 7, 2015
    • Microsoft. Encrypted hard drive, TechNet Library, 2012. http://technet.microsoft.com/en-us/library/hh831627.aspx (accessed October 7, 2015).
    • (2012) Encrypted hard drive, TechNet Library
  • 152
    • 34247595373 scopus 로고    scopus 로고
    • Authentication in transient storage device attachments
    • Rich D. Authentication in transient storage device attachments. Comput 2007;40(4):102–4.
    • (2007) Comput , vol.40 , Issue.4 , pp. 102-104
    • Rich, D.1
  • 153
    • 84995687253 scopus 로고    scopus 로고
    • (accessed October 7, 2015
    • ® solid-state drive pro 1500 series (M.2), Product Specification, 2013. http://www.intel.com/content/dam/www/public/us/en/documents/product-specifications/ssd-pro-1500-series-m2-specification.pdf (accessed October 7, 2015).
    • (2013) ® solid-state drive pro 1500 series (M.2), Product Specification
  • 164
    • 79951693063 scopus 로고    scopus 로고
    • BlueSSD: an open platform for cross-layer experiments for NAND flash-based SSDs
    • ; 2015 June 19–23; Saint-Malo, France., New York, NY, ACM, (accessed October 12, 2015
    • Lee S, Fleming K, Park J, Ha K, Caulfield A, Swanson S, et al. BlueSSD: an open platform for cross-layer experiments for NAND flash-based SSDs. In: Proceedings of the Fifth Workshop on Architectural Research Prototyping; 2015 June 19–23; Saint-Malo, France. New York, NY: ACM, 2015;1–5; http://research.microsoft.com/pubs/198375/WARP2010_BlueSSD.pdf (accessed October 12, 2015).
    • (2015) In Proceedings of the Fifth Workshop on Architectural Research Prototyping , pp. 1-5
    • Lee, S.1    Fleming, K.2    Park, J.3    Ha, K.4    Caulfield, A.5    Swanson, S.6
  • 166
    • 77952101825 scopus 로고    scopus 로고
    • The growing need for on-scene triage of mobile devices
    • Mislan RP, Casey E, Kessler GC. The growing need for on-scene triage of mobile devices. Digit Investig 2010;6(3–4):112–24.
    • (2010) Digit Investig , vol.6 , Issue.3-4 , pp. 112-124
    • Mislan, R.P.1    Casey, E.2    Kessler, G.C.3
  • 169
    • 84995647737 scopus 로고    scopus 로고
    • The Hill, (accessed October 12, 2015
    • Hattem J. Crypto wars’ return to congress. The Hill, 2014. http://thehill.com/policy/cybersecurity/221147-crypto-wars-return-to-congress (accessed October 12, 2015).
    • (2014) Crypto wars’ return to congress
    • Hattem, J.1
  • 170
  • 174
    • 84995605457 scopus 로고    scopus 로고
    • System and method for remote wipe through voice mail
    • . EU patent EP2575384A1. (accessed 2013 April 3
    • Walker DR, Fyke SH, Inventors. BlackBerry Ltd, assignee. System and method for remote wipe through voice mail. EU patent EP2575384A1. (accessed 2013 April 3).
    • BlackBerry Ltd, assignee
    • Walker, D.R.1    Fyke, S.H.2
  • 175
    • 84995583577 scopus 로고    scopus 로고
    • System for remotely securing/locking a stolen wireless device via an email message
    • . US 987,609 (accessed 1999 November 16
    • Hasebe M, Inventor. Toshiba Corp, assignee. System for remotely securing/locking a stolen wireless device via an email message. US patent 5,987,609 (accessed 1999 November 16).
    • Toshiba Corp, assignee
    • Hasebe, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.