AcademicPapersAndPresentations » History » Version 5
Denis 'GNUtoo' Carikli, 07/22/2020 11:50 PM
remove duplicated name for first paper
1 | 1 | Denis 'GNUtoo' Carikli | h1. AcademicPapers |
---|---|---|---|
2 | |||
3 | 3 | Denis 'GNUtoo' Carikli | {{toc}} |
4 | |||
5 | 1 | Denis 'GNUtoo' Carikli | h2. Forensics acquisition - Analysis and circumvention of samsung secure boot enforced common criteria mode |
6 | |||
7 | Link: https://www.sciencedirect.com/science/article/pii/S1742287618300409 |
||
8 | License: CC BY-NC-ND |
||
9 | |||
10 | h3. Description: |
||
11 | |||
12 | While this paper directly applies to the Galaxy S6 (SM-G920F) and the Galaxy S7 Edge (SM-G935F) witch uses Exynos System On a Chip, some of its findings seem to be directly applicable to the devices supported by Replicant. |
||
13 | |||
14 | The most interesting part is the analysis of some of the bootloader environment variables: |
||
15 | * It analyzes some variables that accessible through the UART. We already have "documentation explained how to access such variables":https://redmine.replicant.us/projects/replicant/wiki/MidasBootloader#Changing-the-kernel-commandline-arguments but many variables aren't documented in the Replicant documentation. |
||
16 | * It also analyzed some variables present in the adv-env.img file inside the PARAM tarball filesystem. That information has already been used in the #2094 bug. |
||
17 | 2 | Denis 'GNUtoo' Carikli | |
18 | h2. Security Analysis of Android Factory Resets |
||
19 | |||
20 | 1 | Denis 'GNUtoo' Carikli | Link: https://www.cl.cam.ac.uk/~rja14/Papers/fr_most15.pdf |
21 | 4 | Denis 'GNUtoo' Carikli | Related bug reports: #2096 |