Actions
AcademicPapersAndPresentations » History » Revision 6
« Previous |
Revision 6/14
(diff)
| Next »
Denis 'GNUtoo' Carikli, 11/03/2020 10:57 PM
Add filename
AcademicPapers¶
- Table of contents
- AcademicPapers
Forensics acquisition - Analysis and circumvention of samsung secure boot enforced common criteria mode¶
Link: https://www.sciencedirect.com/science/article/pii/S1742287618300409
file name: 1-s2.0-S1742287618300409-main.pdf
License: CC BY-NC-ND
Description:¶
While this paper directly applies to the Galaxy S6 (SM-G920F) and the Galaxy S7 Edge (SM-G935F) witch uses Exynos System On a Chip, some of its findings seem to be directly applicable to the devices supported by Replicant.
The most interesting part is the analysis of some of the bootloader environment variables:- It analyzes some variables that accessible through the UART. We already have documentation explained how to access such variables but many variables aren't documented in the Replicant documentation.
- It also analyzed some variables present in the adv-env.img file inside the PARAM tarball filesystem. That information has already been used in the #2094 bug.
Security Analysis of Android Factory Resets¶
Link: https://www.cl.cam.ac.uk/~rja14/Papers/fr_most15.pdf
Related bug reports: #2096
Updated by Denis 'GNUtoo' Carikli over 4 years ago · 6 revisions