Zobrazeno 1 - 10
of 10
pro vyhledávání: '"Michael Spreitzenbarth"'
Autor:
Michael Spreitzenbarth, Philip Polleit
Publikováno v:
2018 11th International Conference on IT Security Incident Management & IT Forensics (IMF).
Despite the increasing number of cases of data theft (such as Equifax), the classic password is still in many places the sole security feature for user authentication. However, numerous possibilities for extending this now anachronistic form of acces
Autor:
Michael Spreitzenbarth
Mobile Endgeräte, vor allem Smartphones und Tablets der Hersteller Apple und Google, sind inzwischen in fast jedem Haushalt vertreten. Auch in der Firmenwelt nehmen diese Geräte einen immer größeren Stellenwert ein und verarbeiten hochsensible Da
Publikováno v:
International Journal of Information Security. 14:141-153
Smartphones in general and Android in particular are increasingly shifting into the focus of cyber criminals. For understanding the threat to security and privacy, it is important for security researchers to analyze malicious software written for the
Autor:
Michael Spreitzenbarth, Johann Uhrmann
Master the art of digital forensics and analysis with PythonKey Features[•]Learn to perform forensic analysis and investigations with the help of Python, and gain an advanced understanding of the various Python libraries and frameworks[•]Analyze
Publikováno v:
IMF
As recently shown in 2013, Android-driven smartphones and tablet PCs are vulnerable to so-called cold boot attacks. With physical access to an Android device, forensic memory dumps can be acquired with tools like FROST that exploit the remanence effe
Publikováno v:
SAC
The popularity of mobile devices like smartphones and tablets has increased significantly in the last few years with many millions of sold devices. This growth also has its drawbacks: attackers have realized that smartphones are an attractive target
Autor:
Felix C. Freiling, Michael Spreitzenbarth, Thomas Schreck, Florian Echtler, Johannes Hoffmann
Publikováno v:
SAC
Smartphones in general and Android in particular are increasingly shifting into the focus of cybercriminals. For understanding the threat to security and privacy it is important for security researchers to analyze malicious software written for these
Autor:
Michael Spreitzenbarth, Tilo Müller
Publikováno v:
Applied Cryptography and Network Security ISBN: 9783642389795
ACNS
ACNS
At the end of 2011, Google released version 4.0 of its Android operating system for smartphones. For the first time, Android smartphone owners were supplied with a disk encryption feature that transparently encrypts user partitions. On the downside,
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::5dcb5f3f920b8930fab993c8a84c86f1
https://doi.org/10.1007/978-3-642-38980-1_23
https://doi.org/10.1007/978-3-642-38980-1_23
Publikováno v:
IFIP Advances in Information and Communication Technology ISBN: 9783642339615
IFIP Int. Conf. Digital Forensics
IFIP Int. Conf. Digital Forensics
It is well-known that, for various reasons, smartphone operating systems persistently store location data in local storage. Less well-known is the fact that various network applications (apps) do this too. This paper considers the issue if location d
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::baa06d5e223e1a19fee1f9d1eb53b524
https://doi.org/10.1007/978-3-642-33962-2_10
https://doi.org/10.1007/978-3-642-33962-2_10