Close

Advanced School for Computing and Imaging (ASCI)

ASCI office
Delft University of Technology
Building 28, room E.3080
Van Mourik Broekmanweg 6
2628 XE – DELFT, The Netherlands

E: asci-office@tudelft.nl

Directions

The ASCI office is located at the Delft University of Technology campus.  It is easily accessible by bicycle, public transport and car. The numbers of buildings can help you find your way around the campus. Make sure you remember the name and building number of your destination.

Contact us at +31 15 278 8032 or send us an email at asci-office@tudelft.nl

Effective Mobile Forensics Through Exploiting the Memory Security

Effective Mobile Forensics Through Exploiting the Memory Security

Author : Aya Fukami
Promotor(s) : Prof.dr.ir.C.T.A.M. de Laat / Prof.dr.ing. Z.J.M.H Geradts
University : University of Amsterdam
Year of publication : 2024
Link to repository : Link to thesis

Abstract

Mobile phones have become an indispensable part of our lives, and contain a wealth of information that can be useful in criminal investigations. However, extracting this information from modern smartphones can be a challenge for forensic investigators.
This research delves into the hardware vulnerabilities of memory devices in modern smartphones, which represent potential avenues for bypassing security mechanisms. By identifying and exploiting these vulnerabilities, this thesis demonstrates that
effective strategies for extracting plaintext data from secured devices, thereby overcoming some of the limitations imposed by conventional forensic methods.
In-depth analysis is presented on the development of novel forensic techniques that leverage flaws in memory security architectures to access encrypted or otherwise protected information. These methods not only highlight the potential for accessing valuable data but also address the broader implications of device security for forensic investigations.
This study emphasizes the importance of continuous advancements in forensic science to keep pace with evolving security technologies in mobile devices. It advocates for a proactive approach to forensic research, one that anticipates future security measures and develops corresponding countermeasures to ensure the accessibility of critical evidence in legal settings.