References
- NIST Special Publication 800-101 Revision1, "Guidelines on Mobile Device Forensics", May 2014.
- ISO/IEC 27043, "Information technology - Security techniques - Incident investigation principles and processes", March 2015.
- Mumba, Emilio Raymond and Hein S. Venter, "Mobile forensics using the harmonised digital forensic investigation process", 2014 Information Security for South Africa IEEE, 2014.
- Murphy, Cynthia A. "Developing process for mobile device forensics", 2009.
- Goel, Archit, Anurag Tyagi and Ankit Agarwal, "Smartphone forensic investigation process model", International Journal of Computer Science & Security (IJCSS), pp. 322-341, 6(5), 2012.
- TTAS.KO-12.0059, "이동 전화 포렌식 가이드라인", 한국정보통신기술협회, 2007.
- 이정훈, 천우성, "디지털 증거 수집과 분석을 위한 스마트폰 포렌식 적용 연구", 정보보호학회지, 21(6), pp. 56-65, 2011.
- 이무영, "디지털 증거 압수수색에 있어서 관련성 개념에 관한 연구 - 모바일 포렌식을 중심으로 -", 서울대학교 융합과학기술대학원, 2015.
- Konstantia Barmpatsalou, Dimitrios Damopoulos, Georgios Kambourakis and Vasilios Katos, "A critical review of 7 years of Mobile Device Forensics", Digital Investigation, 10(4), pp. 323-349, December 2013. https://doi.org/10.1016/j.diin.2013.10.003
- Marcel Breeuwsma, Martien de Jongh, Coert Klaver, Ronald van der Knijff and Mark Roeloffs, "Forensic Data Recovery from Flash Memory", SMALL SCALE DIGITAL DEVICE FORENSICS JOURNAL, 1(1), pp. 1-7, June 2007.
- 이규안, "JTAG 방식을 이용한 모바일 포렌식 기법 연구", 숭실대학교, 2010.
- Ing. M.F. Breeuwsma, "Forensic imaging of embedded system using JTAG", Digital Investigation, 3, pp. 32-42, 2006. https://doi.org/10.1016/j.diin.2006.01.003
- Yang, Seung Jei, et al. "New acquisition method based on firmware update protocols for Android smartphones", Digital Investigation, 14, pp. S68-S76, 2015. https://doi.org/10.1016/j.diin.2015.05.008
- Namheun Son, Yunho Lee, Dohyun Kim, Joshua I. James, Sangjin Lee and Kyungho Lee, "A study of user data integrity during acquisition of Android devices", Digital Investigation, 10, pp. S3-S11, 2013. https://doi.org/10.1016/j.diin.2013.06.001
- Android Developer, "https://developer.android.com/", 2016.
- 오정훈, 이상진, "안드로이드 스마트폰 포렌식 분석 방법에 관한 연구", 고려대학교 정보보호대학원, 2012.
- Cellebrite UFED, "http://www.cellebrite.com/", 2016.
- XRY, https://www.msab.com/, 2016.
- 형사소송법 제106조 3항, "http://www.law.go.kr/법령/형사소송법", 2016.
- Jonathan Zdziarski, "Identifying back doors, attack points, and surveillance mechanisms in iOS devices", Digital Investigation, 11, pp. 3-19, 2014. https://doi.org/10.1016/j.diin.2014.01.001
- evasi0n, "http://evasi0n.com/", 2106
- PanGu, "http://en.7.pangu.io/", 2016.
- TaiG, "http://www.taig.com/en/", 2016.
- libimobiledevice, " http://www.libimobiledevice.org/", 2016.
- Joe Sylve, Andrew Case, Lodovico Marziale and Golden G. Richarda, "Acquisition and analysis of volatile memory from android devices", Digital Investigation, 8(3), pp. 175-184, February 2012. https://doi.org/10.1016/j.diin.2011.10.003
- LiME, "https://github.com/504ensicsLabs/LiME", 2016.
- Fabio Casadei, Antonio Savoldi and Paolo Gubian, "Forensics and SIM cards: an Overview", International Journal of Digital Evidence, 5(1), Fall 2006.