References
- Statcounter, "Mobile Operating System MarketShare Worldwide", https://gs.statcounter.com/os-market-share/mobile/worldwide/#monthly-201301-201911
- Oliver Kunz, "Android full-disk encryption: asecurity assessment", Royal holloway University of London, pp24, 2016
- AOSP, "Direct Boot",https://developer.android.com/training/articles/direct-boot
- AOSP, "File-based Encryption", https://source.android.com/security/encryption/file-based
- AOSP, "Full-Disk Encryption", https://source.android.com/security/encryption/full-disk
- Ronan Loftus, Marwin Baumann, "Android 7 File Based Encryption and the Attacks Against It", University of Amsterdam, pp.33, 2017
- J. Engler and P. Vines. "Electromechanical PIN Cracking Implementation and Practicality", Defcon 21, 2017
- Google Git, "Gatekeeper.cpp", https://android.googlesource.com/platform/system/gatekeeper/+/master/gatekeeper.cpp
- The Linux Kernel, "Ext4 Filesystem-Data Structures and Algorithms", https://www.kernel.org/doc/html/latest/filesystems/ext4/
- T. MUller, M. Spreitzenbarth and F. C. Freiling. "FROST: Forensic Recovery of ScrambledTelephones". Tech. rep. Department of Computer Science, Friedrich-Alexander Universityof Erlangen-Nuernberg, p. 19, Oct. 2012
- Peter Gutmann, "Data remanence in semiconductor devices", In Proceedings of the 10th conference on USENIX Security Symposium-Volume 10, USENIX Association, pp.4. 2001
- J. Alex Halderman, Seth D. Schoen†, Nadia Heninger, William Clarkson, William Paul, "Lest We Remember: Cold Boot Attacks on Encryption Keys", 2008 USENIX Security Symposium, pp.49, 2018
- Gal Beniamini, "Trust Issues: Exploiting TrustZone TEEs", https://googleprojectzero.blogspot.com/2017/07/trust-issues-exploiting-trustzone-tees.html
- Gal Beniamini, "Android privilege escalation to mediaserver from zero permissions", http://bits-please.blogspot.com/2016/01/android-privilege-escalation-to.html
- Gal Beniamini, "QSEE privilege escalation vulnerability and exploit (CVE-2015-6639)", http://bits-please.blogspot.com/2016/05/qsee-privilege-escalation-vulnerability.html
- Qualcomm ,"Secure Boot and Image Authentication", https://www.qualcomm.com/media/documents/files/secure-boot-and-image-authentication-technical-overview.pdf
- Gross, Tobias, Matanat Ahmadova, and Tilo Muller. "Analyzing Android's File-Based Encryption: Information Leakage through Unencrypted Metadata." Proceedings of the 14th International Conference on Availability, Reliability and Security. ACM, 2019
- AOSP, "Encryption-Metadata encryption", https://source.android.com/security/encryption