European Commission logo
English English
CORDIS - EU research results
CORDIS

Extract Forensic Information for LEAs from Encrypted SmartPhones

Deliverables

Vulnerabilities analysis and attack scenarios description

This document presents the results of the vulnerabilities analysis of selected targets against physical attacks especially SCA and FI of them These results are converted to attack scenarios that are also described in this report

Ethical framework for forensic research

This deliverable contains an ethical framework created to assess digital forensic research outcomes for confidentiality purposes Furthermore the deliverable has ethical recommendations and good practices that a forensic researcher can follow

Report on Target and Lab set-up preparation

This report contains technical details of Targets preparation which on the attack scenarios are applied In addition to experiments setup such as generation trigger method and test bench description

Updated plan and initial report on dissemination and communication activities

This report provides an updated plan and initial report on the partners dissemination and communication activities of the first 18 months

TEE security study

This report presents an opensource TEE on the angle of security It also presents a whitebox implementation

Draft of Regulatory and Ethical Recommendation and good practices

This deliverable contains information from D21 D22 D23 and other WPs and includes legal and ethical recommendations for a harmonised legislation between the countries involved in the project and ethical guidelines for LEAs

Study on the use and conservation of methods by law enforcement

This deliverable describes the procedural rules regarding the use of the EXFILES developed methods by LEAs and judicial authorities in the countries relevant to the project It includes a risk evaluation of the method used to extract data from secure or encrypted phones as well as legal protection of confidentiality of the method in each judiciary system of the countries involved in the project

Complementary Supporting Tools Development

This deliverable contains a description of generic tools and techniques dedicated to improve efficiency in a blackbox forensic context It describes developed solutions for specific problems encountered in a forensic blackbox environment in the form of a scientific paper

Final report on dissemination and communication activities

This deliverable includes the dissemination and communication activities and reports the executed activities This report will also address activities beyond project lifetime This is a cumulative report an update of D72

Project quality plan

The project quality plan the project handbook constitutes a set of project templates explanations on the project management process review process quality checks meeting organisation which is communicated to all partners

Public engagement strategies to build trust in digital forensics activities

This report provides coverage of public engagements carried out during the project and the strategies useful to build publics trust in security and privacy within the context of LEAs ability to carry out forensic activities This is a cumulative report that includes the discussion on legal and ethical challenges along with public perception of EXFILES objectives

State of the art in mobile forensics

This report contains all the information obtained during the development of the Tasks 11 and 13 therefore it is focused on the following aspects 1 Show the market study done in Europe for the most used smartphones including hardware and software information of each one 2 State of the art of all the techniques used in the forensic field to obtain the digital data of smartphones

Fundamental support study on Encryption and Fundamental Rights

This deliverable provides a national and European framework of legal aspects involved in encryption processes It also details and analyses the case law in each national legislation of the project Finally the study intends to produce a legal analysis of the acceptability of EXFILES by LEAs and the public as regard to LEAs expectations and Fundamental Rights

Hands-on trainings for contributors

This deliverable is dedicated for training of the members who are using the labsetup of D52 and the analysis software in order to efficiently conduct work on Task 53 Every applicable member can request standard SCA software to perform analysis of collected data on their own location The SCA Online training will be available to the participants during the project to refresh knowledge or for new Security Analysts who need to work with the SCA softwareThese standard handson and online trainings are common RISCURE trainings and not specifically designed for this project For the toolenhancements focussing on forensics RISCURE will design specific training material as part of the project

EXFILES General Toolbox

The EXFILES general toolbox package of general analysis tools that can be released to public

Internal and external IT communication infrastructure and project website

The external IT communication infrastructure constitutes a guideline for communication of the EXFILES project to external target groups including conferences marketing measures and communication channels Furthermore this deliverable constitutes the launch of the internal EXFILES communication infrastructure including the establishment of mailing lists a subversion repository server and the EXFILES website

Publications

A new model for forensic data extraction from encrypted mobile devices

Author(s): Aya Fukami; Aya Fukami; Radina Stoykova; Radina Stoykova; Zeno Geradts; Zeno Geradts
Published in: Forensic Science International: Digital Investigation, Issue Volume 38, 2021, ISSN 2666-2817
Publisher: Elsevier Ltd.
DOI: 10.1016/j.fsidi.2021.301169

Physical Fault Injection and Side-Channel Attacks on Mobile Devices: A Comprehensive Analysis

Author(s): Carlton Shepherd, Konstantinos Markantonakis, Nico van Heijningen, Driss Aboulkassimi, Clement Gaine, Thibaut Heckmann, David Naccache
Published in: Computers & Security, Issue Volume 111, 2021, ISSN 0167-4048
Publisher: Pergamon Press Ltd.
DOI: 10.1016/j.cose.2021.102471

Investigating Black-Box Function Recognition Using Hardware Performance Counters

Author(s): Carlton Shepherd, Benjamin Semal, Konstantinos Markantonakis
Published in: IEEE Transactions on Computers, 2022, ISSN 0018-9340
Publisher: Institute of Electrical and Electronics Engineers
DOI: 10.1109/tc.2022.3226302

LIRA-V: Lightweight Remote Attestation for Constrained RISC-V Devices

Author(s): Carlton Shepherd, Konstantinos Markantonakis, Georges-Axel Jaloyan
Published in: IEEE Workshop on the Internet of Safe Things (in conjunction with IEEE Security & Privacy '21), 2021
Publisher: IEEE

Combined Fault Injection and Real-Time Side-Channel Analysis for Android Secure-Boot Bypassing

Author(s): Clément Fanjas, Clément Gaine, Driss Aboulkassimi, Simon Pontié, Olivier Potin
Published in: Smart Card Research and Advanced Applications: 21st International Conference, CARDIS 2022, Birmingham, UK, November 7–9, 2022, Revised Selected Papers, 2023
Publisher: Springer
DOI: 10.1007/978-3-031-25319-5_2

Searching for OpenAIRE data...

There was an error trying to search data from OpenAIRE

No results available