Project

General

Profile

AcademicPapersAndPresentations » History » Revision 2

Revision 1 (Denis 'GNUtoo' Carikli, 07/22/2020 11:44 PM) → Revision 2/14 (Denis 'GNUtoo' Carikli, 07/22/2020 11:45 PM)

h1. AcademicPapers 

 h2. Forensics acquisition - Analysis and circumvention of samsung secure boot enforced common criteria mode 

 Name: Forensics acquisition - Analysis and circumvention of samsung secure boot enforced common criteria mode 
 Link: https://www.sciencedirect.com/science/article/pii/S1742287618300409 
 License: CC BY-NC-ND 

 h3. Description: 

 While this paper directly applies to the Galaxy S6 (SM-G920F) and the Galaxy S7 Edge (SM-G935F) witch uses Exynos System On a Chip, some of its findings seem to be directly applicable to the devices supported by Replicant. 

 The most interesting part is the analysis of some of the bootloader environment variables: 
 * It analyzes some variables that accessible through the UART. We already have "documentation explained how to access such variables":https://redmine.replicant.us/projects/replicant/wiki/MidasBootloader#Changing-the-kernel-commandline-arguments but many variables aren't documented in the Replicant documentation. 
 * It also analyzed some variables present in the adv-env.img file inside the PARAM tarball filesystem. That information has already been used in the #2094 bug. 

 h2. Security Analysis of Android Factory Resets 

 Name: Security Analysis of Android Factory Resets 
 Link: https://www.cl.cam.ac.uk/~rja14/Papers/fr_most15.pdf