Akademska digitalna zbirka SLovenije - logo

Rezultati iskanja

Osnovno iskanje    Izbirno iskanje   
Iskalna
zahteva
Knjižnica

Trenutno NISTE avtorizirani za dostop do e-virov konzorcija SI. Za polni dostop se PRIJAVITE.

1 2
zadetkov: 16
1.
  • Windows 11 and the dawn of ... Windows 11 and the dawn of the TPM - a forensically sound way to beat it
    Mendis, Sriyal Australian journal of forensic sciences, 05/2024, Letnik: 56, Številka: Supp1
    Journal Article
    Recenzirano

    As technology evolves so do challenges faced by the digital forensic examiner. An increasingly frequent obstacle appearing now is the BitLocker encryption in conjunction with the Trusted Platform ...
Celotno besedilo
Dostopno za: BFBNIB, GIS, IJS, KISLJ, NUK, PNG, UL, UM, UPUK
2.
  • Forensic method for decrypt... Forensic method for decrypting TPM-protected BitLocker volumes using Intel DCI
    Bichara de Assumpção, Matheus; Reis, Marcelo Abdalla dos; Marcondes, Marcos Roberto ... Forensic Science International: Digital Investigation, March 2023, 2023-03-00, Letnik: 44
    Journal Article
    Recenzirano
    Odprti dostop

    Starting from Windows 11, the Trusted Platform Module (TPM) 2.0 has become a computer requirement, providing hardware-based security capabilities. This poses a challenge to digital forensics experts, ...
Celotno besedilo
Dostopno za: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UILJ, UL, UM, UPCLJ, UPUK, ZAGLJ, ZRSKP
3.
  • Self-Encrypting Deception: Weaknesses in the Encryption of Solid State Drives
    Meijer, Carlo; van Gastel, Bernard 2019 IEEE Symposium on Security and Privacy (SP)
    Conference Proceeding
    Odprti dostop

    We have analyzed the hardware full-disk encryption of several solid state drives (SSDs) by reverse engineering their firmware. These drives were produced by three manufacturers between 2014 and 2018, ...
Celotno besedilo
Dostopno za: IJS, NUK, UL, UM

PDF
4.
  • BitLocker Full-Disk Encryption BitLocker Full-Disk Encryption
    Lewis, Stephen G.; Palumbo, Timothy Proceedings of the 2018 ACM SIGUCCS Annual Conference, 09/2018
    Conference Proceeding

    Microsoft BitLocker full-disk encryption has been widely implemented at Lehigh University since 2014 on both laptop and desktop computers. This retrospective review will summarize BitLocker's ...
Celotno besedilo
Dostopno za: NUK, UL
5.
  • Windows To Go Windows To Go
    Lewis, Stephen G. Proceedings of the 2015 ACM SIGUCCS Annual Conference, 11/2015
    Conference Proceeding

    Windows To Go (WTG) is an oft-overlooked feature first included with Windows 8 Enterprise Edition. WTG allows for the effortless creation of portable USB-based Windows 8 (and later) operating system ...
Celotno besedilo
Dostopno za: NUK, UL
6.
  • Implementing BitLocker Driv... Implementing BitLocker Drive Encryption for forensic analysis
    Kornblum, Jesse D. Digital investigation, 03/2009, Letnik: 5, Številka: 3
    Journal Article

    This paper documents the BitLocker Drive Encryption system included with some versions of Microsoft's Windows Vista. In particular it describes the key management system, the algorithms and modes ...
Celotno besedilo
Dostopno za: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UILJ, UL, UM, UPCLJ, UPUK, ZAGLJ, ZRSKP
7.
  • Research on Trusted Computi... Research on Trusted Computing Implementations in Windows
    Shu-xia Wang; Yin-chuan Wang; Wei-zhen Tian 2010 International Conference of Information Science and Management Engineering, 2010-Aug., Letnik: 1
    Conference Proceeding

    The main theme of this paper is to analyze Microsoft's implementations of Trusted Computing in Windows NGSCB. First of all, set in the two most important components of trusted computing system, which ...
Celotno besedilo
Dostopno za: IJS, NUK, UL, UM
8.
  • State of the Art in Trusted... State of the Art in Trusted Computing Forensics
    Halboob, Waleed; Mahmod, Ramlan Future Information Technology, Application, and Service
    Book Chapter

    The release of trusted computing (TC) technology and its features, such as full disk encryption, has had several implications on the digital forensic investigation process. Today, it is clear from ...
Celotno besedilo
9.
  • Windows Vista and digital i... Windows Vista and digital investigations
    Hargreaves, Christopher; Chivers, Howard; Titheridge, Dave Digital investigation, 09/2008, Letnik: 5, Številka: 1
    Journal Article

    Several of the new features of Windows Vista may create challenges for digital investigators. However, some also provide opportunities and create interesting new evidential artefacts which can be ...
Celotno besedilo
Dostopno za: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UILJ, UL, UM, UPCLJ, UPUK, ZAGLJ, ZRSKP
10.
  • Towards successful forensic... Towards successful forensic recovery of bitlocked volumes
    Dija, S.; Balan, C.; Anoop, V. ... 2011 6th International Conference on System of Systems Engineering, 2011-June
    Conference Proceeding

    Innovations in digital storage technologies pose challenges to cyber crime investigators. BitLocker Drive Encryption is such a new technology that is available in Windows 2008 and in ultimate and ...
Celotno besedilo
Dostopno za: IJS, NUK, UL, UM
1 2
zadetkov: 16

Nalaganje filtrov