Systematic Literature Review of EM-SCA Attacks on Encryption

MR Zunaidi, A Sayakkara, M Scanlon - arXiv preprint arXiv:2402.10030, 2024 - arxiv.org
Cryptography is vital for data security, but cryptographic algorithms can still be vulnerable to
side-channel attacks (SCAs), physical assaults exploiting power consumption and EM …

Cryptographic Techniques for Data Privacy in Digital Forensics

TB Ogunseyi, OM Adedayo - IEEE Access, 2023 - ieeexplore.ieee.org
The acquisition and analysis of data in digital forensics raise different data privacy
challenges. Many existing works on digital forensic readiness discuss what information …

An Effective Strategy for Ransomware Mitigation on Android Devices via Android OS File System API

M Ozturk, B Yilmaz, Z Arslan, A Demirbas - 2024 - researchsquare.com
The development and effectiveness of an API-based system for mitigating ransomware
threats on Android devices was explored in this study. Leveraging the Android/Linux file …

[PDF][PDF] ИСПОЛЬЗОВАНИЕ СПЕЦИАЛЬНЫХ ЗНАНИЙ ПРИ ПОЛУЧЕНИИ ДОКАЗАТЕЛЬСТВЕННОЙ ИНФОРМАЦИИ ИЗ IoT-УСТРОЙСТВ

АК Баяндурян - Цифровые технологии и право, 2022 - ieml.ru
Статья посвящена изучению IoT-устройств как потенциальных носителей
криминалистически важной информации. Затрагивается понятие цифровой …