{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T07:50:22Z","timestamp":1725954622436},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642411472"},{"type":"electronic","value":"9783642411489"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-41148-9_23","type":"book-chapter","created":{"date-parts":[[2013,10,9]],"date-time":"2013-10-09T18:47:31Z","timestamp":1381344451000},"page":"349-363","source":"Crossref","is-referenced-by-count":1,"title":["Security Analysis and Decryption of Filevault 2"],"prefix":"10.1007","author":[{"given":"Omar","family":"Choudary","sequence":"first","affiliation":[]},{"given":"Felix","family":"Grobert","sequence":"additional","affiliation":[]},{"given":"Joachim","family":"Metz","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"23_CR1","unstructured":"Apple, Source Browser, Cupertino, California (\n                    \n                      opensource.apple.com\/source\/xnu\/xnu-1699.24.8\/bsd\/dev\/random\n                    \n                    \n                  ), 2010."},{"key":"23_CR2","unstructured":"Apple, About the security content of OS X Lion v10.7.2 and security update 2011-006, Cupertino, California (\n                    \n                      support.apple.com\/kb\/HT5002\n                    \n                    \n                  ), 2011."},{"key":"23_CR3","volume-title":"File System Forensic Analysis","author":"B. Carrier","year":"2005","unstructured":"B. Carrier, File System Forensic Analysis, Pearson Education, Upper Saddle River, New Jersey, 2005."},{"key":"23_CR4","unstructured":"Check Point Software Technologies, Check Point Full Disk Encryption, San Carlos, California (\n                    \n                      www.checkpoint.com\/products\/full-disk-encryption\n                    \n                    \n                  ), 2013."},{"key":"23_CR5","unstructured":"O. Choudary and J. Metz, libfvde: Library and tools to access FileVault Drive Encryption (FVDE) encrypted volumes (\n                    \n                      code.google.com\/p\/libfvde\n                    \n                    \n                  ), 2013."},{"key":"23_CR6","unstructured":"Dell, Credant Enterprise Edition for Mac, Round Rock, Texas (\n                    \n                      www.credant.com\/products\/cmg-enterprise-edition\/cmg-enterprise-edition-for-mac.html\n                    \n                    \n                  ), 2013."},{"key":"23_CR7","unstructured":"M. Dornseif, Owned by an iPod, presented at the PacSec Conference, 2004."},{"issue":"1","key":"23_CR8","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1145\/1609956.1609966","volume":"13","author":"L. Dorrendorf","year":"2009","unstructured":"L. Dorrendorf, Z. Gutterman and B. Pinkas, Cryptanalysis of the random number generator of the Windows operating system, ACM Transactions on Information and System Security, vol. 13(1), article no. 10, 2009.","journal-title":"ACM Transactions on Information and System Security"},{"key":"23_CR9","unstructured":"N. Ferguson, AES-CBC + Elephant Difusser: A Disk Encryption Algorithm for Windows Vista, Technical Report, Microsoft, Redmond, Washington, 2006."},{"key":"23_CR10","volume-title":"Practical Cryptography","author":"N. Ferguson","year":"2003","unstructured":"N. Ferguson and B. Schneier, Practical Cryptography, Wiley, Indianapolis, Indiana, 2003."},{"key":"23_CR11","unstructured":"C. Fruhwirth, New Methods in Hard Disk Encryption, Theory and Logic Group, Institute for Computer Languages, Vienna University of Technology, Vienna, Austria (\n                    \n                      clemens.endorphin.org\/nmihde\/nmihde-A4-ds.pdf\n                    \n                    \n                  ), 2005."},{"key":"23_CR12","first-page":"371","volume-title":"Proceedings of the IEEE Symposium on Security and Privacy","author":"Z. Gutterman","year":"2006","unstructured":"Z. Gutterman, B. Pinkas and T. Reinman, Analysis of the Linux random number generator, Proceedings of the IEEE Symposium on Security and Privacy, pp. 371\u2013385, 2006."},{"issue":"5","key":"23_CR13","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1145\/1506409.1506429","volume":"52","author":"J. Halderman","year":"2009","unstructured":"J. Halderman, S. Schoen, N. Heninger, W. Clarkson, W. Paul, J. Calandrino, A. Feldman, J. Appelbaum and E. Felten, Lest we remember: Cold boot attacks on encryption keys, Communications of the ACM, vol. 52(5), pp. 91\u201398, 2009.","journal-title":"Communications of the ACM"},{"key":"23_CR14","doi-asserted-by":"crossref","unstructured":"B. Kalisky, PKCS #5: Password-Based Cryptography Specification Version 2.0, RFC 2898, 2000.","DOI":"10.17487\/rfc2898"},{"key":"23_CR15","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1007\/3-540-46513-8_2","volume-title":"Proceedings of the Sixth International Workshop on Selected Areas in Cryptography","author":"J. Kelsey","year":"2000","unstructured":"J. Kelsey, B. Schneier and N. Ferguson, Yarrow-160: Notes on the design and analysis of the Yarrow cryptographic pseudorandom number generator, Proceedings of the Sixth International Workshop on Selected Areas in Cryptography, pp. 13\u201333, 2000."},{"issue":"3","key":"23_CR16","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1109\/MSP.2010.111","volume":"8","author":"L. Martin","year":"2010","unstructured":"L. Martin, XTS: A mode of AES for encrypting hard disks, IEEE Security and Privacy, vol. 8(3), pp. 68\u201369, 2010.","journal-title":"IEEE Security and Privacy"},{"key":"23_CR17","unstructured":"National Institute of Standards and Technology, Specification for the Advanced Encryption Standard (AES), Federal Information Processing Standards Publication 197, Gaithersburg, Maryland, 2001."},{"key":"23_CR18","doi-asserted-by":"crossref","unstructured":"K. Raeburn, Advanced Encryption Standard (AES) Encryption for Kerberos 5, RFC 3962, 2005.","DOI":"10.17487\/rfc3962"},{"key":"23_CR19","first-page":"16","volume-title":"Proceedings of the Tenth International Conference on the Theory and Application of Cryptology and Information Security","author":"P. Rogaway","year":"2004","unstructured":"P. Rogaway, Efficient instantiations of tweakable block ciphers and refinements to modes OCB and PMAC, Proceedings of the Tenth International Conference on the Theory and Application of Cryptology and Information Security, pp. 16\u201331, 2004."},{"key":"23_CR20","doi-asserted-by":"crossref","unstructured":"J. Schaad and R. Housley, Advanced Encryption Standard (AES) Key Wrap Algorithm, RFC 3394, 2002.","DOI":"10.17487\/rfc3394"},{"key":"23_CR21","unstructured":"Sophos, SafeGuard Enterprise, Abingdon, United Kingdom (\n                    \n                      www.sophos.com\/en-us\/products\/encryption\/safeguard-enterprise.aspx\n                    \n                    \n                  ), 2013."},{"key":"23_CR22","unstructured":"Symantec, Symantec Drive Encryption, Mountain View, California (\n                    \n                      www.symantec.com\/drive-encryption\n                    \n                    \n                  ), 2013."},{"key":"23_CR23","unstructured":"TrueCrypt Foundation, TrueCrypt (\n                    \n                      www.truecrypt.org\n                    \n                    \n                  ), 2012."},{"key":"23_CR24","unstructured":"WinMagic, SecureDoc for Mac, Mississauga, Canada (\n                    \n                      www.winma\n                    \n                    \n                  \n                           \n                    \n                      gic.com\/products\/full-disk-encryption-for-mac\n                    \n                    \n                  ), 2013."}],"container-title":["IFIP Advances in Information and Communication Technology","Advances in Digital Forensics IX"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-41148-9_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,17]],"date-time":"2019-05-17T21:48:03Z","timestamp":1558129683000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-41148-9_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642411472","9783642411489"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-41148-9_23","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2013]]}}}