{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T00:00:45Z","timestamp":1729641645041,"version":"3.28.0"},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,7]]},"DOI":"10.1109\/pst.2014.6890937","type":"proceedings-article","created":{"date-parts":[[2014,9,10]],"date-time":"2014-09-10T11:43:34Z","timestamp":1410349414000},"page":"172-178","source":"Crossref","is-referenced-by-count":1,"title":["A forensic analysis framework for recovering encryption keys and BB10 backup decryption"],"prefix":"10.1109","author":[{"given":"Halima","family":"Al Shehhi","sequence":"first","affiliation":[]},{"given":"Dua'a","family":"Abu Hamdi","sequence":"additional","affiliation":[]},{"given":"IzzEddin","family":"Asad","sequence":"additional","affiliation":[]},{"given":"Farkhund","family":"Iqbal","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1145\/2016039.2016088"},{"key":"17","doi-asserted-by":"crossref","first-page":"57s","DOI":"10.1016\/j.diin.2010.05.008","article-title":"Extracting Windows command line details from physical memory","volume":"7","author":"casey","year":"2010","journal-title":"Digital Investigation"},{"journal-title":"Handbook of Digital Forensics and Investigation","year":"2009","author":"casey","key":"18"},{"journal-title":"TrueCrypt Foundation TrueCrypt Free Open-Source Disk Encryption Software for Windows","year":"2013","key":"15"},{"journal-title":"Physical Memory Forensics USA BlackHat","year":"2006","author":"burdach","key":"16"},{"journal-title":"Passware Password Recovery Kit Forensic N p N d Web Internet","year":"2014","key":"13"},{"journal-title":"Corporate &Forensic Solutions Forensic Access to Encrypted BitLocker PGP and TrueCrypt Disks and Containers","year":"2014","key":"14"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.4304\/jcp.4.1.3-10"},{"key":"12","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1145\/1368506.1368519","article-title":"The impact of full disk encryption on digital forensics","volume":"42","author":"gerasimos","year":"2008","journal-title":"ACM SIGOPS Operating Systems Review"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36492-7_19"},{"journal-title":"The Senator Patrick Leahy Center for Digital Investigation Champlain College","year":"2012","author":"stamm","key":"20"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.9790\/3021-03812329"},{"journal-title":"Forensic Examination of A RIM (BlackBerry) Wireless Device","year":"2002","author":"burnette","key":"1"},{"key":"10","article-title":"Security of hard disk encryption","author":"yousuf","year":"2013","journal-title":"School of Information and Communication Technology (ICT)"},{"key":"7","first-page":"1","article-title":"Mobile device analysis","volume":"2","author":"punja","year":"2008","journal-title":"Small Scale Digital Device Forensics Journal"},{"key":"6","doi-asserted-by":"crossref","first-page":"132","DOI":"10.1016\/j.diin.2009.06.002","article-title":"The persistence of memory: Forensic identification and extraction of cryptographic keys","volume":"6","author":"carsten","year":"2009","journal-title":"Digital Investigation"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/1506409.1506429"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.4304\/jcp.5.4.541-548"},{"key":"9","article-title":"Oops they did it again: The2007 Australian study of remnant data contained on 2nd hand hard disks","author":"valli","year":"2007","journal-title":"Paper Presented at the Australian Digital Forensics Conference"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/SCORED.2009.5443431"}],"event":{"name":"2014 Twelfth Annual Conference on Privacy, Security and Trust (PST)","start":{"date-parts":[[2014,7,23]]},"location":"Toronto, ON, Canada","end":{"date-parts":[[2014,7,24]]}},"container-title":["2014 Twelfth Annual International Conference on Privacy, Security and Trust"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6883276\/6890911\/06890937.pdf?arnumber=6890937","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T16:12:51Z","timestamp":1498147971000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6890937\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,7]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/pst.2014.6890937","relation":{},"subject":[],"published":{"date-parts":[[2014,7]]}}}