{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:20:45Z","timestamp":1750306845637,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,11,8]],"date-time":"2013-11-08T00:00:00Z","timestamp":1383868800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,11,8]]},"DOI":"10.1145\/2516760.2516771","type":"proceedings-article","created":{"date-parts":[[2013,11,12]],"date-time":"2013-11-12T15:29:36Z","timestamp":1384270176000},"page":"3-14","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":13,"title":["Deadbolt"],"prefix":"10.1145","author":[{"given":"Adam","family":"Skillen","sequence":"first","affiliation":[{"name":"Carleton University, Ottawa, Ontario, Canada"}]},{"given":"David","family":"Barrera","sequence":"additional","affiliation":[{"name":"Carleton University, Ottawa, Ontario, Canada"}]},{"given":"Paul C.","family":"van Oorschot","sequence":"additional","affiliation":[{"name":"Carleton University, Ottawa, Ontario, Canada"}]}],"member":"320","published-online":{"date-parts":[[2013,11,8]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Android Open Source Project. Notes on the implementation of encryption in Android 3.0. Online document (Feb. 2011). http:\/\/source.android.com\/tech\/encryption\/android_crypto_implementation.html.  Android Open Source Project. Notes on the implementation of encryption in Android 3.0. Online document (Feb. 2011). http:\/\/source.android.com\/tech\/encryption\/android_crypto_implementation.html."},{"key":"e_1_3_2_1_2_1","unstructured":"Apple. iOS security. Technical document (Oct. 2012). http:\/\/www.apple.com\/ipad\/business\/docs\/iOS_Security_Oct12.pdf.  Apple. iOS security. Technical document (Oct. 2012). http:\/\/www.apple.com\/ipad\/business\/docs\/iOS_Security_Oct12.pdf."},{"key":"e_1_3_2_1_3_1","unstructured":"ARM. Cortex-A8 technical reference manual. Technical document (2007). http:\/\/infocenter.arm.com\/help\/topic\/com.arm. doc.ddi0344d\/DDI0344D_cortex_a8_r2p1_trm.pdf.  ARM. Cortex-A8 technical reference manual. Technical document (2007). http:\/\/infocenter.arm.com\/help\/topic\/com.arm. doc.ddi0344d\/DDI0344D_cortex_a8_r2p1_trm.pdf."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2420950.2420961"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/1700527.1700744"},{"volume-title":"USENIX Security Symposium","year":"2005","author":"Chow J.","key":"e_1_3_2_1_6_1"},{"key":"e_1_3_2_1_7_1","unstructured":"DMCrypt. dm-crypt: Linux kernel device mapper crypto target. Online document (July 2012). https:\/\/code.google.com\/p\/cryptsetup\/wiki\/DMCrypt.  DMCrypt. dm-crypt: Linux kernel device mapper crypto target. Online document (July 2012). https:\/\/code.google.com\/p\/cryptsetup\/wiki\/DMCrypt."},{"volume-title":"USENIX Operating Systems Design and Implementation (OSDI'12)","year":"2012","author":"Dunn A. M.","key":"e_1_3_2_1_8_1"},{"key":"e_1_3_2_1_9_1","unstructured":"N. Ferguson. AES-CBC + Elephant diffuser: A Disk Encryption Algorithm for Windows Vista. Technical document (Aug. 2006). http:\/\/download.microsoft.com\/download\/0\/2\/3\/0238acaf-d3bf-4a6d-b3d6-0a0be4bbb36e\/bitlockercipher200608.pdf.  N. Ferguson. AES-CBC + Elephant diffuser: A Disk Encryption Algorithm for Windows Vista. Technical document (Aug. 2006). http:\/\/download.microsoft.com\/download\/0\/2\/3\/0238acaf-d3bf-4a6d-b3d6-0a0be4bbb36e\/bitlockercipher200608.pdf."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2013.23"},{"volume-title":"USENIX Security Symposium, Washington, D.C.","year":"2001","author":"Gutmann P.","key":"e_1_3_2_1_11_1"},{"volume-title":"USENIX Security Symposium","year":"2008","author":"Halderman J. A.","key":"e_1_3_2_1_12_1"},{"key":"e_1_3_2_1_13_1","first-page":"0","volume":"200","author":"Heninger N.","journal-title":"J. Feldman. AESKeyFinder"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"B. Kaliski. PKCS #5: Password-based cryptography specification version 2.0 Sept. 2000. RFC 2898 (informational).   B. Kaliski. PKCS #5: Password-based cryptography specification version 2.0 Sept. 2000. RFC 2898 (informational).","DOI":"10.17487\/rfc2898"},{"key":"e_1_3_2_1_15_1","unstructured":"Linux Kernel. dm-crypt.c: Linux kernel source. Source Code (July 2013). https:\/\/git.kernel.org\/cgit\/linux\/kernel\/git\/torvalds\/linux.git\/tree\/drivers\/md\/dm-crypt.c.  Linux Kernel. dm-crypt.c: Linux kernel source. Source Code (July 2013). https:\/\/git.kernel.org\/cgit\/linux\/kernel\/git\/torvalds\/linux.git\/tree\/drivers\/md\/dm-crypt.c."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046712"},{"key":"e_1_3_2_1_17_1","unstructured":"Microsoft. Windows Phone 8 security overview v1.1. Technical document (Dec. 2012). http:\/\/go.microsoft.com\/fwlink\/?LinkId=266838.  Microsoft. Windows Phone 8 security overview v1.1. Technical document (Dec. 2012). http:\/\/go.microsoft.com\/fwlink\/?LinkId=266838."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1752046.1752053"},{"volume-title":"USENIX Security Symposium","year":"2011","author":"Muller T.","key":"e_1_3_2_1_19_1"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38980-1_23"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31284-7_5"},{"volume-title":"Black Hat","year":"2011","author":"Ooi T.","key":"e_1_3_2_1_22_1"},{"volume-title":"Technologies for Homeland Security (HST 2010","year":"2010","author":"Peterson P.","key":"e_1_3_2_1_23_1"},{"key":"e_1_3_2_1_24_1","unstructured":"RIM. Blackberry enterprise server 5.0.2{security technical overview. Technical document (Mar. 2011). http:\/\/docs.blackberry.com\/en\/admin\/deliverables\/16648\/.  RIM. Blackberry enterprise server 5.0.2{security technical overview. Technical document (Mar. 2011). http:\/\/docs.blackberry.com\/en\/admin\/deliverables\/16648\/."},{"volume-title":"USENIX Security Symposium","year":"2012","author":"Riva O.","key":"e_1_3_2_1_25_1"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/SysSec.2011.10"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"crossref","unstructured":"J. Schaad and R. Housley. Advanced Encryption Standard (AES) key wrap algorithm Sept. 2002. IETF RFC 3394.   J. Schaad and R. Housley. Advanced Encryption Standard (AES) key wrap algorithm Sept. 2002. IETF RFC 3394.","DOI":"10.17487\/rfc3394"},{"volume-title":"Financial Cryptography (FC'99)","year":"1999","author":"Shamir A.","key":"e_1_3_2_1_28_1"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2076732.2076743"},{"volume-title":"Network and Distributed System Security Symposium (NDSS 2013","year":"2013","author":"Skillen A.","key":"e_1_3_2_1_30_1"},{"key":"e_1_3_2_1_31_1","unstructured":"J. Sylve. LiME - Linux memory extractor source code 2013. Presented at ShmooCon'12. Version 1.1 (Mar. 2013). https:\/\/code.google.com\/p\/lime-forensics\/.  J. Sylve. LiME - Linux memory extractor source code 2013. Presented at ShmooCon'12. Version 1.1 (Mar. 2013). https:\/\/code.google.com\/p\/lime-forensics\/."},{"volume-title":"USENIX Operating Systems Design and Implementation (OSDI'12)","year":"2012","author":"Tang Y.","key":"e_1_3_2_1_32_1"},{"key":"e_1_3_2_1_33_1","unstructured":"THC. Secure-delete toolkit 2003. Version 3.1 (Nov. 2003). http:\/\/www.thc.org\/releases.php?q=delete.  THC. Secure-delete toolkit 2003. Version 3.1 (Nov. 2003). http:\/\/www.thc.org\/releases.php?q=delete."},{"key":"e_1_3_2_1_34_1","unstructured":"K. Wadner. iOS security. Technical document (July 2011). http:\/\/www.sans.org\/reading_room\/whitepapers\/pda\/security-implications-ios_33724.  K. Wadner. iOS security. Technical document (July 2011). http:\/\/www.sans.org\/reading_room\/whitepapers\/pda\/security-implications-ios_33724."}],"event":{"name":"CCS'13: 2013 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Berlin Germany","acronym":"CCS'13"},"container-title":["Proceedings of the Third ACM workshop on Security and privacy in smartphones &amp; mobile devices"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2516760.2516771","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2516760.2516771","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:10:12Z","timestamp":1750234212000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2516760.2516771"}},"subtitle":["locking down android disk encryption"],"short-title":[],"issued":{"date-parts":[[2013,11,8]]},"references-count":34,"alternative-id":["10.1145\/2516760.2516771","10.1145\/2516760"],"URL":"https:\/\/doi.org\/10.1145\/2516760.2516771","relation":{},"subject":[],"published":{"date-parts":[[2013,11,8]]},"assertion":[{"value":"2013-11-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}