{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,17]],"date-time":"2025-09-17T16:50:57Z","timestamp":1758127857846},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,9,28]]},"DOI":"10.23919\/mipro48935.2020.9245397","type":"proceedings-article","created":{"date-parts":[[2020,11,6]],"date-time":"2020-11-06T21:51:34Z","timestamp":1604699494000},"page":"1236-1241","source":"Crossref","is-referenced-by-count":3,"title":["Overview of Mac system security and its impact on digital forensics process"],"prefix":"10.23919","author":[{"given":"D.","family":"Sladovic","sequence":"first","affiliation":[]},{"given":"D.","family":"Topolcic","sequence":"additional","affiliation":[]},{"given":"D.","family":"Delija","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"MacQuisition 2019 R1 2","year":"2019","key":"ref10"},{"journal-title":"Quick Start Guide","article-title":"BlackBag Technoligies","year":"2020","key":"ref11"},{"journal-title":"Recom Imager","year":"2020","key":"ref12"},{"year":"2017","key":"ref13","article-title":"Recom Imager - Booting up and Interface Overview"},{"key":"ref14","article-title":"How to encrypt your Mac with FileVault 2","author":"macworld","year":"2015","journal-title":"and why you absolutely should"},{"journal-title":"FileVault and brute force attack protection","year":"2018","key":"ref15"},{"journal-title":"Matt Cards","article-title":"Technology for your Mac repair business","year":"2020","key":"ref16"},{"journal-title":"FileVault","year":"2018","key":"ref17"},{"journal-title":"org Cracking FileVault 2 (HFS+ or APFS)","year":"2019","key":"ref18"},{"journal-title":"Recom Imager","year":"2020","key":"ref19"},{"article-title":"Apple iMac Pro and Secure Storage","year":"2018","author":"pepijn","key":"ref4"},{"key":"ref3","article-title":"Computer Evidence Recovery","author":"ripa","year":"2016","journal-title":"Forensic Acquisition of Mac Computers"},{"journal-title":"MackBook Air firmware password","year":"2014","key":"ref6"},{"key":"ref5","article-title":"The Mac Observer","author":"john","year":"2019","journal-title":"How Apple&#x2019;s T2 Security Chip Affects Your Disk Storage"},{"journal-title":"PIN & icloud Apple iMac Macbook","article-title":"Service Forum, Unlocking firmware","year":"2013","key":"ref8"},{"journal-title":"Storing Keys in the Secure Enclave","year":"2020","key":"ref7"},{"article-title":"Sans: Mac and iOS Forensic Analysis and Incident Response (2020)","year":"0","author":"sarah","key":"ref2"},{"key":"ref1","first-page":"101","article-title":"Practical Cyber Forensics, Apress","author":"niranjan","year":"2019"},{"article-title":"Insights Blog, Apple T2 Chip Systems: Create Decrypted Physical Images With MacQuisition","year":"2019","author":"ashley","key":"ref9"},{"journal-title":"John the Ripper Password Cracker","year":"2020","key":"ref20"},{"journal-title":"GitHub hashcat","year":"2020","key":"ref21"}],"event":{"name":"2020 43rd International Convention on Information, Communication and Electronic Technology (MIPRO)","start":{"date-parts":[[2020,9,28]]},"location":"Opatija, Croatia","end":{"date-parts":[[2020,10,2]]}},"container-title":["2020 43rd International Convention on Information, Communication and Electronic Technology (MIPRO)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9245088\/9245075\/09245397.pdf?arnumber=9245397","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,6]],"date-time":"2020-11-06T23:13:48Z","timestamp":1604704428000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9245397\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,9,28]]},"references-count":21,"URL":"https:\/\/doi.org\/10.23919\/mipro48935.2020.9245397","relation":{},"subject":[],"published":{"date-parts":[[2020,9,28]]}}}