Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Safety, Risk, Reliability and Quality,Information Systems,Software
Reference30 articles.
1. Türpe, S., et al.: Attacking the bitlocker boot process. Trust 2009. Lecture Notes in Computer Science, vol 5471. Springer
2. Han, S., Park, J.: BitLeaker: subverting bitlocker with one vulnerability. Blackhat Europe (2019). https://www.blackhat.com/eu-19/briefings/schedule/index.html#bitleaker-subverting-bitlocker-with-one-vulnerability-17245
3. Halderman, J.: Lest we remember: cold-boot attacks on encryption keys. Commun. ACM 52(5), 91–98 (2009)
4. Elcomsoft Forensic Disk Decryptor. https://www.elcomsoft.com/efdd.html. Checked on May 20 (2018)
5. Elcomsoft blog post. https://blog.elcomsoft.com/2016/07/breaking-bitlocker-encryption-brute-forcing-the-backdoor-part-ii
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Parallel Implementation of SHA256 on Multizone Heterogeneous Systems;2023 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom);2023-12-21
2. faulTPM: Exposing AMD fTPMs’ Deepest Secrets;2023 IEEE 8th European Symposium on Security and Privacy (EuroS&P);2023-07