Project

General

Profile

Issue #2082

Look if the "Forensics acquisition d Analysis and circumvention of samsung secure boot enforced common criteria mode" paper has interesting information

Added by Denis 'GNUtoo' Carikli 11 months ago. Updated 11 months ago.

Status:
Closed
Priority:
Normal
Assignee:
-
Category:
-
Target version:
-
Start date:
07/12/2020
Due date:
% Done:

0%

Estimated time:
Resolution:
fixed
Device:
Unknown
Grant:
Type of work:
#1

Updated by Denis 'GNUtoo' Carikli 11 months ago

Link: https://www.sciencedirect.com/science/article/pii/S1742287618300409
License: CC BY-NC-ND

I stumble upon that article while looking for information on how to make the USB switch switch to the kernel UART and not the modem UART for the GT-N5100.

It looks interesting because:
  • It seem to have interesting information on s-boot for S6 that is probably applicable to the devices we support that have an Exynos 4412, such as reboot modes and other magic values used by the stock bootloader. That might be useful for Replicant.
  • It might give pointers on how to defeat common commercial data extractors used by the police of various countries in illegitimate way to extract data off random people in the street or protesters.

Also available in: Atom PDF