{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,16]],"date-time":"2024-09-16T09:40:50Z","timestamp":1726479650317},"reference-count":24,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T00:00:00Z","timestamp":1709251200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2023,12,29]],"date-time":"2023-12-29T00:00:00Z","timestamp":1703808000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Forensic Science International: Digital Investigation"],"published-print":{"date-parts":[[2024,3]]},"DOI":"10.1016\/j.fsidi.2023.301682","type":"journal-article","created":{"date-parts":[[2024,3,15]],"date-time":"2024-03-15T08:58:19Z","timestamp":1710493099000},"page":"301682","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":1,"special_numbering":"S","title":["Exploiting RPMB authentication in a closed source TEE implementation"],"prefix":"10.1016","volume":"48","author":[{"given":"Aya","family":"Fukami","sequence":"first","affiliation":[]},{"given":"Richard","family":"Buurke","sequence":"additional","affiliation":[]},{"given":"Zeno","family":"Geradts","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"year":"2023","series-title":"Mmc Tools (Mmc-utils)","author":"Altman","key":"10.1016\/j.fsidi.2023.301682_bib1"},{"year":"2023","series-title":"Connectcore 8x Documentation Portal","key":"10.1016\/j.fsidi.2023.301682_bib3"},{"key":"10.1016\/j.fsidi.2023.301682_bib4","doi-asserted-by":"crossref","first-page":"2074","DOI":"10.1109\/TIFS.2022.3176187","article-title":"Experimental evaluation of e.mmc data recovery","volume":"17","author":"Fukami","year":"2022","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"10.1016\/j.fsidi.2023.301682_bib5","series-title":"Amazon Echo Dot or the Reverberating Secrets of Iot Devices, WiSec \u201921","first-page":"13","author":"Giese","year":"2021"},{"year":"2018","series-title":"Exploiting Qualcomm Edl Programmers (2): Storage-Based Attacks & Rooting","author":"Hay","key":"10.1016\/j.fsidi.2023.301682_bib6"},{"year":"2015","series-title":"Embedded multi-media card (e\u22c5MMC) electrical standard (5.1), JEDEC Standard JESD84-B51","key":"10.1016\/j.fsidi.2023.301682_bib7"},{"year":"2020","series-title":"Universal Flash Storage (Ufs) Version 2.2, JEDEC Standard JESD220C-2.2","key":"10.1016\/j.fsidi.2023.301682_bib8"},{"year":"2006","series-title":"Guide to Integrating Forensic Techniques into Incident Response","author":"Karen Kent","key":"10.1016\/j.fsidi.2023.301682_bib9"},{"author":"Kerler","key":"10.1016\/j.fsidi.2023.301682_bib10"},{"year":"2014","series-title":"Arm Corelink Tzc-400 Trustzone Address Space Controller Technical Reference Manual","author":"Limited","key":"10.1016\/j.fsidi.2023.301682_bib11"},{"author":"LineageOS","key":"10.1016\/j.fsidi.2023.301682_bib12"},{"author":"LineageOS","key":"10.1016\/j.fsidi.2023.301682_bib13"},{"author":"LineageOS","key":"10.1016\/j.fsidi.2023.301682_bib14"},{"year":"2009","series-title":"Omtp Advanced Trusted Environment Tr1 v1.1","key":"10.1016\/j.fsidi.2023.301682_bib15"},{"journal-title":"Tech. rep.","article-title":"Open nand flash interface specification","year":"2021","key":"10.1016\/j.fsidi.2023.301682_bib16"},{"year":"2015","series-title":"Ftpm: A Firmware-Based Tpm 2.0 Implementation","author":"Raj","key":"10.1016\/j.fsidi.2023.301682_bib17"},{"key":"10.1016\/j.fsidi.2023.301682_bib18","series-title":"2015 International Conference on Computing and Network Communications (CoCoNet)","first-page":"946","article-title":"Mobile secure data protection using emmc rpmb partition","author":"Reddy","year":"2015"},{"key":"10.1016\/j.fsidi.2023.301682_bib19","unstructured":"ruSolut, VNR software. URL https:\/\/rusolut.com\/visual-nand-reconstructor\/vnr-software\/ ."},{"year":"2016","series-title":"The Bumpy Road towards Iphone 5c Nand Mirroring","author":"Skorobogatov","key":"10.1016\/j.fsidi.2023.301682_bib20"},{"year":"2015","series-title":"A\u00a0Mathematical Approach to NAND Flash-Memory Descrambling and Decoding, Digital Investigation","author":"van Zandwijk","key":"10.1016\/j.fsidi.2023.301682_bib21"},{"year":"2020","series-title":"Replay Protected Memory Block (Rpmb) - Protocol Vulnerabilities","key":"10.1016\/j.fsidi.2023.301682_bib22"},{"year":"2017","series-title":"Secure Storage in Op-Tee, Linaro Connect","author":"Wiklander","key":"10.1016\/j.fsidi.2023.301682_bib23"},{"key":"10.1016\/j.fsidi.2023.301682_bib24","series-title":"Building Secure Firmware: Armoring the Foundation of the Platform","first-page":"383","article-title":"Configuration","author":"Yao","year":"2020"},{"year":"2021","series-title":"e.mmc security methods","author":"Zilberstein","key":"10.1016\/j.fsidi.2023.301682_bib25"}],"container-title":["Forensic Science International: Digital Investigation"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2666281723002019?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2666281723002019?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2024,3,17]],"date-time":"2024-03-17T11:31:27Z","timestamp":1710675087000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S2666281723002019"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,3]]},"references-count":24,"alternative-id":["S2666281723002019"],"URL":"https:\/\/doi.org\/10.1016\/j.fsidi.2023.301682","relation":{},"ISSN":["2666-2817"],"issn-type":[{"type":"print","value":"2666-2817"}],"subject":[],"published":{"date-parts":[[2024,3]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Exploiting RPMB authentication in a closed source TEE implementation","name":"articletitle","label":"Article Title"},{"value":"Forensic Science International: Digital Investigation","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.fsidi.2023.301682","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2024 The Author(s). Published by Elsevier Ltd on behalf of DFRWS.","name":"copyright","label":"Copyright"}],"article-number":"301682"}}