{"id":"https://openalex.org/W3170947218","doi":"https://doi.org/10.1016/j.fsidi.2021.301169","title":"A new model for forensic data extraction from encrypted mobile devices","display_name":"A new model for forensic data extraction from encrypted mobile devices","publication_year":2021,"publication_date":"2021-05-27","ids":{"openalex":"https://openalex.org/W3170947218","doi":"https://doi.org/10.1016/j.fsidi.2021.301169","mag":"3170947218"},"language":"en","primary_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1016/j.fsidi.2021.301169","pdf_url":null,"source":{"id":"https://openalex.org/S4210178067","display_name":"Forensic Science International Digital Investigation","issn_l":"2666-2817","issn":["2666-2817","2666-2825"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://doi.org/10.1016/j.fsidi.2021.301169","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5087590899","display_name":"Aya Fukami","orcid":"https://orcid.org/0000-0002-6393-5888"},"institutions":[{"id":"https://openalex.org/I887064364","display_name":"University of Amsterdam","ror":"https://ror.org/04dkp9463","country_code":"NL","type":"education","lineage":["https://openalex.org/I887064364"]},{"id":"https://openalex.org/I158244335","display_name":"Netherlands Forensic Institute","ror":"https://ror.org/04s2z4291","country_code":"NL","type":"facility","lineage":["https://openalex.org/I158244335"]}],"countries":["NL"],"is_corresponding":true,"raw_author_name":"Aya Fukami","raw_affiliation_strings":["Netherlands Forensic Institute, The Netherlands","University of Amsterdam, The Netherlands"],"affiliations":[{"raw_affiliation_string":"University of Amsterdam, The Netherlands","institution_ids":["https://openalex.org/I887064364"]},{"raw_affiliation_string":"Netherlands Forensic Institute, The Netherlands","institution_ids":["https://openalex.org/I158244335"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5080234840","display_name":"Radina Stoykova","orcid":"https://orcid.org/0000-0003-1399-3315"},"institutions":[{"id":"https://openalex.org/I204778367","display_name":"Norwegian University of Science and Technology","ror":"https://ror.org/05xg72x27","country_code":"NO","type":"education","lineage":["https://openalex.org/I204778367"]},{"id":"https://openalex.org/I169381384","display_name":"University of Groningen","ror":"https://ror.org/012p63287","country_code":"NL","type":"education","lineage":["https://openalex.org/I169381384"]}],"countries":["NL","NO"],"is_corresponding":false,"raw_author_name":"Radina Stoykova","raw_affiliation_strings":["Norwegian University of Science and Technology, Gj\u00f8vik, Norway","University of Groningen, The Netherlands"],"affiliations":[{"raw_affiliation_string":"Norwegian University of Science and Technology, Gj\u00f8vik, Norway","institution_ids":["https://openalex.org/I204778367"]},{"raw_affiliation_string":"University of Groningen, The Netherlands","institution_ids":["https://openalex.org/I169381384"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5045459089","display_name":"Zeno Geradts","orcid":"https://orcid.org/0000-0001-5912-5295"},"institutions":[{"id":"https://openalex.org/I887064364","display_name":"University of Amsterdam","ror":"https://ror.org/04dkp9463","country_code":"NL","type":"education","lineage":["https://openalex.org/I887064364"]},{"id":"https://openalex.org/I158244335","display_name":"Netherlands Forensic Institute","ror":"https://ror.org/04s2z4291","country_code":"NL","type":"facility","lineage":["https://openalex.org/I158244335"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Zeno Geradts","raw_affiliation_strings":["Netherlands Forensic Institute, The Netherlands","University of Amsterdam, The Netherlands"],"affiliations":[{"raw_affiliation_string":"University of Amsterdam, The Netherlands","institution_ids":["https://openalex.org/I887064364"]},{"raw_affiliation_string":"Netherlands Forensic Institute, The Netherlands","institution_ids":["https://openalex.org/I158244335"]}]}],"institution_assertions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5087590899"],"corresponding_institution_ids":["https://openalex.org/I887064364","https://openalex.org/I158244335"],"apc_list":{"value":2950,"currency":"USD","value_usd":2950,"provenance":"doaj"},"apc_paid":{"value":2950,"currency":"USD","value_usd":2950,"provenance":"doaj"},"fwci":13.697,"has_fulltext":true,"fulltext_origin":"pdf","cited_by_count":49,"citation_normalized_percentile":{"value":0.999982,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":98},"biblio":{"volume":"38","issue":null,"first_page":"301169","last_page":"301169"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9995,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9922,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability","score":0.54423964},{"id":"https://openalex.org/keywords/digital-evidence","display_name":"Digital evidence","score":0.5050488},{"id":"https://openalex.org/keywords/criminal-investigation","display_name":"Criminal investigation","score":0.47150248},{"id":"https://openalex.org/keywords/guard","display_name":"Guard (computer science)","score":0.41653913}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.69541216},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6953605},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6612637},{"id":"https://openalex.org/C84418412","wikidata":"https://www.wikidata.org/wiki/Q3246940","display_name":"Digital forensics","level":2,"score":0.61508894},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.6102963},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.54423964},{"id":"https://openalex.org/C2780262971","wikidata":"https://www.wikidata.org/wiki/Q44554","display_name":"Law enforcement","level":2,"score":0.5324757},{"id":"https://openalex.org/C2781357168","wikidata":"https://www.wikidata.org/wiki/Q5276084","display_name":"Digital evidence","level":3,"score":0.5050488},{"id":"https://openalex.org/C117660856","wikidata":"https://www.wikidata.org/wiki/Q1964968","display_name":"Criminal investigation","level":2,"score":0.47150248},{"id":"https://openalex.org/C170130773","wikidata":"https://www.wikidata.org/wiki/Q216378","display_name":"Usability","level":2,"score":0.43907407},{"id":"https://openalex.org/C141141315","wikidata":"https://www.wikidata.org/wiki/Q2379942","display_name":"Guard (computer science)","level":2,"score":0.41653913},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.39959496},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.17068869},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.13836718},{"id":"https://openalex.org/C73484699","wikidata":"https://www.wikidata.org/wiki/Q161733","display_name":"Criminology","level":1,"score":0.0},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"is_oa":true,"landing_page_url":"https://doi.org/10.1016/j.fsidi.2021.301169","pdf_url":null,"source":{"id":"https://openalex.org/S4210178067","display_name":"Forensic Science International Digital Investigation","issn_l":"2666-2817","issn":["2666-2817","2666-2825"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true},{"is_oa":true,"landing_page_url":"https://dare.uva.nl/personal/pure/en/publications/a-new-model-for-forensic-data-extraction-from-encrypted-mobile-devices(90d8d776-9d3a-4a23-b11c-e78af13b9121).html","pdf_url":"https://pure.uva.nl/ws/files/64241405/1_s2.0_S2666281721000779_main.pdf","source":{"id":"https://openalex.org/S4306401571","display_name":"Wiardi Beckman Foundation (Wiardi Beckman Foundation)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true},{"is_oa":true,"landing_page_url":"https://pure.rug.nl/ws/files/208548821/1_s2.0_S2666281721000779_main.pdf","pdf_url":"https://pure.rug.nl/ws/files/208548821/1_s2.0_S2666281721000779_main.pdf","source":{"id":"https://openalex.org/S4306400420","display_name":"University of Groningen research database (University of Groningen / Centre for Information Technology)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I169381384","host_organization_name":"University of Groningen","host_organization_lineage":["https://openalex.org/I169381384"],"host_organization_lineage_names":["University of Groningen"],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"publishedVersion","is_accepted":true,"is_published":true},{"is_oa":true,"landing_page_url":"https://research.rug.nl/en/publications/98d8b225-3eb0-4232-acea-cbf0daa2e019","pdf_url":"https://research.rug.nl/files/208548821/1_s2.0_S2666281721000779_main.pdf","source":{"id":"https://openalex.org/S4306400420","display_name":"University of Groningen research database (University of Groningen / Centre for Information Technology)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I169381384","host_organization_name":"University of Groningen","host_organization_lineage":["https://openalex.org/I169381384"],"host_organization_lineage_names":["University of Groningen"],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"publishedVersion","is_accepted":true,"is_published":true}],"best_oa_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1016/j.fsidi.2021.301169","pdf_url":null,"source":{"id":"https://openalex.org/S4210178067","display_name":"Forensic Science International Digital Investigation","issn_l":"2666-2817","issn":["2666-2817","2666-2825"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true},"sustainable_development_goals":[{"score":0.81,"display_name":"Peace, justice, and strong institutions","id":"https://metadata.un.org/sdg/16"}],"grants":[{"funder":"https://openalex.org/F4320320300","funder_display_name":"European Commission","award_id":"883156"},{"funder":"https://openalex.org/F4320332999","funder_display_name":"Horizon 2020 Framework Programme","award_id":"883156"},{"funder":"https://openalex.org/F4320335254","funder_display_name":"Horizon 2020","award_id":"883156"}],"datasets":[],"versions":[],"referenced_works_count":35,"referenced_works":["https://openalex.org/W135986553","https://openalex.org/W1515599380","https://openalex.org/W1973738013","https://openalex.org/W1987164007","https://openalex.org/W2025597057","https://openalex.org/W2035121584","https://openalex.org/W2127718853","https://openalex.org/W2164240796","https://openalex.org/W2502335209","https://openalex.org/W2520077611","https://openalex.org/W2520573549","https://openalex.org/W2579991392","https://openalex.org/W2589518400","https://openalex.org/W2716664989","https://openalex.org/W2751509862","https://openalex.org/W2770299518","https://openalex.org/W2792498006","https://openalex.org/W2803618347","https://openalex.org/W2807401988","https://openalex.org/W2808923408","https://openalex.org/W2865227370","https://openalex.org/W2884219450","https://openalex.org/W2961492709","https://openalex.org/W2963004107","https://openalex.org/W2963453404","https://openalex.org/W2987328625","https://openalex.org/W3023459287","https://openalex.org/W3037998698","https://openalex.org/W3047777400","https://openalex.org/W3122780870","https://openalex.org/W3125845542","https://openalex.org/W33787810","https://openalex.org/W4252992300","https://openalex.org/W4289038676","https://openalex.org/W4394659843"],"related_works":["https://openalex.org/W54587564","https://openalex.org/W5341801","https://openalex.org/W4220893835","https://openalex.org/W2794565635","https://openalex.org/W2620272321","https://openalex.org/W2598491911","https://openalex.org/W2586708110","https://openalex.org/W2552093437","https://openalex.org/W2548287415","https://openalex.org/W2009550757"],"abstract_inverted_index":{"In":[0,140],"modern":[1,66,153],"criminal":[2,108],"investigations,":[3],"mobile":[4,28,52,117,154,179],"devices":[5,19,46,53,106,155],"are":[6],"seized":[7],"at":[8],"every":[9],"type":[10],"of":[11,73,212],"crime":[12],"scene,":[13],"and":[14,34,61,65,101,131,148,156,188],"the":[15,25,48,88,145,185,210],"data":[16,44,89,102,162],"on":[17,90,121,159,183,209],"those":[18,105],"often":[20],"becomes":[21],"critical":[22],"evidence":[23,43,214],"in":[24,38,152,172],"case.":[26],"Various":[27],"forensic":[29,96,118,161,180,196],"techniques":[30,164],"have":[31,69],"been":[32],"established":[33],"evaluated":[35],"through":[36,216],"research":[37,119],"order":[39,173],"to":[40,82,87,174],"extract":[41],"possible":[42],"from":[45,104],"over":[47],"decades.":[49],"However,":[50],"as":[51,79,127],"become":[54],"essential":[55],"tools":[56],"for":[57,107,165,195],"daily":[58],"life,":[59],"security":[60,74,129,149,186],"privacy":[62],"concerns":[63],"grow,":[64],"smartphone":[67],"vendors":[68],"implemented":[70],"multiple":[71],"types":[72],"protection":[75,150],"measures":[76,151],"-":[77,81],"such":[78,126],"encryption":[80,147,176],"guard":[83],"against":[84],"unauthorized":[85],"access":[86],"their":[91,138,157],"products.":[92],"This":[93],"trend":[94],"makes":[95],"acquisition":[97,197],"harder":[98],"than":[99],"before,":[100],"extraction":[103,163],"investigation":[109],"is":[110,198,202],"becoming":[111],"a":[112,205],"more":[113,123],"challenging":[114],"task.":[115],"Today,":[116],"focuses":[120],"identifying":[122],"invasive":[124],"techniques,":[125],"bypassing":[128,184],"features,":[130],"breaking":[132],"into":[133],"target":[134],"smartphones":[135],"by":[136,204],"exploiting":[137,189],"vulnerabilities.":[139,191],"this":[141],"paper,":[142],"we":[143],"explain":[144],"increased":[146],"impact":[158],"traditional":[160],"law":[166],"enforcement":[167],"purposes.":[168],"We":[169],"demonstrate":[170],"that":[171],"overcome":[175],"challenges,":[177],"new":[178,193],"methods":[181],"rely":[182],"features":[187],"system":[190],"A":[192],"model":[194,201],"proposed.":[199],"The":[200],"supported":[203],"legal":[206],"framework":[207],"focused":[208],"usability":[211],"digital":[213],"obtained":[215],"vulnerability":[217],"exploitation.":[218]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W3170947218","counts_by_year":[{"year":2024,"cited_by_count":14},{"year":2023,"cited_by_count":22},{"year":2022,"cited_by_count":10},{"year":2021,"cited_by_count":3}],"updated_date":"2025-01-07T10:24:03.898817","created_date":"2021-06-22"}