- Practical Mobile Forensics
- Rohit Tamma Oleg Skulkin Heather Mahalik Satish Bommisetty
- 124字
- 2021-06-24 16:39:00
Micro read
The micro read process involves manually viewing and interpreting data seen on the memory chip. The examiner uses an electron microscope and analyzes the physical gates on the chip and then translates the gate status to 0s and 1s to determine the resulting ASCII characters. The whole process is time-consuming and costly, and it requires extensive knowledge and training on memory and the filesystem. Due to the extreme technicalities involved in micro read, it is only attempted for high-profile cases equivalent to a national security crisis after all other levels of extraction techniques have been exhausted. The process is rarely performed and is not well documented at this time. Also, there are currently no commercial tools available to perform a micro read.
- 黑客大曝光:無線網(wǎng)絡(luò)安全(原書第3版)
- 零信任網(wǎng)絡(luò):在不可信網(wǎng)絡(luò)中構(gòu)建安全系統(tǒng)
- Computer Forensics with FTK
- Building a Home Security System with BeagleBone
- Instant Java Password and Authentication Security
- 網(wǎng)絡(luò)用戶行為的安全可信分析與控制
- 電腦安全與攻防入門很輕松(實(shí)戰(zhàn)超值版)
- 實(shí)用黑客攻防技術(shù)
- Learning Pentesting for Android Devices
- 數(shù)字政府網(wǎng)絡(luò)安全合規(guī)性建設(shè)指南:密碼應(yīng)用與數(shù)據(jù)安全
- 安全網(wǎng)絡(luò)構(gòu)建
- 網(wǎng)絡(luò)入侵檢測系統(tǒng)原理與應(yīng)用
- 黑客攻防入門
- Blockchain Development with Hyperledger
- 隱私計(jì)算與密碼學(xué)應(yīng)用實(shí)踐