Metaphor: A (Real) Real-Life Stagefright Exploit, Revision 1.1, NorthBit, Herzliya, Israel (raw.githubusercontent, 2016. ,
The Tao of Network Security Monitoring: Beyond Intrusion Detection, 2004. ,
, Stagefrightened? Project Zero, Google, 2015.
Stagefright: Scary code in the heart of Android, presented at the Black Hat USA Conference, 2015. ,
, Threat Report: Q2, 2015.
Categorizing mobile device malware based on system side-effects, Advances in Digital Forensics XIII, pp.203-219, 2017. ,
URL : https://hal.archives-ouvertes.fr/hal-01716405
, Security in Computing, 2007.
, SWGDE Best Practices for Mobile Phone Forensics, 2013.
TrustDump: Reliable memory acquisition from smartphones, Proceedings of the Nineteenth European Symposium on Research in Computer Security, part I, pp.202-218, 2014. ,
Acquisition and analysis of volatile memory from Android devices, Digital Investigation, vol.8, pp.175-184, 2012. ,
, Live memory forensics of mobile phones, Digital Investigation, vol.7, pp.74-82, 2010.
, The Latest on Stagefright: CVE-2015-1538 Exploit is Now Available for Testing Purposes, 2015.