2004
DOI: 10.1016/j.diin.2004.07.006
|View full text |Cite
|
Sign up to set email alerts
|

Xbox security issues and forensic recovery methodology (utilising Linux)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2009
2009
2024
2024

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 14 publications
(4 citation statements)
references
References 0 publications
0
4
0
Order By: Relevance
“…One major difference between the two types is that PCB Trojans can be inserted after board fabrication and assembly [4]- [6]. Examples of such in-field Trojan attacks include Xbox hacking by using a modchip [7], DRM-key bypassing by tampering of a PCB within a televi-sion set [8], and JTAG data bus hijacking on a PCB [9]. Another difference is the wide variety of substrates, fabrication methods, and components used by PCBs, which limits the applicability of inspection-based Trojan-detection methods.…”
Section: Introductionmentioning
confidence: 99%
“…One major difference between the two types is that PCB Trojans can be inserted after board fabrication and assembly [4]- [6]. Examples of such in-field Trojan attacks include Xbox hacking by using a modchip [7], DRM-key bypassing by tampering of a PCB within a televi-sion set [8], and JTAG data bus hijacking on a PCB [9]. Another difference is the wide variety of substrates, fabrication methods, and components used by PCBs, which limits the applicability of inspection-based Trojan-detection methods.…”
Section: Introductionmentioning
confidence: 99%
“…This case and others underscore the need for forensically-sound procedures for the imaging and forensic analysis of (seemingly benign) game consoles with advanced capabilities. Other researchers have focused on the forensic analysis of seventh generation game consoles, including the Xbox [1,17], Nintendo Wii [16] and PlayStation Portable [3]. The Xbox console has similar functionality as the PS3.…”
Section: Introductionmentioning
confidence: 99%
“…Researchers have made great strides in the area of small device forensics (see, e.g., [10,13,14,22,30,33,37,41,61,67,69,70,74,76]). But much more work remains to be done given the rapid pace with which new models and devices enter the market.…”
Section: Non-standard Computing Environmentsmentioning
confidence: 99%