1 Truecrypt Foundation, "TrueCrypt User Guide"
2 M. Broz, "The trueCrypt on-disk format-An independent view" 12 (12): 74-77, 2014
3 F. M. Granja, "The preservation of digital evidence and its admissibility in the court" 9 (9): 1-18, 2017
4 C. Maartmann-Moe, "The persistence of memory : Forensic identification and extraction of cryptographic keys" 6 (6): 132-140, 2009
5 M. V. Ball, "The XTS-AES Disk Encryption Algorithm and the Security of Ciphertext Stealing" 36 (36): 70-79, 2012
6 N. Syazwani, "THE ADMISSIBILITY OF DIGITAL DOCUMENT AS EVIDENCE UNDER MALAYSIAN CIVIL COURT" 2021 (2021): 248-257, 2021
7 Trusted Computing Group, "TCG PC Client Platform Reset Attack Mitigation Specification"
8 J. Aumasson, "Serious Cryptography" No Starch Press, Inc 2018
9 L. Wilke, "SEVurity : No security without integrity : Ng integrity-free memory encryption with minimal assumptions" 1483-1496, 2020
10 S. Abdullah Kahar, "Requirement That Needed To Admit The Digital Document As Evidence In Syariah Court" 2021 (2021): 2756-8938, 2021
1 Truecrypt Foundation, "TrueCrypt User Guide"
2 M. Broz, "The trueCrypt on-disk format-An independent view" 12 (12): 74-77, 2014
3 F. M. Granja, "The preservation of digital evidence and its admissibility in the court" 9 (9): 1-18, 2017
4 C. Maartmann-Moe, "The persistence of memory : Forensic identification and extraction of cryptographic keys" 6 (6): 132-140, 2009
5 M. V. Ball, "The XTS-AES Disk Encryption Algorithm and the Security of Ciphertext Stealing" 36 (36): 70-79, 2012
6 N. Syazwani, "THE ADMISSIBILITY OF DIGITAL DOCUMENT AS EVIDENCE UNDER MALAYSIAN CIVIL COURT" 2021 (2021): 248-257, 2021
7 Trusted Computing Group, "TCG PC Client Platform Reset Attack Mitigation Specification"
8 J. Aumasson, "Serious Cryptography" No Starch Press, Inc 2018
9 L. Wilke, "SEVurity : No security without integrity : Ng integrity-free memory encryption with minimal assumptions" 1483-1496, 2020
10 S. Abdullah Kahar, "Requirement That Needed To Admit The Digital Document As Evidence In Syariah Court" 2021 (2021): 2756-8938, 2021
11 C. Hargreaves, "Recovery of encryption keys from memory using a linear scan" 1369-1376, 2008
12 I. Zimerman, "Recovering AES Keys with a Deep Cold Boot Attack"
13 B. Kaplan, "RAM is Key: Extracting Disk Encryption Keys From Volatile Memory"
14 K. Hausknecht, "RAM data significance in digital forensics" 1372-1375, 2015
15 C. Hilgers, "Post-mortem memory analysis of cold-booted android devices" 62-75, 2014
16 N. Mainardi, "Plaintext recovery attacks against linearly decryptable fully homomorphic encryption schemes" 87 : 101587-, 2019
17 M. Gruhn, "On the practicability of cold boot attacks" 390-397, 2013
18 A. Case, "Memory forensics : The path forward" 20 : 23-33, 2017
19 J. Alex Halderman, "Lest we remember : Cold boot attacks on encryption keys" 45-58, 2008
20 M. Gruhn, "Forensically sound data acquisition in the age of anti-forensic innocence"
21 Y. Shah, "Forensic Analysis of Volatile Memory for Non-string Data" 2017
22 K. Alam, "Encryption Data Recover from Memory" 02 (02): 58-66, 2021
23 D. Forte, "Do encrypted disks spell the end of forensics?" 2009 (2009): 18-20, 2019
24 Periyadi, "Digital forensics random access memory using live technique based on network attacked" 1 (1): 2017
25 F. M. Ghabban, "Comparative analysis of network forensic tools and network forensics processes" 78-83, 2021
26 P. McGregor, "Braving the cold: New methods for preventing cold boot attacks on encryption keys" Black Hat Secur
27 R. Carbone, "An in-depth analysis of the cold boot attack-Can it be used for sound forensic memory acquisition ?"
28 J. Seo, "A study on memory dump analysis based on digital forensic tools" 8 (8): 694-703, 2015
29 M. A. Alomari, "A study on encryption algorithms and modes for disk encryption" 793-797, 2019