Encryption Workarounds
https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2938033 [papers.ssrn.com]
2017-03-22 21:54
It begins with a taxonomy of the different ways investigators might try to bypass encryption schemes. We classify six kinds of workarounds: find the key, guess the key, compel the key, exploit a flaw in the encryption software, access plaintext while the device is in use, and locate another plaintext copy.
source: SOS