blog




  • Essay / Method of applying data reverse engineering on a cell phone

    In this article, we discuss a method that applies data reverse engineering on a cell phone, which aims to help the specialist to distinguish in which records specific data is expected and how to decode it, remembering that the end goal must be changed to a more appropriate format. The paper will also define data reverse engineering and show the tools used in smartphone forensics. Reverse engineering is a procedure or capability for presenting logical and physical information by extracting data from existing information sources. Reverse engineering is a difficult task. It lets you make apps act exactly the way you need them to. Data Reverse Engineering (DRE) is a moderately new approach used to solve a general classification of data degradation problems. Reverse data engineering combines ways to navigate data with detailed data administration practices. The methodology improves the reengineering capability of frameworks. “Mobile devices range from basic, inexpensive phones used primarily for phone calls to smartphones that integrate a phone, PDA, camera, music player and more into a single device. » (Guide To Computer Forensics and Investigations - Nelson 2013) The cell phone could be recognized as a definitive disruptive innovation: indeed, for example telephony, radio, television, Internet, mobile phones radically change every aspect of daily life, both within organizations and in people's daily lives, providing more provisions and collecting more private information. Cutting-edge smartphones offer advanced features like email, Internet, and recorders. The characteristics of these smartphones, apart from the wearable side, give the user the possibility of co...... middle of paper ...... Ottaviani, "Fast forensic analysis results of smartphones via miat and forensic farm," IJESDF, Inderscience, 2008.[2] F. Dellutri, V. Ottaviani, and G. Me, “Forensic acquisition for Windows Mobile PocketPC,” in Proc. of WSHPCS, HPCS 2008, Nicosia, Cyprus, June 3-6, 2008, pp. 200-205.[3] R. Berte, F. Dellutri, A. Grillo, A. Lentini, G. Me and V. Ot`taviani, HESDF. World Science, 2008, ch. A methodology for the acquisition, decoding and analysis of internal memory of smartphones.[4] A. Distefano and G. Me, “A global evaluation of the mobile internal acquisition tool,” Digital Investigation, vol. 5, no. Supplement 1, pp. S121-S127, 2008.[5] “Paraben corporation, (2008) - seizure of paraben devices. Paraben forensic software www.paraben.com. » http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5345493http://www.sciencedirect.com/science/article/pii/S1742287610000368