New Diagnostic Forensic Protocol for Damaged Secure Digital Memory Cards

被引:4
|
作者
Thomas-Brans, F. [1 ,2 ]
Heckmann, T. [1 ,3 ]
Markantonakis, K. [4 ]
Sauveron, D. [2 ]
机构
[1] Ctr Rech Gendarmerie Natl CREOGN, F-77000 Melun, France
[2] Univ Limoges, Lab Xlim UMR CNRS 7252, F-87000 Limoges, France
[3] Ecole Normale Super Paris ENS Paris, F-75005 Paris, France
[4] Royal Holloway Univ London, Informat Secur Grp, Egham TW20 0EX, Surrey, England
来源
IEEE ACCESS | 2022年 / 10卷 / 33742-33757期
关键词
Forensics; Standards; Protocols; Microcontrollers; Flash memories; Law enforcement; Data mining; Decision making; digital storage; fault diagnosis; flash memories; forensics; infrared imaging; law enforcement; microscopy; tomography; X-rays; NAND FLASH MEMORY; MICROSCOPY;
D O I
10.1109/ACCESS.2022.3158958
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Over the past twenty years, Secure Digital memory cards have become the most popular digital storage media. Therefore, forensic experts need to develop forensic techniques to enable recovery of data, especially from cards severely damaged by accidents, air crashes, terrorist attacks or deliberate attempts by criminals to destroy evidence. The paper discusses the non-invasive and invasive diagnostics available to forensic experts, with descriptions of the necessary equipment, including binocular microscopes, X-Ray equipment, scanning acoustic microscopes, chemical benches, and, for the first time, infrared cameras. All of these techniques can be used to methodically determine the best treatment in order to repair damaged storage media and extract data from them. The main contributions of the paper include the development of an innovative systematic forensic protocol for diagnostics on damaged cards, which involves a decision-making diagram. Finally, a concrete case study is presented using the new forensic decision diagram-based protocol and the panel of techniques available to diagnose a card damage.
引用
收藏
页码:33742 / 33757
页数:16
相关论文
共 50 条
  • [1] Unconditional secure communication: a Russian Cards protocol
    Zhenhua Duan
    Chen Yang
    Journal of Combinatorial Optimization, 2010, 19 : 501 - 530
  • [2] Secure electronic voting protocol with IC cards
    Natl Chung Hsing Univ, Taichung, Taiwan
    J Syst Software, 2 (93-101):
  • [3] A secure electronic voting protocol with IC cards
    Jan, JK
    Tai, CC
    JOURNAL OF SYSTEMS AND SOFTWARE, 1997, 39 (02) : 93 - 101
  • [4] Unconditional secure communication: a Russian Cards protocol
    Duan, Zhenhua
    Yang, Chen
    JOURNAL OF COMBINATORIAL OPTIMIZATION, 2010, 19 (04) : 501 - 530
  • [5] Secure Grouping Protocol Using a Deck of Cards
    Hashimoto, Yuji
    Shinagawa, Kazumasa
    Nuida, Koji
    Inamura, Masaki
    Hanaoka, Goichiro
    INFORMATION THEORETIC SECURITY, ICITS 2017, 2017, 10681 : 135 - 152
  • [6] Secure Grouping Protocol Using a Deck of Cards
    Hashimoto, Yuji
    Shinagawa, Kazumasa
    Nuida, Koji
    Inamura, Masaki
    Hanaoka, Goichiro
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2018, E101A (09): : 1512 - 1524
  • [7] Optical memory cards provide secure identification
    Dyball, C.J.
    Lichtenstein, T.
    Laser Focus World, 2001, 37 (11): : 85 - 90
  • [8] Optical memory cards provide secure identification
    Dyball, CJ
    Lichtenstein, T
    LASER FOCUS WORLD, 2001, 37 (11): : 85 - +
  • [9] An asymmetric cryptography secure channel protocol for smart cards
    Rantos, K
    Markantonakis, K
    SECURITY AND PROTECTION IN INFORMATION PROCESSING SYSTEMS, 2004, 147 : 351 - 365
  • [10] Memory Cards enhance digital products
    Chinnock, C
    ELECTRONIC DESIGN, 2000, 48 (03) : 60 - 60