New Diagnostic Forensic Protocol for Damaged Secure Digital Memory Cards

被引:4
|
作者
Thomas-Brans, F. [1 ,2 ]
Heckmann, T. [1 ,3 ]
Markantonakis, K. [4 ]
Sauveron, D. [2 ]
机构
[1] Ctr Rech Gendarmerie Natl CREOGN, F-77000 Melun, France
[2] Univ Limoges, Lab Xlim UMR CNRS 7252, F-87000 Limoges, France
[3] Ecole Normale Super Paris ENS Paris, F-75005 Paris, France
[4] Royal Holloway Univ London, Informat Secur Grp, Egham TW20 0EX, Surrey, England
来源
IEEE ACCESS | 2022年 / 10卷 / 33742-33757期
关键词
Forensics; Standards; Protocols; Microcontrollers; Flash memories; Law enforcement; Data mining; Decision making; digital storage; fault diagnosis; flash memories; forensics; infrared imaging; law enforcement; microscopy; tomography; X-rays; NAND FLASH MEMORY; MICROSCOPY;
D O I
10.1109/ACCESS.2022.3158958
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Over the past twenty years, Secure Digital memory cards have become the most popular digital storage media. Therefore, forensic experts need to develop forensic techniques to enable recovery of data, especially from cards severely damaged by accidents, air crashes, terrorist attacks or deliberate attempts by criminals to destroy evidence. The paper discusses the non-invasive and invasive diagnostics available to forensic experts, with descriptions of the necessary equipment, including binocular microscopes, X-Ray equipment, scanning acoustic microscopes, chemical benches, and, for the first time, infrared cameras. All of these techniques can be used to methodically determine the best treatment in order to repair damaged storage media and extract data from them. The main contributions of the paper include the development of an innovative systematic forensic protocol for diagnostics on damaged cards, which involves a decision-making diagram. Finally, a concrete case study is presented using the new forensic decision diagram-based protocol and the panel of techniques available to diagnose a card damage.
引用
收藏
页码:33742 / 33757
页数:16
相关论文
共 50 条
  • [21] A new secure remote user authentication scheme with smart cards
    Kumar, Manoj
    International Journal of Network Security, 2010, 11 (02) : 88 - 93
  • [22] A New Secure Password Authentication Scheme Using Smart Cards
    WANG Bangju1
    2. School of Science
    3. College of Information Science and Engineering
    Zhengzhou 450001
    Wuhan University Journal of Natural Sciences, 2008, (06) : 739 - 743
  • [23] A secure and effcient mutual authentication and key agreement protocol with smart cards for wireless communications
    Guo, Cheng
    Chang, Chin-Chen
    Chang, Shih-Chang
    International Journal of Network Security, 2018, 20 (02) : 323 - 331
  • [24] A Secure SMS Protocol for Implementing Digital Cash System
    Kisore, N. Raghu
    Sagi, Supriya
    2015 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2015, : 1883 - 1892
  • [25] A study on block-based recovery of damaged digital forensic evidence image
    Jang, Eun-Gyeom
    Koh, Byong-Soo
    Choi, Yong-Rak
    MULTIMEDIA TOOLS AND APPLICATIONS, 2012, 57 (02) : 407 - 422
  • [26] A study on block-based recovery of damaged digital forensic evidence image
    Eun-Gyeom Jang
    Byong-Soo Koh
    Yong-Rak Choi
    Multimedia Tools and Applications, 2012, 57 : 407 - 422
  • [27] A new secure oblivious transfer protocol
    Kim, SG
    Kang, HJ
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2006, PT 5, 2006, 3984 : 690 - 699
  • [28] Forensic Readiness: Emerging Discipline for Creating Reliable and Secure Digital Evidence
    Barbara EndicottPopovsky
    Nicolai Kuntze
    Carsten Rudolph
    Journal of Harbin Institute of Technology, 2015, 22 (01) : 1 - 8
  • [29] Forensic Readiness: Emerging Discipline for Creating Reliable and Secure Digital Evidence
    Barbara Endicott-Popovsky
    Nicolai Kuntze
    Carsten Rudolph
    Journal of Harbin Institute of Technology(New series), 2015, (01) : 1 - 8
  • [30] Registration Data Access Protocol (RDAP) for digital forensic investigators
    Nikkel, Bruce
    DIGITAL INVESTIGATION, 2017, 22 : 133 - 141