New Diagnostic Forensic Protocol for Damaged Secure Digital Memory Cards

被引:4
|
作者
Thomas-Brans, F. [1 ,2 ]
Heckmann, T. [1 ,3 ]
Markantonakis, K. [4 ]
Sauveron, D. [2 ]
机构
[1] Ctr Rech Gendarmerie Natl CREOGN, F-77000 Melun, France
[2] Univ Limoges, Lab Xlim UMR CNRS 7252, F-87000 Limoges, France
[3] Ecole Normale Super Paris ENS Paris, F-75005 Paris, France
[4] Royal Holloway Univ London, Informat Secur Grp, Egham TW20 0EX, Surrey, England
来源
IEEE ACCESS | 2022年 / 10卷 / 33742-33757期
关键词
Forensics; Standards; Protocols; Microcontrollers; Flash memories; Law enforcement; Data mining; Decision making; digital storage; fault diagnosis; flash memories; forensics; infrared imaging; law enforcement; microscopy; tomography; X-rays; NAND FLASH MEMORY; MICROSCOPY;
D O I
10.1109/ACCESS.2022.3158958
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Over the past twenty years, Secure Digital memory cards have become the most popular digital storage media. Therefore, forensic experts need to develop forensic techniques to enable recovery of data, especially from cards severely damaged by accidents, air crashes, terrorist attacks or deliberate attempts by criminals to destroy evidence. The paper discusses the non-invasive and invasive diagnostics available to forensic experts, with descriptions of the necessary equipment, including binocular microscopes, X-Ray equipment, scanning acoustic microscopes, chemical benches, and, for the first time, infrared cameras. All of these techniques can be used to methodically determine the best treatment in order to repair damaged storage media and extract data from them. The main contributions of the paper include the development of an innovative systematic forensic protocol for diagnostics on damaged cards, which involves a decision-making diagram. Finally, a concrete case study is presented using the new forensic decision diagram-based protocol and the panel of techniques available to diagnose a card damage.
引用
收藏
页码:33742 / 33757
页数:16
相关论文
共 50 条
  • [31] A Secure Dynamic Identity Based Authentication Protocol with Smart Cards for Multi-Server Architecture
    Li, Chun-Ta
    Lee, Cheng-Chi
    Weng, Chi-Yao
    Fan, Chun-I
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2015, 31 (06) : 1975 - 1992
  • [32] A secure channel protocol for multi-application smart cards based on public key cryptography
    Markantonakis, K
    Mayes, K
    COMMUNICATIONS AND MULTIMEDIA SECURITY, 2005, 175 : 79 - 95
  • [33] A secure chaotic maps-based key agreement protocol without using smart cards
    Peng Gong
    Ping Li
    Wenbo Shi
    Nonlinear Dynamics, 2012, 70 : 2401 - 2406
  • [34] A Secure Biometrics-Based Multi-Server Authentication Protocol Using Smart Cards
    Odelu, Vanga
    Das, Ashok Kumar
    Goswami, Adrijit
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (09) : 1953 - 1966
  • [35] Provably secure three-party authenticated key agreement protocol using smart cards
    Yang, Haomin
    Zhang, Yaoxue
    Zhou, Yuezhi
    Fu, Xiaoming
    Liu, Hao
    Vasilakos, Athanasios V.
    COMPUTER NETWORKS, 2014, 58 : 29 - 38
  • [36] A secure chaotic maps-based key agreement protocol without using smart cards
    Gong, Peng
    Li, Ping
    Shi, Wenbo
    NONLINEAR DYNAMICS, 2012, 70 (04) : 2401 - 2406
  • [37] NEW LEGISLATION AND NEW SECURE SERVICE FOR QUEENSLAND - THE QUEENSLAND FORENSIC DISABILITY ACT (2011) AND THE NEW FORENSIC DISABILITY SERVICE
    O'Brien, Gregory
    Jackson, Bruce
    AUSTRALIAN AND NEW ZEALAND JOURNAL OF PSYCHIATRY, 2011, 45 : A24 - A24
  • [38] Strategies to Secure the IEEE 1588 Protocol in Digital Substation Automation
    Tournier, Jean-Charles
    Goerlitz, Otmar
    CRIS: 4TH INTERNATIONAL CONFERENCE ON CRITICAL INFRASTRUCTURE, 2009, : 51 - 58
  • [39] Secure Aodv Routing Protocol Based on Homomorphic Digital Signature
    Jain, Garima
    Rajawat, Gajendra Singh
    PROCEEDINGS OF THE 2016 2ND INTERNATIONAL CONFERENCE ON CONTEMPORARY COMPUTING AND INFORMATICS (IC3I), 2016, : 307 - 311
  • [40] Secure DSR Routing Protocol Based on Homomorphic Digital Signature
    Amir, Mohammad
    Nagar, Dhanroop Mal
    Baghela, Vinay
    INTERNATIONAL CONFERENCE ON ADVANCES IN INFORMATION COMMUNICATION TECHNOLOGY & COMPUTING, 2016, 2016,