Method Applying Data Reverse Engineering on a Cell Phone

654 Words2 Pages

In this paper we discuss a method which applies data reverse engineering on a cell phone, which focuses at helping the specialist to distinguish in which records the specific data are expected and how to decode them, remembering the end goal to be changed over in a more suitable format. The paper will also define Data reverse engineering and show the tools used in smartphone forensics.
Reverse engineering is a procedure or capacity to make a logical and physical information show by pulling data from an existing information sources. Reverse engineering is a challenging task. It empowers you to make applications act precisely how you need them to. Data reverse engineering (DRE) is a moderately new approach used to address a general classification of data degradation issues. Data reverse engineering joins together ways to comb through data with detailed data administration practices. The methodology improves the frameworks re-engineering capability.
“Mobile devices range from basic, inexpensive phones used primarily for phone calls to smart phones that integrate a phone, PDA, camera, music player, and more into one device.” (Guide To Computer Forensics and Investigations - Nelson 2013) The cellular telephone could be recognized a definitive disruptive innovation: indeed, for example telephony, radio, TV, the Internet, mobile telephones are radically changing about every part of day by day life, both inside organizations and in the everyday lives of people, furnishing more provisions and gathering more private information. Cutting edge smartphones give progressed characteristics like email, Internet and recorders. Such smartphone's characteristics, other than the side of the portable devices, give to user the opportunity to co...

... middle of paper ...

... Ottaviani, “Fast smartphones forensic analysis results through miat and forensic farm,” IJESDF, Inderscience, 2008.
[2] F. Dellutri, V. Ottaviani, and G. Me, “Forensic acquisition for windows mobile pocketpc,” in Proc. of the WSHPCS, HPCS 2008, Nicosia, Cyprus June 3-6, 2008, pp. 200–205.
[3] R. Berte, F. Dellutri, A. Grillo, A. Lentini, G. Me, and V. Ot`taviani, HESDF. Worldscience, 2008, ch. A Methodology for Smartphones Internal Memory Acquisition, Decoding and Analysis.
[4] A. Distefano and G. Me, “An overall assessment of mobile internal acquisition tool,” Digital Investigation, vol. 5, no. Supplement 1, pp. S121–S127, 2008.
[5] “Paraben corporation, (2008) - paraben device seizure. Paraben’s forensics software www.paraben.com.”

http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5345493
http://www.sciencedirect.com/science/article/pii/S1742287610000368

More about Method Applying Data Reverse Engineering on a Cell Phone

Open Document