• norsk
    • English
  • English 
    • norsk
    • English
  • Login
View Item 
  •   Home
  • Fakultet for informasjonsteknologi og elektroteknikk (IE)
  • Institutt for informasjonssikkerhet og kommunikasjonsteknologi
  • View Item
  •   Home
  • Fakultet for informasjonsteknologi og elektroteknikk (IE)
  • Institutt for informasjonssikkerhet og kommunikasjonsteknologi
  • View Item
JavaScript is disabled for your browser. Some features of this site may not work without it.

Forensic analysis of an unknown embedded device

Eide, Jarle; Olsen, Jan Ove Skogheim
Master thesis
Thumbnail
View/Open
1332_FULLTEXT.pdf (1.947Mb)
1332_ATTACHMENT.zip (1.828Mb)
1332_COVER.pdf (388.6Kb)
URI
http://hdl.handle.net/11250/2571128
Date
2006
Metadata
Show full item record
Collections
  • Institutt for informasjonssikkerhet og kommunikasjonsteknologi [2002]
Abstract
Every year thousands of new digital consumer device models come on

the market. These devices include video cameras, photo cameras, computers,

mobile phones and a multitude of different combinations. Most

of these devices have the ability to store information in one form or another.

This is a problem for law enforcement agencies as they need access

to all these new kinds of devices and the information on them in investigations.

Forensic analysis of electronic and digital equipment has become

much more complex lately because of the sheer number of new devices

and their increasing internal technological sophistication. This thesis tries

to help the situation by reverse engineering a Qtek S110 device. More

specifically we analyze how the storage system of this device, called the

object store, is implemented on the device?s operating system, Windows

Mobile. We hope to figure out how the device stores user data and what

happens to this data when it is "deleted". We further try to define a generalized

methodology for such forensic analysis of unknown digital devices.

The methodology takes into account that such analysis will have to

be performed by teams of reverse-engineers more than single individuals.

Based on prior external research we constructed and tested the methodology

successfully. We were able to figure our more or less entirely the object

store?s internal workings and constructed a software tool called BlobExtractor

that can extract data, including "deleted", from the device without

using the operating system API. The main reverse engineering strategies

utilized was black box testing and disassembly. We believe our results can

be the basis for future advanced recovery tools for Windows Mobile devices

and that our generalized reverse engineering methodology can be

utilized on many kinds of unknown digital devices.
Publisher
NTNU

Contact Us | Send Feedback

Privacy policy
DSpace software copyright © 2002-2019  DuraSpace

Service from  Unit
 

 

Browse

ArchiveCommunities & CollectionsBy Issue DateAuthorsTitlesSubjectsDocument TypesJournalsThis CollectionBy Issue DateAuthorsTitlesSubjectsDocument TypesJournals

My Account

Login

Statistics

View Usage Statistics

Contact Us | Send Feedback

Privacy policy
DSpace software copyright © 2002-2019  DuraSpace

Service from  Unit