Abstract
The current digital era is full of digital devices and to ensure the safety of their data, users utilize the protective armor of passwords using the fingerprints lock, face lock, pin codes and password locks. The trial-and-error method possesses an infinite possibility of passwords in patterns/ pin locks for unlocking the devices. The levels of security ensure that only a limited number of trials are possible before any device blocks itself or makes unlocking harder. In these circumstances, especially when a victim is a deceased person (e. g. an abetment in suicide case), the password is practically impossible to attain through the authorities. However, the data can be retrieved with the unique and distinctive method of Chip-off analysis. In this study, a password protected mobile phone was retrieved from a deceased individual and only the analysis of his/her mobile could lead to investigative insights for catching the perpetrator. The Chip-off method has several difficulties and a password/ pin protected device increases the difficulties for analysis several folds. This study highlights the significance of chip-off analysis in achieving accurate importing and extraction of maximum data along with the use of the hardware/software, MSAB, XRY and other software.
Publisher
Granthaalayah Publications and Printers
Reference7 articles.
1. C. Ence, J. R. Through and G. D. Cantrell, “Chip-off Success Rate Analysis comparing Temperature and Chip type,” The Journal of Digital Forensics, Security and Law, pp. 33-59, February 2019.
2. S. O. Mikhaylov Igor, “Digital Forensic Corp in “CHIP-OFF TECHNIQUE IN MOBILE FORENSICS”,” 2016. [Online]. Available: https://www.digitalforensics.com/blog/chip-off-technique-in-mobile-forensics/.
3. “https://www.teeltech.com/mobile-device-forensic-tools/forensic-explorer-2/#:~:text=Forensic%20Explorer%20is%20a%20tool,searching%2C%20previewing%20and%20scripting%20technology.,” [Online].
4. S. O. Mikhaylov Igor, “]. Igor Mikhaylov, Oleg Skulkin, Digital Forensic Corp in “DECRYPTING ENCRYPTED WHATSAPP DATABASES WITHOUT THE KEY” via www.digitalforensics.com/blog/decrypting-encrypted-whatsapp-databases-without-the-key/,” 2018. [Online]. Available: ]. Igor Mikhaylov, Oleg Skulkin, Digital Forensic Corp in “DECRYPTING ENCRYPTED WHATSAPP DATABASES WITHOUT THE KEY” via arwww.digitalforensics.com/blog/decrypting-encrypted-whatsapp-databases-without-the-key/.
5. A. Fukami, S. Ghose, Y. Luo, Yu Cai and O. Mutlu, “Improving the reliability of chip-off forensic analysis of NAND flash memory devices,” Digital Investigation, pp. S1-S11, 2017.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献