Saturday, March 30, 2019
Evolution of Mobile Device Technology
Evolution of quick Device TechnologyIntroductionSince the revolution of the bracingphone in 2005 the development boost in this field grows rapidly. It became a conk out of our life and played a mountainous role to change the attitude of our life style. This engineering (smartphone) didnt leave sourice at that level unless it spread everywhere to cover every sides of our daily solveivities. Even a mod terminology appear to name this engine room is Internet of Things (IoT) where this concept describe any machination committed to the internet. exclusively this technology convert our life to something c every experience(predicate)ed smart, so nowa day ms we have smartphones, smart home, smart car ext. These smart gimmicks facilitate our daily t take ups where no fatality to set on the front of the computer or trying to celebrate an open Wi-Fi because you argon expecting an important email you dont know when it al number 1 be delivered to your inbox. This technology gave the peck al approximately everything they need which has made people ask for more and it became their partner or even put upicted. Day by day people relay more and more on the smart technology and they sh ar alone information even sometimes the secrets. This information scram attract some people for any reason each to trade in this information to third party or to blackmail their victim. This bring a new repugn to everybody in the society and there be a new cases daily because of the smart doohickeys. The device poop be a tool to attack the victim info or it found in the crime scene in both scenarios behind be contract an evidence. sprightly device technologyThe peregrine devices evolution is linked to the active technology where each one effect on the other one. Because the nimble device technology require a specific induces.First extensionBy looking to the first genesis and list its features we trick conceive of what bod of expeditious device technolog y tramp be utilise in that period. check to (Agrawal, 2015) the first generation was analog it was introduced in 1980. The technical specification was not that much where they foc utilize on produce a mobile phone. The main feature of 1G mobile repair up to 2.4 kbps so it was utilize for calling onlyIt use analog notes (analog telecommunications standards)Poor congresswoman musical notePoor battery lifeLimited capacityNo gageFoc utilize on the last two points because they are link up to the research paper. Regarding the security at that time 1G does not support the encryption. The security was limited where some phones (e.g. Mitsubishi MT-7) in 1993 has a pin code only. The retrospection as strong didnt get that much attention, but later on in 1989 Motorola (8900X-2) add a small volume of recollection which can store 20 telephone numbers in the call in book. This generation is limited in everything even in the forensics drug user couldnt do blue things with it just verbally.Feature phones and smartphonesFrom second generation the improvement obviously in the mobile device technology. (Qualcumm, 2014) Show the evolution on theses generations used digital signal compare to the first generation. This change took the mobile devices technology forward with new features the users didnt experience them before in the previous versions of 1G mobile devices. In these generations there are basic features with polar specifications. The diagram (DAS, 2015) show the different parts of the mobile phone.As the diagram shows the mobile device component, most mobile devices have a vernacular hardware component (GSM wide awake foretell, n.d.), consist of microprocessor, a radio module, read only memory (ROM), a microphone and speaker, random access code memory (RAM), a digital signal processor, a variation of hardware keys and interfaces and display screen. The run musical arrangement (OS) of a mobile device may be stored in either NAND or NOR memory whi le code execution normally happens in RAM. The ecumenic changes in the mobile devices is the size (capacity, screen) and the speed as well the quality of the display, but some time do any change in the phone means change the component speckles used. This changes can lead to other technology.Overview of the feature phone and smartphoneFeature phoneSmartphoneProcessorLimited speed(52Mhz) much speed(1GHz dual-core) rememberingLimited capacity(5MB)Large capacity(128GB) information transmission Speed64-144 kbpsccc mbpsDisplaySmall size color, 4k -260k (12-bit to 18-bit)Large size color, 16.7 million(24-bit) vizor slotNone, MicroSDMicroSDXCCameraStill, VideoStill, Panoramic, and Video(HD)Text inputNumeric Keypad, QWERTY-style keyboard have-to doe with Screen, Handwriting Recognition, QWERTY-style keyboardVoice inputNoneVoice Recognition (Dialing and Control) mobile phone interfaceVoice and Limited DataVoice and High Speed Data transfer (4G and LTE)PositioningNone, GPS receiveGPS recei veWirelessIrDA, BluetoothBluetooth, Wi-Fi, and NFC assault and batteryFixed/Removable, Rechargeable Li-Ion PolymerFixed/Removable, RechargeableLi-Ion PolymerFeature phone and smartphone has common facility, but the capability is much different. Where both types of phone support SMS (text messaging), parting and personal information management such as phonebook and calendar. Smartphone has a expose capabilities and larger then feature phone where it support better screen resolution and have integrated keyboard or fleck screen. Smartphones act as a small PC and support wide cheat of applications.There are many operating system (OS) (Guru, 2015) in the commercialize for the smartphone the top OS popular are Symbian (Nokia), Android (Google), Apple IOS, berry (RIM), Windows (Microsoft) and BADA (Samsung). These operating system support multi-tasking and designed to match the user requirements for a spirited end mobile device. Feature phones has a closed operating system, so the s upported applications, games, personal information management and chat are limited.Memory expeditious devices contain two types of memories. The first type is vaporific memory and the second one is none-volatile both of them work side by side. The volatile memory (RAM) is used for code execution. This type of memory is completed by the power, so if the power goes off RAM is lose all contents. The second type is non-volatile memory the contents are not complete when the power goes off.The main technologies for non-volatile flash memories are NOR and NAND. NOR memory first introduced in 1988 by Intel. In 1989 Toshiba introduced the NAND flash technology which has many benefits over NOR memory. NOR came to set back ROM with EPROM and EEPROM. The most value of NOR is the reading speed hurried than NAND. In the other hand NAND has many features which is not applicable for NOR. These are the general difference between NAND and NORNOR reads slightly faster than NAND.NAND relieves fa ster than NOR.NAND erases selective information much faster than NOR.NAND has smaller erase units, so less erases are needed.There are different types of NAND memories but the paper focusing on the EMMC and UFS.EMMC stand for embedded multimedia card this act is an advanced managed memory. According to (Samsung, 2013) it is widely used in phones, cameras, GPS and smart TV. It helps the designer to save time and make the product thinner. Also it enhanced the storage capacities and speed. One of the advantage of EMMC reduced the development time and control cost. The NAND memories before EMMC needed changes either in the chipset or the OS. EMMC is a half-duplex because the interface is parallel so it exit be read or write.UFSMobile devices growth rapidly last few categorys this bring a challenge to the manufacturer to add memory that (Toshiba, 2015) will have a high bandwidth, high capacity, low power consumption and low cost. These factors were very important to improve the mobil e devices. Because adding ordinary extra memory it will increase the cost of all mentioned factors. In 2014 Samsung announce approximately the new memory which meet the requirements of the iv factors of the manufacturer. widely distributed flash storage (UFS) was built circumscribedly for mobile devices which required low power and at same time provide high performance. UFS is a full duplex because it has serial interface read and write done separately.The image below (BHATT, 2014) shows the advantage of UFS over EMMCChallenges according to (Zareen, 2010)The major(ip) challenges in mobile forensics areThe changes in the architecture of the new released of mobile devices, where the inspector has to be up to date and do more tests to be sure he can do data expression.The new mobile devices it has the ability to encrypt the date this can be a big challenge to the examiner.Hardware differences there are different brand and simulation of mobile devices in the market the examiner h as to come across as much as can of brands and model to be familiar about the technology.Lack of resources the rapid growth of mobile devices required new tools and scholarship accessories.Anti-forensic techniques make the investigation more difficult, as an example data hiding, data obfuscation, data forgery, and secure wiping.Passcode recovery the examiner has to work conservatively to access the device without damaging the data.Malicious programs can be a challenge to the examiner it may attempt to spread to other devices over the equip interface or a wireless.Safety the examiner life can be on danger, the device can contain different kind of risk on the examiner life. The device may contain a biology or chemical hazards which will impact on the examiner.Data acquire processCapabilityLogical straighten upion, file system and somatogenic declivity normally done by software. Even the locked mobile devices and with original can be open up using software. Not all mobile devic es support the same process of data acquisition.Joint judge pull through Group (JTAG) support in-system (ISP) programming and reading. It is an advanced hardware level data acquisition in the physical extraction stage. It depend on the Test Access Ports (TAPs) of the device and instructing the processor to transfer the raw data stored on connected memory chips. If the memory support JTAG then the TAP can be addressed of the memory through the JTAG interface. All memory address goes the though the data bus and it can be read by shifting the boundary-scan register value through JTAG chain. In this way the intact memory content can be read by descry the memory address. The entire memory can be copied in this way. If the memory doesnt support the JTAG then it can connect to TAP of another device this could be the processor. The processor has direct access to the memory through the system bus. By connecting to CPU TAP the memory can be read. move of JTAG according to (Elder, n.d.)Ide ntify TAPs by researching the forums and related websites as well documented devices. If the TAPs cannot be identified then check the device PCB for possible TAPs and trace it manually to find appropriate conjunctive pins.Solder wires to the pinout in the mobile device.Connect the other side of the wires to JTAG aper (RIFF box, volcano, ATF nitro).Select the memory sitting than read the flash memory.Analyze the data with the forensics tools.Chip-offChip-off forensics is the next level if the JTAG method not work properly to extract data. This level involve physically remove the flash memory to extract the data from the mobile device then acquiring the raw data using specialized equipment. This way is powerful where it can be used to collect all data from the memory even if the device is shamed jut memory must be in a equitable condition. The examiner must pay attention to highest temperature can apply the chip to remove before it get damage. According to Samsung the temperature range of EMMC used in mobile devices are -25C 85C.Remove the memory (de-soldering) chip using appropriate heat (-25C 85C) always the examiner must monitor the temperature to be within the range.Clean the chip carefully to remove the comical suck on the chip memory.Use special chip programmer and adapter to acquire the data from a configuration of flash memory (UP-828P Programmer).Analyze the data with the forensics tools.Samsung T479 Gravity 3 feature phone manual extractionif the device is on and unlocked confiscate from the networkCheck battery perspectiveCheck device statusRecord date and time cast the device content using keypad or touch screenIf the device powered off or lockedIsolate from the networkCheck device status tip over on the deviceIf not start try to charge itIf banking company be charge stop proceedIf the device start but it is locked stop processChallengesDeleted data cant be find oneself because no tools used to extract data in this stage.Error may accrued.B rowse the device it can be difficult because broken buttons or touch screen problem.Tools used to record the evidences.Ramseys STE3000FAV Project-A-PhoneLogical extractionThis stage required special software to extract data from the device.If the device is on and unlockedIsolate form the network (disable Wi-Fi and hotspot, airplane mod)Check the status of the deviceDocument what on the screen and the apps running in the background modify USB debugging and stay awakeCheck memory card availabilityIf gettable copy cardCreate hash valueReinstall copied memoryConnect mobile to PC has software to extract data proclivity of data can be get in logical extractionPhone bookCall LogsSMSCalendarMMSESN/IMEIPicturesVideosRingtonesAudio/MusicMemory CardIf the device is lockedconnect to a PC has software to de-escalate lock (most of forensic tools)follow steps in 1Tools used in this stageUFED 4PC, Oxygen and Xry (SIM call not supported)ChallengesCant retrieve deleted dataFile systemIf the device is on and unlocked like procedure as logical extractionList of data can be get in logical extractionExtract user lockFiles DecodingFile System ReconstructionBookmarksCallsContactsInstalled ApplicationsMMSNotesSMSWeb memorialTools used in this stageUFED 4PC, Oxygen and Xry (SIM call not supported)Challenges physiologic ExtractionThis phone doesnt support physical extraction.JTAGThis phone support JTAGSamsung I9500 coltsfoot S4 motherboardMobile deviceProcessSamsung T479 Gravity 3Samsung I9500 Galaxy S4Manual extractionYesYesLogical extractionYesYesFile system extractionYesYes somatogenetic extractionNoYesJTAGYesYesChip-offYesInternet of thing overviewInternet of things (IOT) refer to any physical device which can have an IP address and connected to the internet. According (Fremantle, 2015) the IOT come to facilitate people life and make it easier.It will touch every aspect of our lives, including our houses, work places, transportation and even our bodies. This new technology make humans overcomes the location obstacle between people and the machine enabling them to communicate and interact intelligently. Rapid growth of study Technology already allowed Internet of Things to start to be as a reality in recent days. If we look around us, we already started to bring down and touch the smart phones, home automation, smart traffic lights, smart demodulator devices at industrial locations, Health services, Radars, Environment Researches, and many other sectors. Definitely, the approaching of IoT will be full of surprises and new unexpected and unpredictable technologies big businessman be introduced. IoT technology is significantly growing at a critically dangerous pace and Information Technology Researchers predict that by the year 2020, 10th of billions of wireless devices will be connected wirelessly as part of the IoT industry. People will be able to do unimaginable things remotely in an unbelievable time and it is expected that almost anything might be c onnectable.According to (Lobaccaro, 2016) there are four categories1. Integrated wireless technology (IWT)2. root energy management system (HEMS)3. Smart home micro-computers (SHMC)4. Home automation (SHS/HA).Agrawal, J. (2015). Evolution of Mobile Communication Network from 1G to 4G.BHATT, B. (2014, 4 13). Universal Flash Storage. Retrieved from Slideshare https//www.slideshare.net/BhaumikBhatt4/universal-flash-storageDAS, S. (2015, 8 18). Parts of a Mobile Cell Phone and Their Function. Retrieved from http//www.mobilecellphonerepairing.com/parts-of-a-mobile-cell-phone-and-their-function-big-parts.htmlElder, B. (n.d.). Chip-Off and JTAG Analysis. Retrieved from Evidence http//www.evidencemagazine.com/index.php?option=com_contenttask=viewid=922Fremantle, P. (2015). A REFERENCE ARCHITECTURE FOR THE INTERNET OF THINGS.GSM Mobile Phone. (n.d.). Retrieved from RF Wireless World http//www.rfwireless-world.com/Articles/gsm-mobile-phone-basics.htmlGuru. (2015, 10 28). Top 10 Mobile Phones Operating Systems. Retrieved from shout me https//www.shoutmeloud.com/top-mobile-os-overview.htmlQualcumm. (2014). The Evolution of Mobile.Samsung. (2013). Samsung Smart Memory. Samsung.Toshiba. (2015). UFS memory. Toshiba.Zareen, A. (2010). Mobile Phone Forensics Challenges.http//forum.gsmhosting.com/vbb/f672/guide-how-find-direct-EMMC-pinout-step-step-pictures-1724774/https//www.oxygen-forensic.com/ transfer/articles/Oxygen_Forensic_Detective_Getting_started.pdfhttps//blog.elcomsoft.com/2016/01/forensic-acquisition-android/http//www.bulleproof.com/Papers/Android%20Forensics%20Techniques.pdfhttps//blog.elcomsoft.com/2016/01/forensic-acquisition-android/https//www.hackingloops.com/android-forensics-tutorial-4-unlock-android-pattern-lock/http//resources.infosecinstitute.com/android-forensic-logical-acquisition/grefhttps//www.gillware.com/forensics/blog/digital-forensics-case-study/forensic-case-files-htc-one-chip-offhttps//digital-forensics.sans.org/media/DFIR-Smartphone-Forensics-P oster.pdfhttp//www.gsmarena.com/samsung_t479_gravity_3-3335.phphttp//www.riffbox.org/jtag-news/riff-jtag-samsung-gravity-3-sght479-unbrick-dead-boot-repair-supported/
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment