In this paper we discuss a method which applies data reverse engineering on a cell phone, which focuses at helping the specialist to distinguish in which records the specific data are expected and how to decode them, remembering the end goal to be changed over in a more suitable format. The paper will also define Data reverse engineering and show the tools used in smartphone forensics.
Reverse engineering is a procedure or capacity to make a logical and physical information show by pulling data from an existing information sources. Reverse engineering is a challenging task. It empowers you to make applications act precisely how you need them to. Data reverse engineering (DRE) is a moderately new approach used to address a general classification of data degradation issues. Data reverse engineering joins together ways to comb through data with detailed data administration practices. The methodology improves the frameworks re-engineering capability.
“Mobile devices range from basic, inexpensive phones used primarily for phone calls to smart phones that integrate a phone, PDA, camera, music player, and more into one device.” (Guide To Computer Forensics and Investigations - Nelson 2013) The cellular telephone could be recognized a definitive disruptive innovation: indeed, for example telephony, radio, TV, the Internet, mobile telephones are radically changing about every part of day by day life, both inside organizations and in the everyday lives of people, furnishing more provisions and gathering more private information. Cutting edge smartphones give progressed characteristics like email, Internet and recorders. Such smartphone's characteristics, other than the side of the portable devices, give to user the opportunity to convey with him/her a considerable measure of individual information, for example contacts, call logs, messages, pictures, motion picture, ATM cards and other banking information. (Data reverse engineering on a smartphone, 2009)
People store an abundance of data on phones, and the prospect of losing your mobile phone and, the data archived on it might be a startling prospect. In spite of this concern, relatively few individuals contemplate securing their mobile phones, even though they routinely bolt and secure laptops or desktops.
“The vast size of today’s storage devices means that time-honored and court-approved techniques for conducting investigations are becoming slower and more expensive. Today’s examiners frequently cannot obtain data in a forensically sound manner or process that data to completion once they obtain it. These problems are most obvious to examiners faced with cell phones and other mobile computing platforms. There are thousands of cell phone models in use around the world,...