- Practical Mobile Forensics
- Rohit Tamma Oleg Skulkin Heather Mahalik Satish Bommisetty
- 257字
- 2021-06-24 16:39:00
Chip-off
Chip-off refers to the acquisition of data directly from the memory chip present in the device. At this level, the chip is physically removed from the device and a chip reader or a second phone is used to extract data stored on it. This method is more technically challenging, as a wide variety of chip types are used in mobiles. The process is expensive and requires hardware-level knowledge as it involves the desoldering and heating of the memory chip. Training is required to successfully perform a chip-off extraction. Improper procedures may damage the memory chip and render all data unsalvageable. When possible, it is recommended that the other levels of extraction are attempted prior to chip-off, since this method is destructive in nature. Also, the information that comes out of memory is in a raw format and has to be parsed, decoded, and interpreted. The chip-off method is preferred in situations where it is important to preserve the state of memory exactly as it exists on the device. It is also the only option when a device is damaged but the memory chip is intact.
The chip on a device is often read using the Joint Test Action Group (JTAG) method. The JTAG method involves connecting to Test Access Ports (TAPs) on a device and forcing the processor to transfer the raw data stored on the memory chip. The JTAG method is generally used with devices that are operational but inaccessible using standard tools. Both of these techniques also work even when the device is screen-locked.
- 云原生安全:攻防實踐與體系構建
- 可信計算3.0工程初步
- 網絡安全技術及應用(第3版)
- Applied Network Security
- 網絡安全與攻防入門很輕松(實戰超值版)
- Advanced Penetration Testing for Highly:Secured Environments(Second Edition)
- 信息安全導論(第2版)
- 解密數據恢復
- 數據安全與流通:技術、架構與實踐
- 從實踐中學習密碼安全與防護
- 黑客攻防從入門到精通
- Hands-On Artificial Intelligence for Cybersecurity
- 云計算安全防護技術
- 信息系統安全等級化保護原理與實踐
- 社會工程:防范釣魚欺詐(卷3)