You are currently viewing a new version of our website. To view the old version click .
Applied Sciences
  • Article
  • Open Access

20 June 2020

Methodology for Forensics Data Reconstruction on Mobile Devices with Android Operating System Applying In-System Programming and Combination Firmware

,
,
,
,
,
and
1
Cyber Security INCT Unit 6, Laboratory for Decision-Making Technologies (LATITUDE), Department of Electrical Engineering (ENE), Technology College, University of Brasilia (UnB), Brasilia-DF 70910-900, Brazil
2
Group of Analysis, Security and Systems (GASS), Department of Software Engineering and Artificial Intelligence (DISIA), Faculty of Computer Science and Engineering, Office 431, Universidad Complutense de Madrid (UCM), Calle Profesor José García Santesmases, 9, Ciudad Universitaria, 28040 Madrid, Spain
*
Author to whom correspondence should be addressed.
These authors contributed equally to this work.
This article belongs to the Special Issue Machine Learning for Cybersecurity Threats, Challenges, and Opportunities

Abstract

This paper proposes a new forensic analysis methodology that combines processes, techniques, and tools for physical and logical data acquisition from mobile devices. The proposed methodology allows an overview of the use of the In-System Programming (ISP) technique with the usage of Combination Firmware, aligned with specific collection and analysis processes. The carried out experiments show that the proposed methodology is convenient and practical and provides new possibilities for data acquisition on devices that run the Android Operating System with advanced protection mechanisms. The methodology is also feasible in devices compatible with the usage of Joint Test Action Group (JTAG) techniques and which use Embedded Multimedia Card (eMMC) or Embedded Multi-Chip Package (eMCP) as main memory. The techniques included in the methodology are effective on encrypted devices, in which the JTAG and Chip-Off techniques prove to be ineffective, especially on those that have an unauthorized access protection mechanism enabled, such as lock screen password, blocked bootloader, and Factory Reset Protection (FRP) active. Studies also demonstrate that data preservation and integrity are maintained, which is critical to a digital forensic process.

1. Introduction

In recent years, our society has experienced an accelerated process of computerization, thus becoming highly interconnected. In May 2019, in Brazil alone, public records pointed to over 230 million smartphones in use. If we add up laptops and tablets to that number, there were then 324 million portable devices, i.e., approximately 1.6 portable devices per inhabitant [1].
With the evolution of mobile devices, a large part of the population has been replacing the computer by the smartphone to perform most tasks involving technology, for example, exchanging messages, sending e-mails, making online payments, etc. According to the StatCounter (Web traffic analysis website) [2], smartphones account for 51.69% of computing devices (smartphones, tablets, and computers) in use worldwide.
Mobile devices are used for a variety of tasks, such as sending or receiving text or voice messages, images, chatting by voice or video calls, watching videos, sending or receiving e-mail, making bank transactions, capturing and manipulating images, using applications for health care, relationships, social networks, monitoring of physical activities, mobility and traffic and even to store and display digital documents. In Brazil, we can mention as an example some government services applications of interest to the citizen, such as the Voter Card, the Vehicle Registration and Licensing Certificate, and the National Driver’s License.
With technological advances, it has become common for mobile devices to receive constant hardware and software improvements. With each new device launched, a new System on Chip (SoC) is employed, which is more modern, faster, and more energy-efficient, in addition to expanding storage capacity. New mechanisms to protect against unauthorized access are also frequently implemented or improved.
Numerous manufacturers already produced cell phones and marketed them globally before the appearance of the Android operating system (OS). After that, they started to invest in hardware development so that their devices started to run the new OS. New manufacturers have also emerged, focusing on the global market or the Asian market, whose consumer public has quite significant numbers. South Korean Samsung is the manufacturer that holds the largest share of the global mobile device market [3] and runs the Android OS, making it the most widely used OS worldwide [4]. Even before the Android OS became the most used OS, this system has been considered an important source of information. As remarked by Simão et al. [5], Android OS constitute a large repository of information in a forensic perspective, both on-site as well as provided remotely.
Modern mobile devices are a rich source of data that can be forensic evidence in investigation processes and security analysis. Such devices increasingly have more storage space, connectivity options, and multitask ability, making them the first option for countless users. Currently, devices that run the Android OS and its variations are more accessible in the global market. That turns them into natural candidates in forensic analysis and investigation processes.
When it comes to security and digital forensics, analysts strive to acquire and analyze data from mobile devices. The diversity of technology used on mobile devices, the accumulation of digital evidence, the lack of standardized extraction methodologies, and the lack of necessary training characterize challenges that hinder or prevent data acquisition [6].
Companies that develop technologies for digital forensics are also affected by the diversity of components and manufacturers of mobile devices, as they cannot be effective and efficient in all models or in all manufacturers. The gaps left by such companies are also a barrier to law enforcement forces.
Files stored in digital format are considered digital evidence, including audio, video, and image files, and even the software or the hardware itself. It is noteworthy that such files and devices can be part of the investigation of most crimes in the digital environment. Therefore, they must be adequately investigated and protected against alteration, maintaining protection under the chain of custody.
The Mobile Device Forensics is characterized by difficulties in accessing device data, the effort to unlock or bypass security mechanisms and obtain data, and often, by the inability to obtain the entire volume of data contained in the device. One is also feature by the fact that it is more complex than traditional computer forensics, requiring better-trained teams and specialized equipment to obtain legally acceptable results.
Unlike traditional Forensic Computing, where any intervention in the system must be avoided at all costs, in forensics on mobile devices it is necessary to perform access and make interventions directly on the hardware for possible attempts to bypass the access block mechanisms, and also install elevation of privilege applications. However, the correct use of techniques allows to preserve the evidence, and consequently, the legitimacy of the obtained evidence.
Figure 1 represents, in a summarized way, the steps of a methodology that can be applied to mobile forensics.
Figure 1. Steps of forensic methodology.
With regard to mobile device forensics, the scenario for obtaining evidence may also be different. We will briefly address each of the steps of the methodology, always aiming at obtaining the legality of the actions.
  • Evidence identification: As it is a mobile device, its identification may be more difficult, as the offender tries to hand over another device in place of the one who actually has the evidence. Therefore, it is essential to determine which fact needs to be clarified and which devices should be analyzed. It is important to record all details of the location and the seized items.
  • Preservation of evidence: The device to be analyzed must always be handled with gloves so that the fingerprints of the device user are preserved. Although it is not part of the acquisition and analysis of digital evidence, such evidence may be relevant to other forensic sciences. The device should be kept, whenever possible, in the state in which it was seized. If it is seized turned-off, it must remain off. Otherwise, it is also important to put the device in airplane mode, to prevent it from receiving new calls, SMS, creating new itinerary records by GPS, avoiding false positives during the analysis process, or even, that the data may be erased remotely. If this is not possible, a faraday bag must be used to transport the device to the laboratory where the data will be acquired. All features of the device must be documented.
  • Chain of custody: Chain of custody, in the legal context, refers to the chronological or historical register that records the sequence of custody, control, transfer, analysis, and disposition of evidence, whether physical or electronic, and is of fundamental importance in criminal cases.
  • Method for acquiring evidence: The forensic analyst should evaluate the best tool or methodology for data acquisition, preferably using the least invasive methods, and it may be used these according to the need.
  • Investigating questions: The authority responsible for elucidating the case must formulate the questions for which the forensic analyst must search the evidence for answers that satisfy the authority’s questions.
  • Analysis process: These are the processes, tools or methodologies through which the acquired evidence will be analyzed to answer the investigative questions.
  • Conclusive report: It is the document that includes all the records made in the previous steps, and mainly, answers the investigative questions asked by the competent authority.
It has become common to find public reports showing that the use of smartphones in the practice of illegal acts is growing. Increasingly, these devices are used to practice criminal activities, becoming digital evidence, relevant for criminal investigations. Due to a more significant market share, the acquisition and forensic analysis of data from Android devices have gained significant importance in the field of digital forensic investigation [7].
One of the most recent examples of crucial evidence found on mobile devices can be seen in the case of the sniper Mohammed Saeed Al Shamrani, who on 6 December 2019, killed three American sailors at a military base in Florida. Authorities discovered contacts between Mohammed Saeed Alshamrani and Al Qaeda agents after being able to access the contents of the sniper’s mobile devices [8].
In this work, a methodology was developed and named by the authors as Low-Level Data Acquisition ISPCF (LLDA-ISPCF). This methodology combines the use of In-System Programming (ISP) and Combination Firmware to bypass the lock screen, followed by specific procedures and through the use of proper tools for forensic analysis in both hardware and software.
As a way to validate the methodology, the device data was acquired by using the Universal Forensic Extraction Device (UFED) Touch 2, preserving the integrity of the data, and, finally, the acquired data were analyzed in the UFED Physical Analyzer. It is worth mentioning that the methodology developed is not limited to the tools used. That means that other tools, in the market, can perform tasks in the forensic analysis process for mobile devices forensics.

1.1. Main Contributions and Limitations of the Proposed Methodology

The main contributions of the proposed solution are the following:
  • Enable the lock screen bypass, regardless of the OS version;
  • Prove the effectiveness of the LLDA-ISPCF methodology on devices with File-Based Encryption;
  • Enable data acquisition from a wide range of mobile devices, regardless the manufacturer;
  • Enable device data acquisition using specialized, proprietary and open-source tools while preserving data integrity;
  • Allow the root user to be enabled without the risk of losing user data, which allows physical extraction on models whose acquisition process is only possible with the rooted device;
  • Allow the acquisition and analysis of data by any capable forensic tool, observing the compatibility of the analysis tool with the format generated by the acquisition tool.
Regarding the limitation of the methodology, it is considered that—to the best of the authors’ knowledge and until the elaboration of this work—devices that use Universal Flash Storage (UFS) main memory or that have hardware-supported encryption are not compatible with the tools employed in the proposed methodology. That future updates to the firmware by the manufacturers may make the methodology unfeasible. Also considered is the fact that Special Firmware, such as the Combination Firmware used on Samsung devices may not be available for a specific model or manufacturer, and its use combined with ISP requires a specific study of the device from which the data will be acquired to bypass the lock screen mechanism.

1.2. Motivation

The main motivation of this work is to develop a novel technique that is able to help law enforcement agencies (LEA) to conduct forensics in mobile devices that have security protections enabled, since these protections prevent LEA to properly collect evidence and analyze them in case of crimes.
It is important to remember that criminals all over the world use communication devices such as mobile phones with security measures applied to them. Such mechanisms make it very hard to forensics specialists to bypass them and acquire evidence that helps in the solution of criminal cases.

1.3. Article Structure and Organization

The remainder of this paper is as follows. Section 2 presents some basic concepts for understanding the purpose of this work, as the state of the art reviews, and some related works. In Section 3 we present the problem description and the proposed solution, and describes the new methodology created and its phases. In Section 4 we present a proof of concept and results of the proposed methodology. We conclude this work in Section 5 with some considerations about future work.

3. Problem Statement and Proposed Solution

Although the studies do not point out explicitly, it is observed that the most significant difficulty encountered by digital forensics professionals, with regard to the acquisition of data from mobile devices, are the lock screens configured by the user. Such a restriction prevents the acquisition of data by the extensive list of forensic tools usually employed, with different models and manufacturers.
It corroborates the statement that Cellebrite (Cellebrite DI is an Israeli company founded in 1999 and headquartered in Petah Tikva, which manufactures data extraction and data analysis devices from mobile devices, mass storage devices, and drones. The company is a subsidiary of Sun Corporation, Japan. Cellebrite DI has two subsidiaries, Cellebrite USA Corp. and Cellebrite GmbH, based in Parsippany, New Jersey, USA and Munich, Germany, respectively.) [50] already has 11 laboratories around the world, one of which is installed in Brazil, specialized in advanced unlocking and extraction services using UFED Ultimate [51]. The service offered by these laboratories is called Cellebrite Advanced Service (CAS), whose main objective is to unlock the device by breaking the password by brute force attack. Such a technique can be used in Apple devices with iOS, Samsung, Huawei, and LG devices [52] with an approximate cost of $ 2500.00 (two thousand and five hundred dollars) per unlock.
Another company offering a similar solution is Grayshift, which has developed a product called GrayKey [53], intended exclusively for unlocking iPhones. In addition to the removal or bypass of the lock screen, it is also necessary to make the physical acquisition of the device data, to have access to the content deleted by the user and that of instant messengers, such as WhatsApp, without contaminating the evidence and allowing the analysis by tools specialized, commercial or not.
In some cases, even with the device unlocked, it may not be possible to perform the physical acquisition, being necessary to enable the root user on the device to do so. In some models of Android devices, during the procedure performed to root the device, the internal memory is safely erased, which is not feasible from a forensic point of view.
In considering these aspects, this section describes the problem addressed in this article and its proposed solution. This solution will result in bypassing the lock screen, rooting the device (if necessary) without the risk of losing or contaminating the user’s data, subsequent data acquisition through a forensic tool for mobile devices, and analyzing the acquired data.

3.1. Problem Statement

Mobile device manufacturers have been improving security mechanisms to prevent or hinder unauthorized access to device data. Currently, the user has encryption mechanisms, lock screen mechanisms that automatically prevent other changes that could allow access to data, in addition to other security mechanisms.
The implementation and improvement of such mechanisms prevents or hinders the work of state law enforcement agencies. The judicial and scientific police find it challenging to acquire data from mobile devices that may constitute evidence, given that current forensic suites, both proprietary and open-source, fail to bypass the lock screen mechanisms of some models of mobile devices.

3.2. Proposed Solution and Justification

This work proposes a solution that combines the use of ISP and Combination Firmware aiming to bypass the device lock screen, allowing the physical acquisition (with the possibility of rooting the device if necessary), the file system acquisition, and data logical acquisition. After the respective acquisitions, the expert can perform his analysis using specialized forensic tools.
During the process established in the LLDA-ISPCF methodology, it is also possible to backup the partitions that will be changed to use the Combination Firmware. This backup is restored after acquiring the data, leaving the device exactly as it was before, with the current user lock screen.
This methodology applies to a wide range of devices, regardless of the OS version, model, or SoC manufacturer.
The forensic possibilities offered by the LLDA-ISPCF methodology is of great importance for the present work since it can retrieve data contained in mobile devices for the elucidation of the most various crimes. The ability to acquire and analyze data from mobile devices with the latest versions of the Android OS, since a small number of devices still runs android Version 10, represents a significant advance in mobile forensics in the current scenario.
After verifying that the devices collection phase has complied with the digital forensic life cycle stage presented in Figure 3, for expert examination, the methodology proposed in this work is ready to be applied for physical, system, and data acquisition.

3.3. Description of the LLDA-ISPCF Methodology

The methodology is presented in Figure 7, and its phases are detailed below.
Figure 7. The proposed methodology execution flow.

3.3.1. Phase 1: Preliminary Check of the Device’s Security Mechanisms

At this phase, it should be checked whether the device has any lock screen mechanism. The most common ones found on Android devices are the standard PIN, alphanumeric password, biometrics, facial recognition, and iris scanning. There is also an unlocking screen mechanism by Near Field Communication (NFC) Token and USB, although they are less common. Although, if the lock screen mechanism protects the device, it will be necessary to start the device in Recovery Mode. By doing so, we will be able to get information about the status of its bootloader (locked or unlocked), USB debugging mode (enabled or disabled), FRP status (On or Off), and Firmware version, with special attention to the binary version of the Firmware.
With the device locked, it is necessary to use a combination of keys, which varies according to the manufacturer and the device model. The most common way is, starting from the situation in which the device is turned off, simultaneously pressing the Power and Volume Up keys, and keep them pressed for about 3 s. It is recommended to take note of all the information, including the version of the OS that runs on the device, as this data will be used in the next phases. If the device has USB debugging mode disabled when it is connected to the computer, although it is recognized, it will not be possible to access any file system partition; the smartphone will only recharge the battery via the USB port. If USB debugging mode is enabled, the technique of using the Android Debug Bridge (ADB) [54] can be explored. This technique is a command-line tool that provides access to a Unix shell, is used to execute various commands on an Android OS device, but which will not be covered in this work.
If the device does not have a lock screen mechanism, other tools or even steps of the proposed methodology. However, this hypothesis will not be detailed in this work since it does not address the situation of the enabled security mechanism.

3.3.2. Phase 2: Disassembly of the Device

This phase consists of removing the display from the device and separating the components to access the board. Besides the display, it is necessary to remove the battery, cables, heat sinks, and anything necessary to perform the solder with adequate precision, without risk of damaging the equipment and making acquisition impossible.
For a display removal, it is ideal to use an LCD/Touch Screen Disassembly tool, equipment that evenly heats the screen at the correct temperature so that the glue used on the LCD is more easily released, reducing the breakage risk. In some devices, it may be necessary to remove segments of the metallic protection of some components to access the TAPs.

3.3.3. Phase 3: Verification of Compatibility with the Application of the JTAG Technique

At this stage, it is necessary to check if the device has the TAPs for the execution of the JTAG. This verification can be carried out visually. If the forensic analyst does not know how to locate the standard JTAG TAPs, he can consult the Box software to check the diagram of the TAPs of the device in question. It should be noted that the most recent devices do not include JTAG TAPs. If the device to be analyzed has a TAP, the JATG technique can be used, according to the works developed by Pappas [9], Sathe, and Dongre [45], in addition to the tests carried out by NIST [47], whose devices were equipped with TAPs for JTAG.

3.3.4. Phase 4: Checking the Device’s Memory Type

The ISP, until the elaboration of this work, is only compatible with eMMC and eMCP memories. If the device is equipped with another type of memory, such as UFS, the Chip-Off technique can be used, according to the work of Sathe and Dongre [45] and the tests carried out by NIST [47].

3.3.5. Phase 5: Verification of the Encryption Mechanism

To check whether the main memory is protected with encryption and which model has been applied, it is necessary to consult the version of the OS running on the device, data already obtained in Phase 1 (Section 3.3.1), and to seek technical information about it.
It is necessary to confirm that the use of the Chip-Off technique will carry out the acquisition of encrypted data, and that forensic suites may not be able to decrypt such data. If any encryption does not protect the main memory, it is possible to use the Box software to perform the physical data acquisition, without the need to use the Combination Firmware.

3.3.6. Phase 6: Combination Firmware Download

In this phase, in possession of the firmware version and the binary version of the device, obtained in Phase 1 (Section 3.3.1), it is necessary to locate and download the Combination Firmware compatible with such a device. Some websites make these files available for free. However, it is advisable to download it from specialized websites, reducing the probability of getting files corrupted or infected by malware. One of the most popular websites that provide access to mobile devices maintenance tools is Halabtech Support [55].

3.3.7. Phase 7: Running the ISP

This phase begins with a search in the Box software to locate the diagram containing the TAPs location of the exact device model. After identifying the TAPs, it is necessary to weld the conductors. One end of the conductors is soldered on the TAPs, and the other end is weld on the ISP-dedicated connector.
The next step is to plug the ISP connector into the Box. At this point, it is possible to use the eMMC Tool Suite to make the physical acquisition of the device’s internal memory. However, the encrypted data acquired can only be analyzed if the forensic suite used for analysis can decrypt them. If it is not possible to decrypt the data, the JTAG Classic Suite software will be used to manipulate the data on the Persist partition, without changing the partition where the user data is located.
Android devices have multiple partitions that have different functions [56]. However, because it is an Open Source project, manufacturers can make changes or modifications at will. This way, we will have a varying number of partitions in the different device models running with Android OS. Consequently, partitions may vary depending on SoC, brand, OS version, and more.
To install the Combination Firmware, that is, overwrite the boot, recovery, and system partitions, it is necessary to previously overwrite with 0 (zero) the area where the FRP is recorded, and on newer devices, the FRP is usually on the Persist. While the FRP is active, it is not possible to overwrite these partitions.
All values for configuring the software required to run the ISP can be obtained in Seeking the Truth from Mobile Evidence [57].

3.3.8. Phase 8: Combination Firmware Writing

Following the phases proposed in this methodology, the Combination Firmware writing is the last phase that precedes the acquisition itself. It is necessary to rewrite the boot, recovery, and system partitions. Such partitions will have their original content replaced by the files contained in the Combination Firmware previously obtained. It is advisable to make a backup of the partitions that will be overwritten before performing the operation. It is also possible to extract the contents of the file with MD5 extension and generate a new compressed file with the same name as the complete file, overwriting it. Doing so will be easier to use the software for writing the firmware.
For the writing operation, both the Box Octoplus Pro and the Odin tools can be used. The necessary procedures for the Combination Firmware writing using the Box can be obtained in Seeking the Truth from Mobile Evidence [57].
After replacing the partitions mentioned above, the device will boot normally, without asking for the password or the mechanism imposed by the user.
The device on which the LLDA-ISPCF methodology was applied uses file-based encryption. When the device is initialized, the system accesses the data stored in its special encrypted area, protected with hardware keys. All data on the data partition is inaccessible until the user provides authentication credentials, as this area is protected with keys based on the user’s credentials. The user password is one of the cryptographic keys, and when it ceases to exist, only the system password, defined in the source code by the developers, remains. As there is only the default system key, no key exchange takes place, and the partition is automatically decrypted. The process is transparent, and as soon as the initialization process is completed, the system displays the home screen.
After of initialization, the device displays a screen with essential functions, being possible to view photos, explore files, record images, among other basic operations.
From that point on, the device is ready for data acquisition, being possible to activate the USB Debugging Mode, activate the option Stay Active, and also, if necessary for the acquisition, root the device. It is important to note that the firmware now installed runs the same Android version as the original firmware. Therefore, the acquisition methods must be compatible with the OS version if such a device is not rooted. The choice of the forensic acquisition tool is at the discretion of the specialist who will perform the procedure.

3.3.9. Phase 9: Device Data Acquisition

At this stage, the forensic analyst may select the most appropriate tool for the devices data acquisition. The need to root or not the device by the analyst has to be carefully analyzed. This action is due to his ability to manipulate the forensic tools at his disposal.

3.3.10. Phase 10: Data Analysis Using Forensic Tools

After data acquisition, this step marks the end of the previous phases proposed by the methodology. The forensic analyst will carry out the analysis of the acquired data, devices being able to use any available tools, as long as they are compatible with the data format generated by the tool that performed the acquisition. It is worth mentioning that, in a physical acquisition, it is possible to obtain files containing the user’s credentials for accessing online services and social networks, such as Google services (Keep, Photos, Google Drive, etc.), Facebook, Twitter, Instagram, among others. These credentials, when extracted and inserted in software for searching and analyzing data in the cloud, function as “tokens”, providing authorized access to such services, considerably increasing the volume of data obtained.

4. Case Study: Analysis of a Device

In this section, the actions in each phase of the proposed methodology will be detailed, from the preliminary verification of the security mechanisms to the acquired data analysis.

4.1. Choice of the Device to Validate the Proposed Methodology

For study purposes, we performed the physical data acquisition of a Samsung SM-A105M/DS smartphone (Galaxy A10). The choice for this device took into account four main criteria.
The first was the scope of the device and the global sales volume. According to (the market analysis and business consulting company Counterpoint) [58], Samsung Galaxy A10 (A105M) was the best-selling Android smartphone in the world in the third quarter of 2019, and placed second in overall sales volume, just behind the iPhone XR.
The second criterion was the Android version on the device because the more recent the smartphone, the more layers of security are implemented, and the more secure the system tends to be. In this case, the SM-A105 model runs Android version 9.0 (Pie), which runs on most Android devices (41.9%) [59].
The third criterion was the difficulty in carrying out the welds on the board, considering that the device has tiny components. Therefore, without using a VR-Table for the realization of an ISP, it is still possible to weld the conductors on the TAPs.
The fourth criterion is the fact that the SM-A105 data has device encryption enabled automatically (Direct Boot).

4.2. Application of the Methodology

Before using the proposed methodology, we performed all kinds of extraction methods available on UFED Touch 2 (software version 7.32.0.68). These methods are compatible with the characteristics of the SM-A105M/DS device (Galaxy A10), which had an activated lock screen (alphanumeric characters), bootloader blocked, USB debugging mode disabled, and FRP active. Unfortunately, we realized that none of these methods worked in the attempt of unlocking those smartphones. All steps illustrated in Figure 8 will be applied to validate the proposed methodology.
Figure 8. Flowchart of the LLDA-ISPCF methodology applied in the case study.
Each phase of the methodology proposed in this work to analyze the device in question will be detailed below.

4.2.1. Phase 1: Preliminary Check of the Device’s Security Mechanisms

In the case study, the device had an activated lock screen (alphanumeric characters), bootloader blocked, USB debugging mode disabled, and FRP active. Figure 9 displays information about the devices firmware version, OS version, device model, and binary firmware version.
Figure 9. Highlighted, the device binary version.

4.2.2. Phase 2: Disassembly of the Device

At this stage, the devices display and battery were removed to allow access to the board. Flat cables and other connectors were disconnected so that no components were damaged during the welding process. Due to the difficulty in accessing the TAPs, it was necessary to remove metal parts that serve as protection for the components, as can be seen in Figure 10.
Figure 10. Metal part removal to allow access to the TAP.

4.2.3. Phase 3: Verification of Compatibility with the Application of the JTAG Technique

At this stage, we checked if standard TAPs were present on the device board before applying the JTAG. The execution of this phase was a mere protocol, as the device was launched in 2019 and did not have TAPs for a JTAG execution (present only in older devices).

4.2.4. Phase 4: Checking the Device’s Memory Type

The device used in the case study had eMMC type memory and was therefore compatible with ISP. If the device was equipped with another type of memory, other techniques could be employed, such as Chip-Off.

4.2.5. Phase 5: Verification of the Encryption Mechanism

The device used in the case study (SM-A105M/DS) uses FBE type encryption, and Android OS Version 9 (Pie).

4.2.6. Phase 6: Combination Firmware Download

After identification, a search was performed to obtain the Combination Firmware. After locating the firmware-related files, those were downloaded to the local computer. Figure 11 shows the Combination Firmware serial number for download.
Figure 11. Combination Firmware download.

4.2.7. Phase 7: Running the ISP

In this phase, the research was managed in the Box software to locate the diagram containing the TAPs location of the exact device model. After identifying the TAPs, the conductors were soldered on the TAPs. Figure 12 shows, with the help of a microscope, one of the conductors already welded.
Figure 12. Conductor welded to the TAP.
Once the necessary conductors were soldered, the TAPs were connected to the corresponding points on the ISP connector, and then, connected to the Box. The JTAG Classic Suite utility was started. Figure 13 shows part of the JTAG Classic Suite utility screen, showing the primary memory partition of the device and the values of each parameter to manipulate the Persist partition. Such values may vary depending on the device and the eMMC manufacturer. The values referring to the parameters were obtained in Seeking the Truth from Mobile Evidence [57].
Figure 13. JTAG Classic Suite home screen.
We then recorded an FRP in the smartphone as to manipulate its Persist partition. After setting the correct parameters, the Persist partition was overwritten. Nevertheless, it is safe to mention that the partition with the user’s data was not invaded, and therefore the data remained intact.

4.2.8. Phase 8: Combination Firmware Writing

For a Combination Firmware writing, only relevant files that correspond to the boot, recovery, and system partitions should be preserved. The content of the file with extension MD5 can be seen in Figure 14.
Figure 14. SM-A105M most relevant Combination Firmware files.
Next, the Box Octoplus Pro and Octoplus Box Samsung Software were used for replacing the partitions specified in Figure 14. Figure 15 shows the Octoplus Box Samsung Software tool home screen. All settings were obtained in Seeking the Truth from Mobile Evidence [57].
Figure 15. Octoplus Box Samsung Software home screen.
After replacing the boot, recovery, and system partitions, the device restarted without asking for the lock screen password, allowing the viewing of media files, installed applications, and all content (files) present on the device. It should be noted that the firmware newly installed, runs the same Android version that runs on the original firmware, in this case, version 9.

4.2.9. Phase 9: Physical Acquisition Using UFED Touch 2

In this phase, we selected the forensic tool suitable for physical data acquisition. As we understand that physical data acquisition can be carried out by other forensic tools specific to other mobile devices, the option for UFED Touch 2 was motivated by a Cellebrite announcement. They stated that starting with version 7.23, the UFED Touch 2, 4PC, and InField would be able to perform the physical data acquisition of “A” and “J” Samsung’s line-up equipped with SoC Exynos, using a generic profile [60].
With the device already unlocked, physical extraction attempts were made using UFED Touch 2, with software before version 7.32.0.68. We realized that it was not possible to perform the physical acquisition without the root user being enabled. Therefore, in this case, it was possible to perform the file system acquisition and the logical acquisition without rooting the device. Figure 16 shows part of the UFED Touch 2 screen. Highlighted, is the method that allows the physical acquisition of the SM-A105M/DS, enabling the root user.
Figure 16. Possibility of physical acquisition of the SM-A105M/DS.
Using version 7.32.0.68 of the UFED Touch 2 software and selecting a generic profile, was possible to perform the physical acquisition without the need to enable the root user, in addition to the File System and Logic acquisitions. It is worth remembering that UFED Touch 2 was unable to bypass the lock screen in the experiments carried out before the methodology proposed in this work, although the tool promises to do so. Figure 17 shows a part of the UFED Touch 2 screen and, highlighted, the aforementioned functionality, allowing the physical acquisition of the SM-A105M/DS.
Figure 17. Physical acquisition of the SM-A105M/DS.

4.2.10. Phase 10: Data Analysis Using UFED Physical Analyzer

In this phase, the data acquired with UFED Touch 2 were analyzed using the software UFED Physical Analyzer Version 7.32.0.16. The extraction was indexed without errors, and the results were consistent, including the credentials for services in the cloud, which can be used in applications with acquisition capacity specifically aimed explicitly for such services, such as the UFED Cloud Analyzer.
Although the objective of this work is not to compare the capabilities of forensic suites, the acquired data were also analyzed with the AXIOM Examiner and XRY XAMN tools, all presenting consistent results from the perspective of forensic analysis. It should also be noted that data acquisitions can be carried out with one tool, and the analysis with another, being limited only to the format generated by the acquisition tool. Figure 18 shows the list of recovered files that were analyzed, including files deleted by the user, and that had not yet been overwritten. The files from instant messaging applications, such as WhatsApp, were also recovered.
Figure 18. Recovered files.

4.3. Comparative Analysis and Discussions

After completing the execution of the proposed methodology in the case study, the results will be compared to related works. A discussion of the proposed methodology concerning its efficiency and limitations will also be presented.
The methodology proposed in this work expands the possibilities of extracting data from mobile devices and can be used in devices with different characteristics. The acquisition capabilities in relation to the characteristics presented by the devices are as follows:
  • Capability 1 (C1): Data acquisition from devices that have an enabled lock screen mechanism;
  • Capability 2 (C2): Data acquisition from devices with FDE disk encryption;
  • Capability 3 (C3): Data acquisition from devices with FBE disk encryption;
  • Capability 4 (C4): Data acquisition from devices with OS up to Version 9;
  • Capability 5 (C5): Data acquisition from devices with eMMC and eMCP memory types;
  • Capability 6 (C6): Data acquisition regardless of SoC manufacturer;
  • Capability 7 (C7): Data acquisition from devices with F2FS and EXT4 file systems;
  • Capability 8 (C8):Data acquisition from physical devices.
Table 3 shows the comparison between the results achieved using the proposed methodology and the results obtained by the tools and methodologies presented in the related works. Concerning the data acquisition from mobile devices, the capabilities were synthesized to ease the visualization of what is common to each referenced work.
Table 3. Capabilities of both the proposed methodology and the related works.
By analyzing the related works, it appears that there is a great effort to improve tools, techniques, and methodologies in favor of data acquisition for forensic analysis. This effort is due to the highest difficulty to overcome or circumvent the security mechanisms that protect the devices data against unauthorized access. It is observed that such mechanisms also hamper law enforcement, as specialists encounter the barriers mentioned above, even when some legal devices and mechanisms support allow the analyst to access such data.
Among the mechanisms available on all smartphones running the Android OS, the lock screen, when activated, prevents access to the devices data and functionalities. It also prevents communication via the USB port, as the USB debugging mode is disabled by default. Although the forensic tools on the market promise to remove or bypass the lock screen on the overwhelming majority of smartphone models running the Android OS, this does not work in practice. In a wide range of models, the use of tools from various manufacturers, such as UFED, XRY, AXIOM, among others, is ineffective in extracting data when the lock screen is activated.
An example is the model SM-A105 and its variants, whose commercial name is Galaxy A10. The methodology proposed in the case study of this work used that device, which is sold globally, runs Android OS version 9 (Pie), and was the second best-selling smartphone in the world in the third quarter of 2019 [58]. In this case, conventional forensic solutions can only extract data if the device is unlocked.
The application of the proposed methodology, which combines the use of ISP and Combination Firmware, made it possible to bypass the lock screen and the subsequent acquisition and analysis of the data. Also, it is emphasized that the data integrity was preserved, which is fundamental in forensic analysis. Taking into account that Samsung is the company with the largest market share of mobile devices [3], we believe that its application is a worthy contribution to forensic analysts of law enforcement divisions, due to the abundance of devices and the number of security barriers that can be overcome.

5. Conclusions and Future Work

Given the results obtained in the case study, it is possible to ratify the efficiency of the proposed methodology, especially concerning the possibility of circumventing the lock screen mechanism, which constitutes one of the main obstacles to the execution of mobile devices forensics. The case study carried out to validate the proposed methodology proved that the combination of the listed techniques is feasible and presents satisfactory results. It was possible to bypass the lock screen, which is one of the main obstacles to mobile devices forensics. This characteristic allowed the device data acquisition.
Concerning encryption, with the FRP removal previously stored in the Persist partition, it was possible to change the partitions, boot, recovery, and system, and thus bypass the process of exchanging cryptographic keys, because the private key was removed, and the system understands that no blocking mechanism has been configured or was removed, so the data partition (/data) will be decrypted without any brute force attack or reverse engineering of the cryptographic algorithm, just bypassing the mechanism transparently.
It is important to note that the methodology has already been applied to other devices manufactured by Samsung, with Qualcomm, Exynos and MediaTek SoCs, and Xiaomi devices with Qualcomm SoCs. According to the studies that have been carried out, it is possible to apply the methodology on any devices that have TAPs for ISP and whose Special Firmware is available. However, we have not yet carried out tests with all devices, considering that the objective of the study is to address devices recently launched and that have a high volume of sales, which represents a greater attack surface.
It is crucial to confirm that the tool used for data extraction and analysis (AXIOM, XRY, among others) is at the analyst discretion or according to availability. Also, it is still possible to combine other tools to make additional acquisitions.
In devices with a security patch or latest binary firmware version, modifications in the architecture or system organization may occur. These modifications may also occur in the implementation of a new security mechanism that prevents the methodology from working precisely as detailed, requiring the analysis of specific cases that are beyond the control of the proposed actions.

Future Work

As future work, we intend to add to the set of techniques already applied, the Chip-off technique, and the technique presented by Alenadl et al. [34], aiming to bypass Samsung’s secure boot mechanism. A methodology for bypassing the lock screen password without using the Combination Firmware is also being studied, as well as a technique that deals with component swapping, including damaged smartphones. Finally, we intend to study techniques that allow data acquisition from smartphones that use the Universal Flash Storage (UFS) memory type.

Author Contributions

C.M.d.S. developed the necessary combinations for the technique; G.D.A.N. conducted the concept and methodology reviews; R.T.d.S.J. proposed experiments and methodology validation; R.d.O.A., G.A.d.O.J. and A.L.S.O. assisted in the development of the methodology; R.d.O.A., G.A.d.O.J. and L.J.G.V. reviewed the techniques applied. All authors have revised the results and the final version of the manuscript.

Funding

Authors of this research received the following funding: R.T.D.S.J. was funded by CAPES (grants 23038.007604/2014-69 FORTE and 88887.144009/2017-00 PROBRAL), CNPq (grants 312180/2019-5 PQ-2, BRICS2017-591 LargEWiN, and 465741/2014-2 INCT in Cybersecurity), FAP-DF (grant 0193.001366/2016 UIoT) and the Administrative Council for Economic Defense (grant CADE 08700.000047/2019-14). R.d.O.A. was funded by FAP-DF (grant 0193.001365/2016 SSDDC). G.D.A.N was funded by the Ministry of the Economy (grant ENAP 083/2016) and the General Attorney of the Union (grant AGU 697.935/2019). The experiments were made in a laboratory that received funding from cooperation projects with the Ministry of the Economy (grants DIPLA 005/2016 and ENAP 083/2016), the Institutional Security Office of the Presidency of the Republic (grant ABIN 002/2017), the Administrative Council for Economic Defense (grant CADE 08700.000047/2019-14) and the General Attorney of the Union (grant AGU 697.935/2019).

Acknowledgments

The authors would like to thank the support of the Brazilian research, development and innovation agencies CAPES (grants 23038.007604/2014-69 FORTE and 88887.144009/2017-00 PROBRAL), CNPq (grants 312180/2019-5 PQ-2, BRICS2017-591 LargEWiN, and 465741/2014-2 INCT in Cybersecurity) and FAP-DF (grants 0193.001366/2016 UIoT and 0193.001365/2016 SSDDC), as well as the cooperation projects with the Ministry of the Economy (grants DIPLA 005/2016 and ENAP 083/2016), the Institutional Security Office of the Presidency of the Republic (grant ABIN 002/2017), the Administrative Council for Economic Defense (grant CADE 08700.000047/2019-14) and the General Attorney of the Union (grant AGU 697.935/2019).

Conflicts of Interest

The authors declare that there are no conflicts of interest.

Abbreviations

Abbreviations used throughout the manuscript:
ARTAndroid Runtime
BGABall Grid Array
CCCommon Criteria
EDLEmergency Download Mode
eMCPEmbedded Multi-Chip Package
eMMCEmbedded Multimedia Card
EXT4Fourth Extended Filesystem
FBEFile-Based Encryption
FDEFull-Disk encryption
FRPFactory Reset Protection
F2FSFlash-Friendly File System
IPEDDigital Evidence Processor and Indexer
ISOInternational Organization for Standardization
ISPIn-System Programming
JATGJoint Test Action Group
LLDA-ISPCFLow-Level Data Acquisition ISPCF
NFCNear Field Communication
NISTNational Institute of Standards and Tecnology
OEMOriginal Equipment Manufacturer
OMAOpen Mobile Alliance
OTAOver-the-air
OSOperating System
SESecure Element
SMDSurface-Mount Device
SoCSystem on a chip
ROMRead-Only Memory
TAPTest Acess Point
TEETrusted Execution Environment
TSKThe Sleuth Kit
UFEDUniversal Forensic Extraction Device
UFSUniversal Flash Storage
USBUniversal Serial Bus

References

  1. Vargas, F.G. 30a Pesquisa Anual do FGVcia da FGV/EAESP. 2019. Available online: https://eaesp.fgv.br/sites/eaesp.fgv.br/files/noticias2019fgvcia_2019.pdf (accessed on 19 January 2020).
  2. StatCounter. Desktop vs. Mobile vs. Tablet Market Share Worldwide. Available online: https://gs.statcounter.com/platform-market-share/desktop-mobile-tablet (accessed on 28 February 2020).
  3. StatCounter. Mobile Vendor Market Share Worldwide. Available online: https://gs.statcounter.com/vendor-market-share/mobile (accessed on 28 February 2020).
  4. StatCounter. Operating System Market Share Worldwide. Available online: https://gs.statcounter.com/os-market-share (accessed on 28 February 2020).
  5. Simão, A.M.d.L.; Sícoli, F.C.; de Melo, L.P.; de Deus, F.E.; de Sousa Júnior, R.T. Acquisition of digital evidence in android smartphones. Int. J. Forensic Comput. Sci. 2011, 28–43. [Google Scholar] [CrossRef][Green Version]
  6. Kingston, C. The Future of Mobile Forensics. Master’s Thesis, Utica College, Utica, NY, USA, 2018. [Google Scholar]
  7. Wu, S.; Xiong, X.; Zhang, Y.; Tang, Y.; Jin, B. A general forensics acquisition for Android smartphones with qualcomm processor. In Proceedings of the 2017 IEEE 17th International Conference on Communication Technology (ICCT), Chengdu, China, 27–30 October 2017; pp. 1984–1988. [Google Scholar]
  8. The New York Times. F.B.I. Finds Links Between Pensacola Gunman and Al Qaeda. Available online: https://www.nytimes.com/2020/05/18/us/politics/justice-department-al-qaeda-florida-naval-base-shooting.html (accessed on 2 June 2020).
  9. Pappas, S. Investigation of JTAG and ISP Techniques for Forensic Procedures. Master’s Thesis, University of Tartu, Tartu, Estonia, 2017. [Google Scholar]
  10. Mota Filho, J.E. Discovering Linux—3rd Edition: Understand the GNU/Linux Operating System; Novatec Editora: São Paulo, Brazil, 2012. [Google Scholar]
  11. Linux Kernel Organization. WHAT IS Flash-Friendly File System (F2FS)? Available online: https://www.iso.org/standard/44381.html (accessed on 20 October 2019).
  12. Linux Kernel Organization. ext4. Available online: https://www.kernel.org/doc/Documentation/filesystems/ext4/ondisk/about.rst (accessed on 20 October 2019).
  13. Venkateswara Rao, V.; Chakravarthy, A. Survey on android forensic tools and methodologies. Int. J. Comput. Appl. 2016, 154, 17–21. [Google Scholar]
  14. Ajijola, A.; Zavarsky, P.; Ruhl, R. A review and comparative evaluation of forensics guidelines of NIST SP 800-101 Rev.1:2014 and ISO/IEC 27037:2012. In Proceedings of the World Congress on Internet Security (WorldCIS-2014), London, UK, 8–10 December 2014; pp. 66–73. [Google Scholar]
  15. Ayers, R.P.; Brothers, S.; Jansen, W. Guidelines on Mobile Device Forensics; Technical Report; NIST: Gaithersburg, MD, USA, 2014. [Google Scholar]
  16. International Organization for Standardization. ISO/IEC 27037:2012 Information Technology—Security Techniques—Guidelines for Identification, Collection, Acquisition and Preservation of Digital Evidence. Available online: https://www.iso.org/standard/44381.html (accessed on 20 October 2019).
  17. Neuner, S.; Schmiedecker, M.; Weippl, E. Effectiveness of File-Based Deduplication in Digital Forensics. Secur. Commun. Netw. 2016, 9, 2876–2885. [Google Scholar] [CrossRef]
  18. Brezinski, D.; Killalea, T. RFC 3227—Guidelines for Evidence Collection and Archiving. Available online: https://tools.ietf.org/html/rfc3227 (accessed on 20 October 2019).
  19. Lopes, P.A. Digital Forensic—Computational Forensic Expertise. Available online: https://periciacomputacional.com/pericia-forense-computacional-2/ (accessed on 20 October 2019).
  20. Yang, S.J.; Choi, J.H.; Kim, K.B.; Chang, T. New acquisition method based on firmware update protocols for Android smartphones. Digital Investig. 2015, 14, S68–S76. [Google Scholar] [CrossRef][Green Version]
  21. Octoplus PRO Box. Available online: https://octoplusbox.com/pt/products/products/ (accessed on 20 October 2019).
  22. UFI-Box. UFI BOX Overview. Available online: https://www.ufi-box.com/pages/ufi-box-features (accessed on 20 October 2019).
  23. EasyJTAG. EasyJTAG Plus Box Hardware. Available online: http://easy-jtag.com/easyjtag-2nd-generation-hw/ (accessed on 20 October 2019).
  24. Afonin, O.; Katalov, V. Mobile Forensics—Advanced Investigative Strategies; Packt Publishing: Birmingham, UK, 2016. [Google Scholar]
  25. Multi-COM. VR-TABLE EMMC, JTAG, FBUS—User Manual—rev 1.0b. Available online: https://teeltechcanada.com/2015/wp-content/uploads/2016/09/VR-Table_user_manual_EN.pdf (accessed on 20 April 2020).
  26. Cellebrite. UFED Ultimate. Available online: https://www.cellebrite.com/pt/ufed-ultimate-4/ (accessed on 22 January 2020).
  27. MSAB Systemation. XRY. Available online: https://www.msab.com/ (accessed on 22 January 2020).
  28. Magnet Forensics Inc. Magnet AXIOM. Available online: https://www.magnetforensics.com/products/magnet-axiom/ (accessed on 22 January 2020).
  29. Morgillo, I.; Viola, S. Learning Embedded Android N Programming; Packt Publishing: Birmingham, UK, 2016. [Google Scholar]
  30. Parry, T.O.; Carter, J.L. Updating Firmware on Mobile Devices. U.S. Patent 9,069,641, 30 June 2015. [Google Scholar]
  31. XDA-Developers. Xdadevelopers. Available online: https://www.xda-developers.com/ (accessed on 22 January 2020).
  32. Almehmadi, T.; Batarfi, O. Impact of Android Phone Rooting on User Data Integrity in Mobile Forensics. In Proceedings of the 2019 2nd International Conference on Computer Applications & Information Security (ICCAIS), Riyadh, Saudi Arabia, 1–3 May 2019; pp. 1–6. [Google Scholar]
  33. Loftus, R.; Baumann, M.; van Galen, R.; de Vries, R. Android 7 File Based Encryption and the Attacks Against It. 2017. Available online: https://delaat.net/rp/2016-2017/p45/report.pdf (accessed on 18 December 2019).
  34. Alendal, G.; Dyrkolbotn, G.O.; Axelsson, S. Forensics acquisition—Analysis and circumvention of samsung secure boot enforced common criteria mode. Digit. Investig. 2018, 24, S60–S67. [Google Scholar] [CrossRef]
  35. Samsung Co. File-Based Encryption (FBE) and Full-Disk Encryption (FDE). Available online: https://support.samsungknox.com/hc/en-us/articles/360039577713-File-based-encryption-FBE-and-full-disk-encryption-FDE- (accessed on 28 February 2020).
  36. Rubinov, K.; Rosculete, L.; Mitra, T.; Roychoudhury, A. Automated partitioning of android applications for trusted execution environments. In Proceedings of the 2016 IEEE/ACM 38th International Conference on Software Engineering (ICSE), Austin, TX, USA, 14–22 May 2016; pp. 923–934. [Google Scholar]
  37. Leignac, P.; Potin, O.; Rigaud, J.B.; Dutertre, J.M.; Pontié, S. Comparison of side-channel leakage on Rich and Trusted Execution Environments. In Proceedings of the Sixth Workshop on Cryptography and Security in Computing Systems, Valencia, Spain, 21 January 2019; pp. 19–22. [Google Scholar]
  38. Hay, R. fastboot oem vuln: Android Bootloader Vulnerabilities in Vendor Customizations. In Proceedings of the 11th USENIX Workshop on Offensive Technologies (WOOT 17), Vancouver, BC, USA, 16–18 August 2017. [Google Scholar]
  39. Khan, A.; Mansuri, Z.H. Comparative study of various digital forensics logical acquisition tools for Android smartphone’s internal memory: A case study of Samsung Galaxy S5 and S6. Int. J. Adv. Res. Comput. Sci. 2018, 9, 357–369. [Google Scholar] [CrossRef][Green Version]
  40. National Institute of Standards and Technology Test Results for Binary Image JTAG, Chip-Off Decoding and Analysis Tool Paraben’s Electronic Evidence Examiner. Available online: https://www.dhs.gov/publication/st-binary-image-jtag-chip-decoding-and-analysis-tool-paraben-s-electronic-evidence (accessed on 28 February 2020).
  41. MJ—Department of Justice Federal Police. CGTI—General Coordination of Information Technology—IPED. Available online: https://servicos.dpf.gov.br/ferramentas/IPED/ (accessed on 28 February 2020).
  42. The Department of Homeland Security. National Institute of Standards and Technology (NIST) Computer Forensic Tool Testing (CFTT) Reports. Available online: https://www.dhs.gov/science-and-technology/nist-cftt-reports (accessed on 3 March 2020).
  43. Li, Z.; Xi, B.; Wu, S. Digital forensics and analysis for Android devices. In Proceedings of the 2016 11th International Conference on Computer Science & Education (ICCSE), Nagoya, Japan, 23–25 August 2016; pp. 496–500. [Google Scholar]
  44. Tian, D.; Hernandez, G.; Choi, J.I.; Frost, V.; Ruales, C.; Traynor, P.; Vijayakumar, H.; Harrison, L.; Rahmati, A.; Grace, M.; et al. Attention spanned: Comprehensive vulnerability analysis of AT commands within the android ecosystem. In Proceedings of the 27th USENIX Conference on Security Symposium, Baltimore, MD, USA, 15–17 August 2018; pp. 273–290. [Google Scholar]
  45. Sathe, S.C.; Dongre, D.N. Data Acquisition Techniques in Mobile Forensics. In Proceedings of the Second International Conference on Inventive Systems and Control, Coimbatore, India, 19–20 January 2018; pp. 280–286. [Google Scholar]
  46. Chanajitt, R.; Viriyasitavat, W.; Choo, K.K.R. Forensic analysis and security assessment of Android m-banking apps. Aust. J. Forensic Sci. 2018, 50, 3–19. [Google Scholar] [CrossRef]
  47. NIST. NIST Tests Forensic Methods for Getting Data From Damaged Mobile Phones. Available online: https://www.nist.gov/news-events/news/2020/01/nist-tests-forensic-methods-getting-data-damaged-mobile-phones (accessed on 28 February 2020).
  48. Soares, A.M.M.; de Sousa, R.T., Jr. A Technique for Extraction and Analysis of Application Heap Objects within Android Runtime (ART). In Proceedings of the International Conference on Information Systems Security and Privacy, Porto, Portugal, 19–21 February 2017; pp. 147–156. [Google Scholar]
  49. Soares, A.M.M.; de Sousa, R.T., Jr. Forensic Analysis of Android Runtime (ART) Application Heap Objects in Emulated and Real Devices. In Information Systems Security and Privacy, ICISSP 2017, Communications in Computer and Information Science; Mori, P., Furnell, S., Camp, O., Eds.; Springer: Cham, Switzerland, 2017; Volume 867, pp. 130–147. [Google Scholar]
  50. Celebrite—Home. Available online: https://www.cellebrite.com/en/home/ (accessed on 22 January 2020).
  51. Cellebrite. Cellebrite Advanced Services Brazil. Available online: https://www.cellebrite.com/en/advanced-services/cas-latam/ (accessed on 22 January 2020).
  52. Cellebrite. Serviços Avançados da Cellebrite. Available online: https://www.cellebrite.com/pt/cas-sales-inquiry-pt/ (accessed on 22 January 2020).
  53. Grayshift. Introducing GrayKey. Available online: https://graykey.grayshift.com/ (accessed on 22 January 2020).
  54. Skulkin, O.; Tindall, D.; Tamma, R. Learning Android Forensics: Analyze Android Devices with the Latest Forensic Tools and Techniques, 2nd ed.; Packt Publishing: Birmingham, UK, 2018. [Google Scholar]
  55. Halabtech Support—Home. Available online: https://support.halabtech.com/ (accessed on 22 January 2020).
  56. Android Open Source Project. Partições e Imagens. Available online: https://source.android.com/devices/bootloader/partitions-images (accessed on 20 January 2020).
  57. Bair, J. Seeking the Truth from Mobile Evidence: Basic Fundamentals, Intermediate and Advanced Overview of Current Mobile Forensic Investigations; Academic Press: Cambridge, MA, USA, 2017. [Google Scholar]
  58. Counterpoint. iPhone XR Was the Top-Selling Model Globally in Q3 2019. Available online: https://www.counterpointresearch.com/iphone-xr-top-selling-model-globally-q3-2019/ (accessed on 2 January 2020).
  59. StatCounter. Mobile & Tablet Android Version Market Share Worldwide. Available online: https://gs.statcounter.com/android-version-market-share/mobile-tablet/worldwide (accessed on 19 January 2020).
  60. Cellebrite. Exclusive Access to Untouched Evidence in Samsung Exynos Devices. Available online: https://www.cellebrite.com/en/productupdates/exclusive-access-to-untouched-evidence-in-samsung-exynos-devices/ (accessed on 22 September 2019).

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.