In this article we discuss a method applying reverse engineering of data on a mobile phone, which aims to help the specialist distinguish in which records specific data is expected and how to decode them, remembering the final goal to convert to a more suitable format. The article will also define data reverse engineering and show the tools used in smartphone forensic analysis. Reverse engineering is a procedure or ability to display logical and physical information by extracting data from existing information sources. Reverse engineering is a challenging task. It lets you make applications act exactly the way you need them to. Data reverse engineering (DRE) is a moderately new approach used to address a general classification of data degradation problems. Data reverse engineering combines ways to analyze data with detailed data stewardship practices. The methodology improves the reengineering capability of the framework. “Mobile devices range from simple, inexpensive phones used primarily for phone calls to smartphones that integrate a phone, PDA, camera, music player and more into a single device.” (Guide To Computer Forensics and Investigations - Nelson 2013) The mobile phone can be recognized as a definitive disruptive innovation: in fact, for example, telephony, radio, TV, Internet, mobile phones are radically changing every aspect of daily life , both within organizations and in people's daily lives, providing more provisions and collecting more private information. State-of-the-art smartphones offer advanced features such as email, Internet and recorders. The characteristics of such smartphones, in addition to the appearance of portable devices, give the user the possibility of co... middle of paper...... Ottaviani, “Results of forensic analysis of fast smartphones through miat and forensic farm,” IJESDF, Inderscience, 2008.[2] F. Dellutri, V. Ottaviani and G. Me, “Forensic acquisition for windows mobile pocketpc”, in Proc. of the WSHPCS, HPCS 2008, Nicosia, Cyprus, 3-6 June 2008, pp. 200–205.[3] R. Berte, F. Dellutri, A. Grillo, A. Lentini, G. Me, and V. Ot`taviani, HESDF. Worldscience, 2008, chap. A methodology for acquiring, decoding and analyzing the internal memory of smartphones.[4] A. Distefano and G. Me, “An overall evaluation of the mobile internal acquisition tool,” Digital Investigation, vol. 5, no. Supplement 1, pp. S121–S127, 2008.[5] “Paraben Corporation, (2008) - seizure of devices containing parabens. Forensic Software by Paraben www.paraben.com.”http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5345493http://www.sciencedirect.com/science/article/pii/S1742287610000368
tags