A Forensic Approach on Data Retrieval from IC/eMMC of Damaged Windows Mobile Phone using Easy JTagPlus Box tool and Magnet Forensic Axiom

Authors

  • Bhushan Ghode  Forensic Professional, Cyber Forensic, Central Forensic Science Laboratory, DFSS, MHA, Govt. of India, Chandigarh, India
  • Akhlesh Kumar  Assistant Director (Physics), Central Forensic Science Laboratory, DFSS, MHA, Govt. Of India, Chandigarh, India
  • Khevna Maniar  Forensic Professional, Central Forensic Science Laboratory, DFSS, MHA, Govt. of India, Chandigarh, India
  • Dr. S. K. Jain  Director-cum –Chief Forensic Scientist, Central Forensic Science Laboratory, DFSS, MHA, Govt. Of India, Chandigarh, India

DOI:

https://doi.org/10.32628/IJSRST218568

Keywords:

Windows Phones, iOS, Android, chip-off, IC/eMMC using the Easy JTag Plus tool and Forensic Magnet Axiom software.

Abstract

The digital world is dominated and ruled by the IOS and Android operating systems on mobile as well as tablet platforms. Together they share a whopping 99% (till 2021) of the share market. The Windows Phones (WP) are occupants of that less than 1% platform that they share with other subsidiary operating systems. Due to the lack of commercial popularity and production of such Windows devices, the process of data extraction and analysis of such devices is unique and challenging for forensic experts. The standard forensic data retrieving software and hardware do not support advanced requisition techniques except the direct extraction. Thus, in cases with locked WP devices, the software/ hardware is unable to support the device’s physical extraction or lock bypass facility. As observed in several digital cases, these portable devices contain details of an individual’s most private life including communications, contacts, browsing history, and location specifics at any given time. Although the operating systems of Microsoft and Windows mobile devices are similar in certain ways, specialized skill sets and tools are required while dealing with location, examination, and interpretation of the digital evidence on these systems. In this research paper, the authors are discussing the reliability and success of data extraction of a Windows mobile device from IC/eMMC using specialized hardware/software with the Windows device.

References

  1. "Digital Forensics for a Windows Phone," Gillware, Online]. Available: https://www.gillware.com/phone-data-recovery-services/windows-phone-forensics/. Accessed 1 September 2021].
  2. "Windows Phone Digital Forensics I," Infosec, Online]. Available: https://resources.infosecinstitute.com/topic/windows-phone-digital-forensics/. Accessed 4 September 2021].
  3. R. Tamma, O. Skulkin, H. Mahalik and S. Bommisetty, Practical Mobile Forensics, Third Edition ed., Birmingham: Packt Publishing, 2018.
  4. C. Murphy, A. Leong, M. Gaffney, S. G. Punja, J. Gibb and B. McGarry, "Windows Phone 8 Forensic Artifacts," Sans, Giac Certifications, White Paper, 2021.
  5. B. Elder, "Chip-Off and JTAG Analysis," 2008. Online]. Available: https://www.evidencemagazine.com/index.php?option=com_content&task=view&id=922. Accessed 05 September 2021].
  6. "Recover & Analyze Your Evidence in One Case," Magnet Axiom, Online]. Available: https://www.magnetforensics.com/products/magnet-axiom/. Accessed 31 August 2021].
  7. G. M. Zamroni and I. Riadi, "Mobile Forensic Tools Validation and Evaluation for Instant Messaging," International Journal on Advanced Science Engineering and Information Technology, vol. 10, no. 5, pp. 1860-1866, October 2020.
  8. A. Kumar, B. Ghode and K. Maniar, "Data Extraction from Password Protection Mobile Phone by using Chip-off Method- A Forensic Case Study," International Journal of Engineering Sciences & Reseach Technology, vol. 10, no. 3, pp. 28-37, March 2021.
  9. I. Mikhaylov and O. Skulkin, "Chip-Off Technique in Mobile Forensics," Digital Forensics Corp, 2016. Online]. Available: https://www.digitalforensics.com/blog/chip-off-technique-in-mobile-forensics#content-anchor. Accessed 05 September 2021].
  10. J. Farley, "Basic Overview of JTAG, ISP and Chip Off Extractions," Farley Forensics Digital Forensics Research & Development, 10 April 2019. Online]. Available: https://farleyforensics.com/2019/04/10/basic-overview-of-jtag-isp-chipoff-extractions/. Accessed 03 September 2021].
  11. M. Tj, "Reballing- What it is and How to do it?," Deskdecode, 10 September 2016. Online]. Available: https://www.deskdecode.com/reballing/. Accessed 29 August 2021].

Downloads

Published

2021-10-30

Issue

Section

Research Articles

How to Cite

[1]
Bhushan Ghode, Akhlesh Kumar, Khevna Maniar, Dr. S. K. Jain "A Forensic Approach on Data Retrieval from IC/eMMC of Damaged Windows Mobile Phone using Easy JTagPlus Box tool and Magnet Forensic Axiom" International Journal of Scientific Research in Science and Technology(IJSRST), Online ISSN : 2395-602X, Print ISSN : 2395-6011,Volume 8, Issue 5, pp.499-508, September-October-2021. Available at doi : https://doi.org/10.32628/IJSRST218568