New Diagnostic Forensic Protocol for Damaged Secure Digital Memory Cards

نویسندگان

چکیده

Over the past twenty years, Secure Digital memory cards have become most popular digital storage media. Therefore, forensic experts need to develop techniques enable recovery of data, especially from severely damaged by accidents, air crashes, terrorist attacks or deliberate attempts criminals destroy evidence. The paper discusses non-invasive and invasive diagnostics available experts, with descriptions necessary equipment, including binocular microscopes, X-Ray scanning acoustic chemical benches, and, for first time, infrared cameras. All these can be used methodically determine best treatment in order repair media extract data them. main contributions include development an innovative systematic protocol on cards, which involves a decision-making diagram. Finally, concrete case study is presented using new decision diagram-based panel diagnose card damage.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Digital Forensic Analysis of SIM Cards

Smart cards are fundamental technology in modern life. It is embedded in numerous devices such as GPS devices, ATM cards, Mobile SIM cards and many others. Mobile devices became the evolution of technology. It becomes smaller, faster and supports large storage capabilities. Digital forensics of mobile devices that maybe found in crime scene is becoming inevitable. The purpose of this research i...

متن کامل

An Asymmetric Cryptography Secure Channel Protocol for Smart Cards

Smart eard seeure ehannel protocols based on publie key eryptography are not widely utilised mainly due to proeessing overheads introdueed in the underlying smart eard microproeessors and the complexities introdueed by the operation of a PKI infrastructure, In this paper we analyse the signifieanee of publie key seeure ehannel protoeols in multi applieation smart eards. We believe that multi ap...

متن کامل

Towards More Secure Biometric Readers for Effective Digital Forensic Investigation

This paper investigates the effect of common network attacks on the performance, and security of several biometric readers. Experiments are conducted using Denial of Service attacks (DoSs) and the ARP cache poisoning attack. The experiments show that the tested biometric readers are vulnerable to DoS attacks, and their recognition performance is significantly affected after launching the attack...

متن کامل

Secure Grouping Protocol Using a Deck of Cards

We consider a problem, which we call secure grouping, of dividing a number of parties into some subsets (groups) in the following manner: Each party has to know the other members of his/her group, while he/she may not know anything about how the remaining parties are divided (except for certain public predetermined constraints, such as the number of parties in each group). In this paper, we con...

متن کامل

Secure Routing Protocol: Affection on MANETs Performance

In mobile ad hoc networks, the absence ofinfrastructure and the consequent absence of authorizationfacilities impede the usual practice of establishing a practicalcriterion to distinguishing nodes as trusted and distrusted.Since all nodes in the MANETs would be used as router inmulti-hop applications, secure routing protocols have vital rulein the security of the network. So evaluating the perf...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Access

سال: 2022

ISSN: ['2169-3536']

DOI: https://doi.org/10.1109/access.2022.3158958