JTAG and Chip-Off Technologies in Computer Forensics
https://doi.org/10.30764/1819-2785-2018-13-3-109-115
Abstract
The article focuses on the issue of damaged handheld device data extraction with the help of JTAG and Chip-Off technologies. Practical experiments were conducted to extract data from an HTC Wildfire S phone using the JTAG interface and from a BQ S-4525 Vienna phone using the Chip-Off technology. Also discussed are the knowledge and skills required for successful application of these methods by practitioners.
About the Authors
A. N. YakovlevRussian Federation
Aleksei N. Yakovlev – Candidate of Law, Associate Professor, Deputy Head of the Digital Forensics Division; Associate Professor of the Law, Intellectual Property and Forensics Department.
Moscow.
A. S. Danilova
Russian Federation
Anna S. Danilova – Student of the Law, Intellectual Property and Forensics Department.
Moscow.
References
1. Ugryumov E.P. Digital circuitry: a textbook for universities. 3rd ed. Saint Petersburg: BHV-Petersburg, 2010. 816 p. (In Russ.)
2. Elder B. Chip-Off and JTAG Analysis. URL: http://www.evidencemagazine.com/index. php?option=com_content&task=view&id=922
3. Voroiskii F.S. Computer science. Encyclopedic reference dictionary: introduction to modern information and telecommunications technologies in terms and facts. Moscow: Fizmatlit, 2006. 768 p. (In Russ.)
Review
For citations:
Yakovlev A.N., Danilova A.S. JTAG and Chip-Off Technologies in Computer Forensics. Theory and Practice of Forensic Science. 2018;13(3):109-115. (In Russ.) https://doi.org/10.30764/1819-2785-2018-13-3-109-115