Forensic Methodology for Android Data Recovery
Forensic Methodology for Android Data Recovery
sciences
Article
Methodology for Forensics Data Reconstruction on
Mobile Devices with Android Operating System
Applying In-System Programming and
Combination Firmware
Claudinei Morin da Silveira 1,† , Rafael T. de Sousa Jr. 1,† ,
Robson de Oliveira Albuquerque 1,2,† , Georges D. Amvame Nze 1,† ,
Gildásio Antonio de Oliveira Júnior 1,† and Ana Lucila Sandoval Orozco 1,2,†
and Luis Javier García Villalba 2, *,†
1 Cyber Security INCT Unit 6, Laboratory for Decision-Making Technologies (LATITUDE),
Department of Electrical Engineering (ENE), Technology College, University of Brasilia (UnB),
Brasilia-DF 70910-900, Brazil; claudineimorin@[Link] (C.M.d.S.); desousa@[Link] (R.T.d.S.J.);
robson@[Link] (R.d.O.A.); georges@[Link] (G.D.A.N.); jrgildasio@[Link] (G.A.d.O.J.);
asandoval@[Link] (A.L.S.O.)
2 Group of Analysis, Security and Systems (GASS), Department of Software Engineering and Artificial
Intelligence (DISIA), Faculty of Computer Science and Engineering, Office 431, Universidad Complutense
de Madrid (UCM), Calle Profesor José García Santesmases, 9, Ciudad Universitaria, 28040 Madrid, Spain
* Correspondence: javiergv@[Link]
† These authors contributed equally to this work.
Received: 16 May 2020; Accepted: 12 June 2020; Published: 20 June 2020
Abstract: This paper proposes a new forensic analysis methodology that combines processes,
techniques, and tools for physical and logical data acquisition from mobile devices. The proposed
methodology allows an overview of the use of the In-System Programming (ISP) technique with the
usage of Combination Firmware, aligned with specific collection and analysis processes. The carried
out experiments show that the proposed methodology is convenient and practical and provides
new possibilities for data acquisition on devices that run the Android Operating System with
advanced protection mechanisms. The methodology is also feasible in devices compatible with
the usage of Joint Test Action Group (JTAG) techniques and which use Embedded Multimedia Card
(eMMC) or Embedded Multi-Chip Package (eMCP) as main memory. The techniques included in
the methodology are effective on encrypted devices, in which the JTAG and Chip-Off techniques
prove to be ineffective, especially on those that have an unauthorized access protection mechanism
enabled, such as lock screen password, blocked bootloader, and Factory Reset Protection (FRP) active.
Studies also demonstrate that data preservation and integrity are maintained, which is critical to a
digital forensic process.
1. Introduction
In recent years, our society has experienced an accelerated process of computerization,
thus becoming highly interconnected. In May 2019, in Brazil alone, public records pointed to over
230 million smartphones in use. If we add up laptops and tablets to that number, there were then
324 million portable devices, i.e., approximately 1.6 portable devices per inhabitant [1].
With the evolution of mobile devices, a large part of the population has been replacing the
computer by the smartphone to perform most tasks involving technology, for example, exchanging
messages, sending e-mails, making online payments, etc. According to the StatCounter (Web traffic
analysis website) [2], smartphones account for 51.69% of computing devices (smartphones, tablets,
and computers) in use worldwide.
Mobile devices are used for a variety of tasks, such as sending or receiving text or voice messages,
images, chatting by voice or video calls, watching videos, sending or receiving e-mail, making bank
transactions, capturing and manipulating images, using applications for health care, relationships,
social networks, monitoring of physical activities, mobility and traffic and even to store and display
digital documents. In Brazil, we can mention as an example some government services applications
of interest to the citizen, such as the Voter Card, the Vehicle Registration and Licensing Certificate,
and the National Driver’s License.
With technological advances, it has become common for mobile devices to receive constant
hardware and software improvements. With each new device launched, a new System on Chip (SoC) is
employed, which is more modern, faster, and more energy-efficient, in addition to expanding storage
capacity. New mechanisms to protect against unauthorized access are also frequently implemented
or improved.
Numerous manufacturers already produced cell phones and marketed them globally before the
appearance of the Android operating system (OS). After that, they started to invest in hardware
development so that their devices started to run the new OS. New manufacturers have also emerged,
focusing on the global market or the Asian market, whose consumer public has quite significant
numbers. South Korean Samsung is the manufacturer that holds the largest share of the global mobile
device market [3] and runs the Android OS, making it the most widely used OS worldwide [4].
Even before the Android OS became the most used OS, this system has been considered an important
source of information. As remarked by Simão et al. [5], Android OS constitute a large repository of
information in a forensic perspective, both on-site as well as provided remotely.
Modern mobile devices are a rich source of data that can be forensic evidence in investigation
processes and security analysis. Such devices increasingly have more storage space, connectivity options,
and multitask ability, making them the first option for countless users. Currently, devices that run the
Android OS and its variations are more accessible in the global market. That turns them into natural
candidates in forensic analysis and investigation processes.
When it comes to security and digital forensics, analysts strive to acquire and analyze data from
mobile devices. The diversity of technology used on mobile devices, the accumulation of digital
evidence, the lack of standardized extraction methodologies, and the lack of necessary training
characterize challenges that hinder or prevent data acquisition [6].
Companies that develop technologies for digital forensics are also affected by the diversity of
components and manufacturers of mobile devices, as they cannot be effective and efficient in all models
or in all manufacturers. The gaps left by such companies are also a barrier to law enforcement forces.
Files stored in digital format are considered digital evidence, including audio, video, and image
files, and even the software or the hardware itself. It is noteworthy that such files and devices can be
part of the investigation of most crimes in the digital environment. Therefore, they must be adequately
investigated and protected against alteration, maintaining protection under the chain of custody.
The Mobile Device Forensics is characterized by difficulties in accessing device data, the effort to
unlock or bypass security mechanisms and obtain data, and often, by the inability to obtain the entire
volume of data contained in the device. One is also feature by the fact that it is more complex than
traditional computer forensics, requiring better-trained teams and specialized equipment to obtain
legally acceptable results.
Unlike traditional Forensic Computing, where any intervention in the system must be avoided
at all costs, in forensics on mobile devices it is necessary to perform access and make interventions
directly on the hardware for possible attempts to bypass the access block mechanisms, and also install
Appl. Sci. 2020, 10, 4231 3 of 29
elevation of privilege applications. However, the correct use of techniques allows to preserve the
evidence, and consequently, the legitimacy of the obtained evidence.
Figure 1 represents, in a summarized way, the steps of a methodology that can be applied to
mobile forensics.
With regard to mobile device forensics, the scenario for obtaining evidence may also be different.
We will briefly address each of the steps of the methodology, always aiming at obtaining the legality of
the actions.
1. Evidence identification: As it is a mobile device, its identification may be more difficult, as the
offender tries to hand over another device in place of the one who actually has the evidence.
Therefore, it is essential to determine which fact needs to be clarified and which devices should
be analyzed. It is important to record all details of the location and the seized items.
2. Preservation of evidence: The device to be analyzed must always be handled with gloves so that
the fingerprints of the device user are preserved. Although it is not part of the acquisition and
analysis of digital evidence, such evidence may be relevant to other forensic sciences. The device
should be kept, whenever possible, in the state in which it was seized. If it is seized turned-off,
it must remain off. Otherwise, it is also important to put the device in airplane mode, to prevent
it from receiving new calls, SMS, creating new itinerary records by GPS, avoiding false positives
during the analysis process, or even, that the data may be erased remotely. If this is not possible,
a faraday bag must be used to transport the device to the laboratory where the data will be
acquired. All features of the device must be documented.
3. Chain of custody: Chain of custody, in the legal context, refers to the chronological or historical
register that records the sequence of custody, control, transfer, analysis, and disposition of
evidence, whether physical or electronic, and is of fundamental importance in criminal cases.
4. Method for acquiring evidence: The forensic analyst should evaluate the best tool or methodology for
data acquisition, preferably using the least invasive methods, and it may be used these according
to the need.
5. Investigating questions: The authority responsible for elucidating the case must formulate the
questions for which the forensic analyst must search the evidence for answers that satisfy the
authority’s questions.
6. Analysis process: These are the processes, tools or methodologies through which the acquired
evidence will be analyzed to answer the investigative questions.
7. Conclusive report: It is the document that includes all the records made in the previous steps,
and mainly, answers the investigative questions asked by the competent authority.
It has become common to find public reports showing that the use of smartphones in the
practice of illegal acts is growing. Increasingly, these devices are used to practice criminal activities,
becoming digital evidence, relevant for criminal investigations. Due to a more significant market share,
Appl. Sci. 2020, 10, 4231 4 of 29
the acquisition and forensic analysis of data from Android devices have gained significant importance
in the field of digital forensic investigation [7].
One of the most recent examples of crucial evidence found on mobile devices can be seen in the case
of the sniper Mohammed Saeed Al Shamrani, who on 6 December 2019, killed three American sailors at
a military base in Florida. Authorities discovered contacts between Mohammed Saeed Alshamrani and
Al Qaeda agents after being able to access the contents of the sniper’s mobile devices [8].
In this work, a methodology was developed and named by the authors as Low-Level Data
Acquisition ISPCF (LLDA-ISPCF). This methodology combines the use of In-System Programming
(ISP) and Combination Firmware to bypass the lock screen, followed by specific procedures and
through the use of proper tools for forensic analysis in both hardware and software.
As a way to validate the methodology, the device data was acquired by using the Universal Forensic
Extraction Device (UFED) Touch 2, preserving the integrity of the data, and, finally, the acquired data
were analyzed in the UFED Physical Analyzer. It is worth mentioning that the methodology developed
is not limited to the tools used. That means that other tools, in the market, can perform tasks in the
forensic analysis process for mobile devices forensics.
Regarding the limitation of the methodology, it is considered that—to the best of the authors’
knowledge and until the elaboration of this work—devices that use Universal Flash Storage (UFS) main
memory or that have hardware-supported encryption are not compatible with the tools employed in
the proposed methodology. That future updates to the firmware by the manufacturers may make the
methodology unfeasible. Also considered is the fact that Special Firmware, such as the Combination
Firmware used on Samsung devices may not be available for a specific model or manufacturer, and its
use combined with ISP requires a specific study of the device from which the data will be acquired to
bypass the lock screen mechanism.
1.2. Motivation
The main motivation of this work is to develop a novel technique that is able to help law
enforcement agencies (LEA) to conduct forensics in mobile devices that have security protections
enabled, since these protections prevent LEA to properly collect evidence and analyze them in case
of crimes.
It is important to remember that criminals all over the world use communication devices such
as mobile phones with security measures applied to them. Such mechanisms make it very hard to
forensics specialists to bypass them and acquire evidence that helps in the solution of criminal cases.
its phases. In Section 4 we present a proof of concept and results of the proposed methodology.
We conclude this work in Section 5 with some considerations about future work.
1. Physical Acquisition: Physical acquisition on mobile devices consists of copying information from
the device by direct access to the internal storage memory. The process creates a copy of the
entire file system bit by bit. Such an approach is similar to that adopted in computer forensic
investigations. A physical acquisition can acquire all data present on a storage device, including
deleted data that has not yet been overwritten, in addition to copying unallocated space [9].
It is considered to be the most effective in forensic terms and is performed using specific tools.
According to Mota Filho [10], the least amount of information that an OS can read in a filesystem
is a block that, at the physical disk level, is equivalent to a cluster. Copies and readings are made
block by block at the filesystem level. The File Systems widely used by Android devices were
Flash-Friendly File System (F2FS) [11], and currently, Fourth Extended Filesystem (EXT4) [12].
Both file systems adopt 4KB-sized logical blocks. Still, according to Mota Filho [10], there are
software such as dd and dc3dd that can read a physical sector, which has 512 bytes by default and
is the smallest unit of information that can be read on an HD or pen drive by its controller.
2. File System Acquisition: The file system acquisition is technically seen as a type of logical acquisition [9].
However, it is more abundant in data, as the entire file system of the device is copied. It contains
files and directories that the device uses to populate applications, system settings, and user
settings, along with user storage areas. It also includes files not directly accessible to the user
through the device interface, which requires specialized tools to access such artifacts. However,
unlike physical acquisition, this type of acquisition does not copy the unallocated space of
physical memory.
3. Logical Acquisition: Logical acquisition is a copy of logical storage objects, such as file systems,
directories, and files. Data is copied from the allocated space on disk, still accessible to the user
in the file system. Such data includes the phone book, calls, messages, some application data,
and other data that can be expected from a software backup with iTunes or Android itself, that is,
what we can see if we manually examine the device [13]. It is observed as the fastest and least
invasive, but it is the most limited of acquisitions.
Figure 2 compares, in a summarized way, the different data that can be acquired by the types of
acquisitions presented.
Considering the standards mentioned, none of them deals with all processes of digital forensic
investigations. There are forensic guidelines common to the two standards, and others that only one
of the standards contemplates, exposing their limitations that affect more current issues of forensic
processes. According to Neumer e Weippl [17], another guideline that can be applied together is the
RFC 3227 (Guidelines for Evidence Collection and Archiving) [18], which also provides guidelines
for proper digital forensics practices. Figure 3 shows the typical life cycle or the main stages of
digital forensics.
The use of the ISP technique allows another analyst to reproduce or repeat all steps of the process
for data acquisition since the device remains functional and with all the components on the board.
However, even when the Chip-Off technique is applied is possible to return the component to its original
location and made to device run again, doing the component soldering process, known as reballing.
It is also possible to make use of an interface called VR-TABLE, which has articulated arms,
equipped with high-precision metal probes, which dispense the welding of the conductors on the mobile
device board, eliminating the possibility of damage caused by overheating. Figure 5 demonstrates the
use of a VR-Table.
The software of the Box is capable of performing reading/writing operations directly on the
eMMC. After soldering all the necessary conductors, the Box is connected to the computer using a
USB cable. After completing this step, it is necessary to select the correct software to be used and
Appl. Sci. 2020, 10, 4231 8 of 29
to configure the necessary parameters. When everything is connected and the software with the
parameters correctly configured, the Box can then access or manipulate the content of the memory.
Running the ISP, it is possible to manipulate the data using 1 or 4-bit bandwidths. The most
common is the use of the value “1 bit” because it is less susceptible to errors during copying and
because it reduces the exposure of the board to heat since for execution with “4-bit” bandwidth, it is
necessary to weld 3 more conductors.
In Table 1, TAPs that must be connected for the execution of the ISP are described.
ISP Pinout
TAP Function
CMD Command in/Response out
DAT0 Data input/output
CLK Clock
VCC Supply voltage for Core (2.8/3.3 V)
VCCQ Supply voltage for I/O (1.8/3.3 V)
GND Ground
In Figure 6, the TAPs on the card of a Samsung mobile device model GT-N8000 are identified.
In this example, DAT1, DAT2, and DAT3, which make it possible to run an ISP with a 4-bit bandwidth,
are also identified. The transfer rate can vary from 1.2 to 1.8 Kbps, according to the selected frequency.
If the bandwidth is 4 bit, the transfer rate is multiplied by 4.
It is also possible to create a binary image of the device memory using the software of the Box.
This image can be analyzed by forensic tools such as UFED [26], XRY [27] or AXIOM [28].
The process of preparing the mobile device for the execution of the ISP also enables physical
acquisition in devices equipped with SoCs, produced by Qualcomm. Using its Emergency Download
Mode (EDL), a method proposed by Wu et al. [7], it is necessary to weld a conductor in the TAP CMD
of the device for a physical acquisition using EDL. On devices from some manufacturers, such as
XIAOMI, there is also the possibility to log into EDL mode logically by typing a code on the dial pad.
For XIAOMI devices the code is *#*#717717#*#*.
testing and the execution of basic device applications and functionality. It is possible to obtain the
Special Firmware for devices from various manufacturers, however, they are found with different
nomenclatures. For Xiaomi devices, they are known as ENG Firmware or Engineering Rom and for
Samsung devices, although they have the same functionality, this firmware is known Combination
Firmware. It is important to clearness that the most common use of these Firmwares is the maintenance
of mobile devices.
According to Morgillo and Viola [29], Read-Only Memory (ROM) is a type of memory generally
used in embedded systems to safely store all files that are part of the system core. The firmware
that runs the Android operating system on mobile devices is stored in an area of memory whose
permission is “Read Only”; that is why this firmware is popularly known as ROM. There is an effort
by manufacturers to ensure the highest integrity of the system as possible, assuring that the primary
system is fault-tolerant and remains intact during the device re-initialization. However, using specific
tools, it is possible to manipulate this internal memory area and install its custom firmware.
It is considered that such customization is possible because Android is one of the most popular
open-source projects and because, in general, the custom ROMs, which correct specific errors for specific
scenarios, are optimized versions of the original system. In the latter case, they overwrite all areas of
the internal memory when replacing the original firmware.
According to Parry and Carter [30], the mobile devices firmware update can be performed over
a wireless connection known as Over-the-air (OTA). Open Mobile Alliance (OMA) has developed
firmware update techniques that may require tens, hundreds, or even thousands of files, and some
solutions bundle all the necessary update files into a single file to be downloaded directly to the mobile
device. The replacement of the original firmware with another, developed by third parties, requires a
specific tool and is done through a computer.
For installing a Combination Firmware, it is necessary to use specific software that rewrites the
firmware. Once the original firmware is replaced with the Combination Firmware, it is possible to
check all the hardware resources such as rear camera, front camera, sensors, RAM, ROM, and also run
a test that shows the diagnosis results.
Engineers and technicians widely use Special Firmwares and, although there is no official
documentation on them, there are many topics in specialized forums, such as XDA Developers [31],
about their use. The files can be downloaded from websites specialized in tools for mobile devices
maintenance.
From a forensic point of view, other interesting features can be explored through a Combination
Firmware. It allows bypassing and removing factory reset protection or Google account verification.
However, the main point of interest is to allow full access to the device content since replacing the
original firmware with Combination Firmware does not change the data partition. This preserves data
Appl. Sci. 2020, 10, 4231 10 of 29
integrity and allows physical acquisitions, file system acquisitions, and logical acquisitions to be made
using forensic tools. It is also possible to enable the root user if necessary. According to Almehmadi
and Batarfi [32]—who investigated the impact on user data integrity by enabling the root user on an
Android smartphone—, modifications to the device data do not affect the user data Such a process is,
therefore, legally valid and evidence extracted from Android devices, as a result of the rooting process,
is robust and reliable for sentencing in criminal cases.
It is noteworthy that a Combination Firmware is not intended for the end-user, but specialized
tasks according to the need. Using such techniques without adequate knowledge can invalidate the use
of a device in a criminal investigation process, eliminating substantial evidence for crime investigation.
It is also necessary to note that the Combination Firmware always runs the same Android version as
the original firmware.
When there is no Special Firmaware for the target device, it is possible to download the image
file of the boot, recovery, and system partitions, also developed for repair mobile devices, and making
adaptations so that they are similar to those found in the Special Firmware. However, this requires
individual analysis for each device. This procedure will not be described in this article.
The keys are derived from the information stored in the TEE, as well as the user credentials (PIN,
password, etc.) used to unlock the phone. If file-based encryption is used, the phone can initialize and
access data stored in the device’s specific encrypted area, protected with hardware keys. Most of the
information, however, is stored in the encrypted area with various credentials. This area is protected
with keys based on the user’s credentials.
Thus, an acquisition made through the software of a Box, either by ISP or by Chip-Off, will not
bring satisfactory results, as the device is turned off and, consequently, encrypted.
2.5. Bootloader
To Hay [38], there is a chain of boot loaders that originate from the Original Equipment
Manufacturer (OEM) or the SoC manufacturer. The primary boot loader (PBL), written by the chipset
manufacturer, triggers the Bootloader (ABOOT). There is still the TrustZone, which provides security
mechanisms such as Secure Boot.
Android devices come with the bootloader blocked to ensure the integrity of the OS. To unlock the
bootloader—which allows the installation of an alternative bootloader and custom firmware—some
devices require an authorization code from the manufacturer. On some devices, the factory reset
occurs. That is, the user data will be lost, which is not interesting from a forensic point of view.
application on Android devices with EXT4 file system. Of the devices submitted to data extraction,
the most recent version of Android was 4.4.X, with kernel 3.4.39.
Wu et al. [7] proposed a forensic acquisition for Android smartphones with Qualcomm processors
in an approach using special modes. They addressed the special modes 9008 and 9006 of the Qualcomm
processor to extract the data partition. This mode is also known as Emergency Download Mode (EDL).
Acquiring the data image using Qualcomm 9008 Mode, there is no need to unlock the boot loader;
start the device in fastboot mode and set the phone to Qualcomm 9008 mode. Mode 9006 is applied
to cause intentional damage to the boot partition, after which a computer can read the device’s data
partition. In the experiments, data integrity and the possibility of executing the proposed methods
were also proven. However, the experiment was done on devices with Android OS Version 5.1.1,
and the proposed approach reaches only devices using Qualcomm SoCs.
Alendal et al. [34] exploited the Common Criteria (CC), which is a feature that increases the
security level of Samsung devices and therefore makes it difficult for forensic acquisition for law
enforcement. Due to the impossibility of gaining access to the project’s specifications, documentation,
and source code, the authors reverse-engineered the implementation of CC mode, as Samsung’s
secure boot manager protects it. They presented how this security mode is applied, its vulnerabilities,
and how they can be used to bypass CC mode by increasing the attack surface for later forensic
acquisition. However, the work is limited to devices manufactured by Samsung.
Dave et al. [44] recovered 3500 AT commands from more than 2000 Android smartphone firmware
images from eleven suppliers. The commands were tested on eight Android devices from four different
suppliers via the USB interface. The authors identified the possibility to rewrite the device’s firmware,
bypass Android’s security mechanisms, obtain sensitive device information, perform screen unlocks,
and inject touch events using AT commands only. There are still other features that can be exploited by
the AT command, which features an attack surface on Android devices. AT commands were written in
the early 1980s, whose purpose was to control modems, but they can still be used on most Android OS
smartphones. The technique proved to be effective only on Samsung devices up to the Galaxy S7 Edge
model with Android OS up to version 7.0. Tested on a Galaxy S8 Plus model, the technique proved
ineffective, as well as on Google Nexus 6P and Google Pixel models.
comparing it to ISP and JTAG, with which there is a risk of damaging the device. The main focus of the
study was to provide an overview of the acquisition of JTAG and ISP, and present some information
about these techniques and to show that the UEFD Physical Analyzer can read the extraction product.
In the study [9], the device used for data acquisition in the experiment was a rooted Samsung
GT-I9505 (Galaxy S4) with Android OS Version 5.0.1, with encrypted main memory, and a Nokia
Lumia 635, with Windows Phone 8.1.
Sathe and Dongre [45] conducted a comparative study of requirements, capabilities, and limitations
of forensic techniques for the logical and physical acquisition of data from mobile devices, using a
Samsung Galaxy Grand Duos GT-I9082 device to perform the comparative tests. The following suites
and forensic tools were analyzed: UFED, MOBILedit, Oxygen Forensics and XRY, ADB Pull, Backup
Analysis, AFLogical, Wondershare Dr. Fone for Android, JTAG, and Chip-Off. Although they address
the use of JTAG and Chip-Off, the analyzed device was launched with Android OS Version 4.1.2 and
was updated until version 4.2.2, both did not provide, by default, the main memory encryption.
Chanajitt et al. [46] analyzed seven m-banking apps for Android in Thailand and described the
forensic artifacts that can be recovered, as well as the results of the applications’ assessment concerning
security. They describe JTAG as a physically invasive data acquisition method, but that allows access
to data without the need for USB debugging enabled, or without the enabled root user (without root)
and still circumvent password lock, bypassing the OS security mechanism. In the experiment, a rooted
Samsung GT-I9500 (Galaxy S4) and a non-rooted Samsung GT-I9190 (Galaxy S4 Mini) were used,
both with Android OS in Version 4.4.2 with unencrypted main memory.
On 28 January 2020, NIST released the results of tests performed using JTAG and Chip-Off to
acquire data from damaged mobile devices [47]. The objective was to test the validity of the methods;
to see if they produce accurate results with reliability. After data acquisition, the following forensic
suites were used for analysis: AXIOM, EnCase Forensic, X-Ways, XRY, UFED, Paraben, and Final
Mobile Forensics, being identified locations, texts, photos, social media data, and others. The extracted
data was compared to the one loaded initially on each phone, proving that JTAG and chip-off extracted
the data without modifying it and that some of the tools used are more efficient for analyzing the data
than others, particularly for social media application data. The devices analyzed were from different
manufacturers, and the latest version of the Android OS was 5.1. The results are published in a series
of free online reports [40].
mechanisms that automatically prevent other changes that could allow access to data, in addition to
other security mechanisms.
The implementation and improvement of such mechanisms prevents or hinders the work of state
law enforcement agencies. The judicial and scientific police find it challenging to acquire data from
mobile devices that may constitute evidence, given that current forensic suites, both proprietary and
open-source, fail to bypass the lock screen mechanisms of some models of mobile devices.
If the device does not have a lock screen mechanism, other tools or even steps of the proposed
methodology. However, this hypothesis will not be detailed in this work since it does not address the
situation of the enabled security mechanism.
3.3.3. Phase 3: Verification of Compatibility with the Application of the JTAG Technique
At this stage, it is necessary to check if the device has the TAPs for the execution of the JTAG.
This verification can be carried out visually. If the forensic analyst does not know how to locate the
standard JTAG TAPs, he can consult the Box software to check the diagram of the TAPs of the device in
question. It should be noted that the most recent devices do not include JTAG TAPs. If the device to be
analyzed has a TAP, the JATG technique can be used, according to the works developed by Pappas [9],
Appl. Sci. 2020, 10, 4231 17 of 29
Sathe, and Dongre [45], in addition to the tests carried out by NIST [47], whose devices were equipped
with TAPs for JTAG.
partitions. Such partitions will have their original content replaced by the files contained in the
Combination Firmware previously obtained. It is advisable to make a backup of the partitions that
will be overwritten before performing the operation. It is also possible to extract the contents of the
file with MD5 extension and generate a new compressed file with the same name as the complete file,
overwriting it. Doing so will be easier to use the software for writing the firmware.
For the writing operation, both the Box Octoplus Pro and the Odin tools can be used. The necessary
procedures for the Combination Firmware writing using the Box can be obtained in Seeking the Truth
from Mobile Evidence [57].
After replacing the partitions mentioned above, the device will boot normally, without asking for
the password or the mechanism imposed by the user.
The device on which the LLDA-ISPCF methodology was applied uses file-based encryption.
When the device is initialized, the system accesses the data stored in its special encrypted area,
protected with hardware keys. All data on the data partition is inaccessible until the user provides
authentication credentials, as this area is protected with keys based on the user’s credentials. The user
password is one of the cryptographic keys, and when it ceases to exist, only the system password,
defined in the source code by the developers, remains. As there is only the default system key, no key
exchange takes place, and the partition is automatically decrypted. The process is transparent, and as
soon as the initialization process is completed, the system displays the home screen.
After of initialization, the device displays a screen with essential functions, being possible to view
photos, explore files, record images, among other basic operations.
From that point on, the device is ready for data acquisition, being possible to activate the USB
Debugging Mode, activate the option Stay Active, and also, if necessary for the acquisition, root the
device. It is important to note that the firmware now installed runs the same Android version as the
original firmware. Therefore, the acquisition methods must be compatible with the OS version if such
a device is not rooted. The choice of the forensic acquisition tool is at the discretion of the specialist
who will perform the procedure.
The first was the scope of the device and the global sales volume. According to (the market
analysis and business consulting company Counterpoint)[58], Samsung Galaxy A10 (A105M) was
the best-selling Android smartphone in the world in the third quarter of 2019, and placed second in
overall sales volume, just behind the iPhone XR.
The second criterion was the Android version on the device because the more recent the
smartphone, the more layers of security are implemented, and the more secure the system tends
to be. In this case, the SM-A105 model runs Android version 9.0 (Pie), which runs on most Android
devices (41.9%) [59].
The third criterion was the difficulty in carrying out the welds on the board, considering that the
device has tiny components. Therefore, without using a VR-Table for the realization of an ISP, it is still
possible to weld the conductors on the TAPs.
The fourth criterion is the fact that the SM-A105 data has device encryption enabled automatically
(Direct Boot).
Each phase of the methodology proposed in this work to analyze the device in question will be
detailed below.
4.2.3. Phase 3: Verification of Compatibility with the Application of the JTAG Technique
At this stage, we checked if standard TAPs were present on the device board before applying the
JTAG. The execution of this phase was a mere protocol, as the device was launched in 2019 and did not
have TAPs for a JTAG execution (present only in older devices).
Once the necessary conductors were soldered, the TAPs were connected to the corresponding
points on the ISP connector, and then, connected to the Box. The JTAG Classic Suite utility was started.
Figure 13 shows part of the JTAG Classic Suite utility screen, showing the primary memory partition of
the device and the values of each parameter to manipulate the Persist partition. Such values may vary
depending on the device and the eMMC manufacturer. The values referring to the parameters were
obtained in Seeking the Truth from Mobile Evidence [57].
We then recorded an FRP in the smartphone as to manipulate its Persist partition. After setting
the correct parameters, the Persist partition was overwritten. Nevertheless, it is safe to mention that
the partition with the user’s data was not invaded, and therefore the data remained intact.
Next, the Box Octoplus Pro and Octoplus Box Samsung Software were used for replacing the partitions
specified in Figure 14. Figure 15 shows the Octoplus Box Samsung Software tool home screen. All settings
were obtained in Seeking the Truth from Mobile Evidence [57].
After replacing the boot, recovery, and system partitions, the device restarted without asking for the
lock screen password, allowing the viewing of media files, installed applications, and all content (files)
present on the device. It should be noted that the firmware newly installed, runs the same Android
version that runs on the original firmware, in this case, version 9.
file system acquisition and the logical acquisition without rooting the device. Figure 16 shows part
of the UFED Touch 2 screen. Highlighted, is the method that allows the physical acquisition of the
SM-A105M/DS, enabling the root user.
Using version [Link] of the UFED Touch 2 software and selecting a generic profile, was possible
to perform the physical acquisition without the need to enable the root user, in addition to the File
System and Logic acquisitions. It is worth remembering that UFED Touch 2 was unable to bypass the
lock screen in the experiments carried out before the methodology proposed in this work, although
the tool promises to do so. Figure 17 shows a part of the UFED Touch 2 screen and, highlighted,
the aforementioned functionality, allowing the physical acquisition of the SM-A105M/DS.
• Capability 1 (C1): Data acquisition from devices that have an enabled lock screen mechanism;
• Capability 2 (C2): Data acquisition from devices with FDE disk encryption;
• Capability 3 (C3): Data acquisition from devices with FBE disk encryption;
• Capability 4 (C4): Data acquisition from devices with OS up to Version 9;
• Capability 5 (C5): Data acquisition from devices with eMMC and eMCP memory types;
• Capability 6 (C6): Data acquisition regardless of SoC manufacturer;
• Capability 7 (C7): Data acquisition from devices with F2FS and EXT4 file systems;
• Capability 8 (C8):Data acquisition from physical devices.
Table 3 shows the comparison between the results achieved using the proposed methodology and
the results obtained by the tools and methodologies presented in the related works. Concerning the
data acquisition from mobile devices, the capabilities were synthesized to ease the visualization of
what is common to each referenced work.
By analyzing the related works, it appears that there is a great effort to improve tools, techniques,
and methodologies in favor of data acquisition for forensic analysis. This effort is due to the highest
difficulty to overcome or circumvent the security mechanisms that protect the devices data against
unauthorized access. It is observed that such mechanisms also hamper law enforcement, as specialists
encounter the barriers mentioned above, even when some legal devices and mechanisms support
allow the analyst to access such data.
Table 3. Capabilities of both the proposed methodology and the related works.
Proposed
[20] [7] [34] [44] [43] [9] [45] [46] [47] [48] [49]
Methodology
C1 X X X X X - - X - X - -
C2 X - - X X - X - - - - -
C3 X - - X X - - - - - - -
C4 X - - - - - - - - - - -
C5 X - X X X X X X X X X X
C6 X X - - - X X X X X X X
C7 X X X X X - X X X X X X
C8 X X X X X X X X X X - X
Appl. Sci. 2020, 10, 4231 25 of 29
Among the mechanisms available on all smartphones running the Android OS, the lock screen,
when activated, prevents access to the devices data and functionalities. It also prevents communication
via the USB port, as the USB debugging mode is disabled by default. Although the forensic tools on
the market promise to remove or bypass the lock screen on the overwhelming majority of smartphone
models running the Android OS, this does not work in practice. In a wide range of models, the use
of tools from various manufacturers, such as UFED, XRY, AXIOM, among others, is ineffective in
extracting data when the lock screen is activated.
An example is the model SM-A105 and its variants, whose commercial name is Galaxy A10.
The methodology proposed in the case study of this work used that device, which is sold globally,
runs Android OS version 9 (Pie), and was the second best-selling smartphone in the world in the third
quarter of 2019 [58]. In this case, conventional forensic solutions can only extract data if the device
is unlocked.
The application of the proposed methodology, which combines the use of ISP and Combination
Firmware, made it possible to bypass the lock screen and the subsequent acquisition and analysis
of the data. Also, it is emphasized that the data integrity was preserved, which is fundamental in
forensic analysis. Taking into account that Samsung is the company with the largest market share of
mobile devices [3], we believe that its application is a worthy contribution to forensic analysts of law
enforcement divisions, due to the abundance of devices and the number of security barriers that can
be overcome.
Future Work
As future work, we intend to add to the set of techniques already applied, the Chip-off technique,
and the technique presented by Alenadl et al. [34], aiming to bypass Samsung’s secure boot mechanism.
A methodology for bypassing the lock screen password without using the Combination Firmware is
Appl. Sci. 2020, 10, 4231 26 of 29
also being studied, as well as a technique that deals with component swapping, including damaged
smartphones. Finally, we intend to study techniques that allow data acquisition from smartphones
that use the Universal Flash Storage (UFS) memory type.
Author Contributions: C.M.d.S. developed the necessary combinations for the technique; G.D.A.N. conducted
the concept and methodology reviews; R.T.d.S.J. proposed experiments and methodology validation; R.d.O.A.,
G.A.d.O.J. and A.L.S.O. assisted in the development of the methodology; R.d.O.A., G.A.d.O.J. and L.J.G.V.
reviewed the techniques applied. All authors have revised the results and the final version of the manuscript.
Funding: Authors of this research received the following funding: R.T.D.S.J. was funded by CAPES (grants
23038.007604/2014-69 FORTE and 88887.144009/2017-00 PROBRAL), CNPq (grants 312180/2019-5 PQ-2,
BRICS2017-591 LargEWiN, and 465741/2014-2 INCT in Cybersecurity), FAP-DF (grant 0193.001366/2016 UIoT)
and the Administrative Council for Economic Defense (grant CADE 08700.000047/2019-14). R.d.O.A. was funded
by FAP-DF (grant 0193.001365/2016 SSDDC). G.D.A.N was funded by the Ministry of the Economy (grant ENAP
083/2016) and the General Attorney of the Union (grant AGU 697.935/2019). The experiments were made in
a laboratory that received funding from cooperation projects with the Ministry of the Economy (grants DIPLA
005/2016 and ENAP 083/2016), the Institutional Security Office of the Presidency of the Republic (grant ABIN
002/2017), the Administrative Council for Economic Defense (grant CADE 08700.000047/2019-14) and the General
Attorney of the Union (grant AGU 697.935/2019).
Acknowledgments: The authors would like to thank the support of the Brazilian research, development and
innovation agencies CAPES (grants 23038.007604/2014-69 FORTE and 88887.144009/2017-00 PROBRAL), CNPq
(grants 312180/2019-5 PQ-2, BRICS2017-591 LargEWiN, and 465741/2014-2 INCT in Cybersecurity) and FAP-DF
(grants 0193.001366/2016 UIoT and 0193.001365/2016 SSDDC), as well as the cooperation projects with the
Ministry of the Economy (grants DIPLA 005/2016 and ENAP 083/2016), the Institutional Security Office of the
Presidency of the Republic (grant ABIN 002/2017), the Administrative Council for Economic Defense (grant
CADE 08700.000047/2019-14) and the General Attorney of the Union (grant AGU 697.935/2019).
Conflicts of Interest: The authors declare that there are no conflicts of interest.
Abbreviations
Abbreviations used throughout the manuscript:
References
1. Vargas, F.G. 30a Pesquisa Anual do FGVcia da FGV/EAESP. 2019. Available online: [Link]
sites/[Link]/files/noticias2019fgvcia_2019.pdf (accessed on 19 January 2020).
2. StatCounter. Desktop vs. Mobile vs. Tablet Market Share Worldwide. Available online: [Link]
com/platform-market-share/desktop-mobile-tablet (accessed on 28 February 2020).
3. StatCounter. Mobile Vendor Market Share Worldwide. Available online: [Link]
vendor-market-share/mobile (accessed on 28 February 2020).
4. StatCounter. Operating System Market Share Worldwide. Available online: [Link]
os-market-share (accessed on 28 February 2020).
5. Simão, A.M.d.L.; Sícoli, F.C.; de Melo, L.P.; de Deus, F.E.; de Sousa Júnior, R.T. Acquisition of digital
evidence in android smartphones. Int. J. Forensic Comput. Sci. 2011, 28–43. doi:10.5769/J201101002.
[CrossRef]
6. Kingston, C. The Future of Mobile Forensics. Master’s Thesis, Utica College, Utica, NY, USA, 2018.
7. Wu, S.; Xiong, X.; Zhang, Y.; Tang, Y.; Jin, B. A general forensics acquisition for Android smartphones with
qualcomm processor. In Proceedings of the 2017 IEEE 17th International Conference on Communication
Technology (ICCT), Chengdu, China, 27–30 October 2017; pp. 1984–1988.
8. The New York Times. F.B.I. Finds Links Between Pensacola Gunman and Al Qaeda. Available online:
[Link]
[Link] (accessed on 2 June 2020).
9. Pappas, S. Investigation of JTAG and ISP Techniques for Forensic Procedures. Master’s Thesis, University of
Tartu, Tartu, Estonia, 2017.
10. Mota Filho, J.E. Discovering Linux—3rd Edition: Understand the GNU/Linux Operating System; Novatec
Editora: São Paulo, Brazil, 2012.
11. Linux Kernel Organization. WHAT IS Flash-Friendly File System (F2FS)? Available online: https:
//[Link]/standard/[Link] (accessed on 20 October 2019).
12. Linux Kernel Organization. ext4. Available online: [Link]
filesystems/ext4/ondisk/[Link] (accessed on 20 October 2019).
13. Venkateswara Rao, V.; Chakravarthy, A. Survey on android forensic tools and methodologies. Int. J.
Comput. Appl. 2016, 154, 17–21.
14. Ajijola, A.; Zavarsky, P.; Ruhl, R. A review and comparative evaluation of forensics guidelines of NIST SP
800-101 Rev.1:2014 and ISO/IEC 27037:2012. In Proceedings of the World Congress on Internet Security
(WorldCIS-2014), London, UK, 8–10 December 2014; pp. 66–73.
15. Ayers, R.P.; Brothers, S.; Jansen, W. Guidelines on Mobile Device Forensics; Technical Report; NIST:
Gaithersburg, MD, USA, 2014.
16. International Organization for Standardization. ISO/IEC 27037:2012 Information Technology—Security
Techniques—Guidelines for Identification, Collection, Acquisition and Preservation of Digital Evidence.
Available online: [Link] (accessed on 20 October 2019).
17. Neuner, S.; Schmiedecker, M.; Weippl, E. Effectiveness of File-Based Deduplication in Digital Forensics.
Secur. Commun. Netw. 2016, 9, 2876–2885. [CrossRef]
18. Brezinski, D.; Killalea, T. RFC 3227—Guidelines for Evidence Collection and Archiving. Available online:
[Link] (accessed on 20 October 2019).
19. Lopes, P.A. Digital Forensic—Computational Forensic Expertise. Available online: https://
[Link]/pericia-forense-computacional-2/ (accessed on 20 October 2019)
20. Yang, S.J.; Choi, J.H.; Kim, K.B.; Chang, T. New acquisition method based on firmware update protocols
for Android smartphones. Digital Investig. 2015, 14, S68–S76. [CrossRef]
Appl. Sci. 2020, 10, 4231 28 of 29
43. Li, Z.; Xi, B.; Wu, S. Digital forensics and analysis for Android devices. In Proceedings of the 2016 11th
International Conference on Computer Science & Education (ICCSE), Nagoya, Japan, 23–25 August 2016;
pp. 496–500.
44. Tian, D.; Hernandez, G.; Choi, J.I.; Frost, V.; Ruales, C.; Traynor, P.; Vijayakumar, H.; Harrison, L.;
Rahmati, A.; Grace, M.; et al. Attention spanned: Comprehensive vulnerability analysis of AT commands
within the android ecosystem. In Proceedings of the 27th USENIX Conference on Security Symposium,
Baltimore, MD, USA, 15–17 August 2018; pp. 273–290.
45. Sathe, S.C.; Dongre, D.N. Data Acquisition Techniques in Mobile Forensics. In Proceedings of the
Second International Conference on Inventive Systems and Control, Coimbatore, India, 19–20 January
2018; pp. 280–286.
46. Chanajitt, R.; Viriyasitavat, W.; Choo, K.K.R. Forensic analysis and security assessment of Android
m-banking apps. Aust. J. Forensic Sci. 2018, 50, 3–19. [CrossRef]
47. NIST. NIST Tests Forensic Methods for Getting Data From Damaged Mobile Phones. Available online:
[Link]
mobile-phones (accessed on 28 February 2020).
48. Soares, A.M.M.; de Sousa, R.T., Jr. A Technique for Extraction and Analysis of Application Heap Objects
within Android Runtime (ART). In Proceedings of the International Conference on Information Systems
Security and Privacy, Porto, Portugal, 19–21 February 2017; pp. 147–156.
49. Soares, A.M.M.; de Sousa, R.T., Jr. Forensic Analysis of Android Runtime (ART) Application Heap Objects
in Emulated and Real Devices. In Information Systems Security and Privacy, ICISSP 2017, Communications in
Computer and Information Science; Mori, P., Furnell, S., Camp, O., Eds.; Springer: Cham, Switzerland, 2017;
Volume 867, pp. 130–147.
50. Celebrite—Home. Available online: [Link] (accessed on 22 January 2020).
51. Cellebrite. Cellebrite Advanced Services Brazil. Available online: [Link]
services/cas-latam/ (accessed on 22 January 2020).
52. Cellebrite. Serviços Avançados da Cellebrite. Available online: [Link]
inquiry-pt/ (accessed on 22 January 2020).
53. Grayshift. Introducing GrayKey. Available online: [Link] (accessed on 22 January 2020).
54. Skulkin, O.; Tindall, D.; Tamma, R. Learning Android Forensics: Analyze Android Devices with the Latest Forensic
Tools and Techniques, 2nd ed.; Packt Publishing: Birmingham, UK, 2018.
55. Halabtech Support—Home. Available online: [Link] (accessed on 22 January 2020).
56. Android Open Source Project. Partições e Imagens. Available online: [Link]
devices/bootloader/partitions-images (accessed on 20 January 2020).
57. Bair, J. Seeking the Truth from Mobile Evidence: Basic Fundamentals, Intermediate and Advanced Overview of
Current Mobile Forensic Investigations; Academic Press: Cambridge, MA, USA, 2017.
58. Counterpoint. iPhone XR Was the Top-Selling Model Globally in Q3 2019. Available online: [Link]
[Link]/iphone-xr-top-selling-model-globally-q3-2019/ (accessed on 2 January 2020).
59. StatCounter. Mobile & Tablet Android Version Market Share Worldwide. Available online: [Link]
[Link]/android-version-market-share/mobile-tablet/worldwide (accessed on 19 January 2020).
60. Cellebrite. Exclusive Access to Untouched Evidence in Samsung Exynos Devices. Available online:
[Link]
samsung-exynos-devices/ (accessed on 22 September 2019).
c 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access
article distributed under the terms and conditions of the Creative Commons Attribution
(CC BY) license ([Link]