Forensic analysis of mobile phone internal memory
|
|
|
- Gervase Nelson
- 10 years ago
- Views:
Transcription
1 Forensic analysis of mobile phone internal memory Svein Y. Willassen Norwegian University of Science and Technology Abstract Mobile phones have become a very important tool for personal communication. It is therefore of great importance that forensic investigators have possibilities to extract evidence items from mobile phones. Modern mobile phones store evidence items on SIM-cards as well as internal memories. With the advent of modern functionality, such as camera and multimedia messaging, more and more of these items are stored in internal memory. Proper forensic examination of such memories, including recovery of deleted items, has not been possible until now. This paper presents two different methods of physical imaging of mobile phone memory units. The methods are applied to several popular modern mobile phones, and it is shown that the methods can be utilized in practice to recover important evidence such as deleted text messages. The discovery of mobile phone internal memory management functionality challenges the current mobile phone analysis paradigm. 1.0 Introduction It is clear that mobile phones contain information that may have value as evidence in investigations. The mobile phone has become the modern person s primary tool for personal communication, and therefore frequently contains information about a person s activities. Obtaining information on such activites is often a primary goal in an investigation. Analyzing the content of a mobile phone is therefore an invaluable tool for the forensic investigator. This paper first examines what evidence exists on mobile phone internal memory. Two different methods for imaging phone internal memory are then discussed. Further, memory content is examined for evidence items. 2.0 Evidence in Mobile Phones Mobile phones are digital media. In principle, this means that mobile phones have the same evidentiary possibilities as other digital media, such as hard drives. For example it is, as will be explored in this paper, possible to extract deleted information from a mobile phone, in the same way it is possible on a hard drive. However, mobile phones also suffer from the same evidentiary problems as other digital media. As with a computer, the content of a mobile phone is fragile and can easily be deleted and overwritten. Mobile phones should therefore be handled with great care and insight, just as any other digital media. 2.1 Evidence Items
2 A long range of evidence items can be found in modern mobile phones. A few is listed in [1]. In addition to the evidence related to the phone system itself, modern phones have other evidence items that should be mentioned: - Images - Sounds - Multimedia messages - WAP/web browser history - - Calendar items - Contacts Last but not least, the importance of SMS text messages should not be underestimated. The Short Message Service is very widely used, and messages are stored on the sending and receiving mobile phone. The ability to recover deleted text messages would have great value in many investigations. The investigation of possibilities to recover deleted text messages has been the main motivation for this research. 2.2 Storage Media With the advent of digital mobile telephone systems, such as GSM, a need for local digital storage emerged. In the GSM system, the single most popular digital mobile phone system, the SIM (Subscriber Identity Module) was specified as storage medium and implemented as a smart card that fits inside the phone. The SIM contains subscriber information and secret encryption keys necessary for the communication. It also implements storage space for contacts and text messages. As described in [1] and [2], the SIM can be soundly forensically analyzed. It is also possible to recover some deleted data from the SIM (deleted text messages on from some phone models). The SIM architecture is also used in 3G systems (USIM). However, since the late 1990s, mobile phone manufacturers began to use mobile phone internal memory in addition to the SIM for storage of information items. The SIM has a rigorous specification allowing only for certain types of information to be stored. It does not provide a single continous memory that can be utilized for any purpose. As the manufacturers wanted to implement new functions where storage on SIM was not available, mobile phones were gradually equipped with internal memory for storage of items such as missed and received calls, calendar events, text messages, contacts and other items. The first models used a serial EEPROM chip for this purpose. With the growth of memory demand, it gradually became more common to implement internal memory on flash memory, either as a flash chip dedicated for information item storage, or as an area on the flash memory chip storing the phone system software. More recently, with the advent of telephones with cameras and MP3 players, it has also become common to add possibilities for external flash memory in mobile telephones. External memory can be added by inserting a memory card such as SD, MMC, CF or similar. Sound forensic analysis of external memory cards can be accomplished by using existing computer based forensic tools such as [16], [20] and [21] and will not be further examined in this paper. 2.3 Usage of External Memory, Internal Memory and SIM In order to understand the value of analyzing mobile phone internal memory, one must understand where the different information items in mobile phones are stored. In order to
3 understand this properly, a range of mobile phones with SIM, internal storage, and to a certain extent external flash storage was analyzed to determine what information items are stored on the different media types. The phones were examined by sending and receiving text messages, taking pictures, store contacts and calendar events, exchanging SIM cards and external memory cards, and observe the behaviour. The results indicate that each manufacturer is consistent in the way data is handled, but the variation between manufacturers is significant. The results are summarized in the following, grouped on each manufacturer Nokia The models 3200, 3410, 3510i, 5110, 6110, 6150, 6210, 6230, 6310i and 6610 were analyzed. The following behaviour was observed on the analyzed Nokia phones: Text messages are stored on the SIM. When the SIM is full (max messages), the phone uses internal memory (up to 150 messages common on most models). Older models store only incoming messages, but newer models store both outgoing and incoming, but only incoming is stored on SIM. With Nokia phones, deleted messages on SIM can be recovered. Contacts can be stored on SIM or internal memory, and the user can select which memory to use. Older Nokia phones cannot store contacts in internal memory. Of the analyzed phones, this was the case only with the The analyzed Nokia phones use internal memory for all other data such as calendar events, caller logs, pictures etc. The call log file on the SIM is not used by Nokia. If the SIM is changed, the phone will delete the caller logs, but all other data will remain. Only one of the analyzed Nokia phones (the 6230) had external flash memory. This could be used as additional storage for pictures and sound files. Text messages cannot be stored on the external card. Multimedia messages will implicitly be stored in internal memory, but may be moved to external memory by the user Sony Ericsson The models A2618s, GH688, R380s, S868, T68, T68i, T610 and T630 were analyzed. For the analyzed Sony Ericsson phones, it was observed that text messages are stored on internal memory until it is full, and only then will the phone start to use the SIM. As a consequence, SIM cards will in most cases contain nothing when they have been used in Sony Ericsson phones. It was also discovered that the phone deletes all messages in internal memory if the user switches the SIM card. Other items, such as pictures and calendar events are all stored in internal memory. For phones with external memory cards, it is similar to Nokia only possible to copy pictures and sounds to these, and only at the user s explicit request Siemens The models A60, C25, C60, C62, M55 and M65 were analyzed. The analyzed Siemens phones use SIM as primary storage for text messages and log of outgoing calls. When the SIM memory is full, internal memory is used. For contacts, the user
4 can choose whether to use internal or SIM memory, but internal memory is the default. None of the Siemens phones deleted items when switching the SIM card. No Siemens phone with external memory was analyzed. 2.4 Discussion From the above it should be very clear that many, in fact most, information items on modern mobile phones are stored in internal flash memory as opposed to the SIM or external flash memory. It is therefore of outmost importance to find methods to perform sound forensic analysis of mobile phone internal memory. 3.0 Mobile Phone System Architecture In order to fully understand how forensic analysis of mobile phone systems can be conducted, it is important to understand how mobile phones are built. The system architecture of a mobile can generally be viewed as the architecture on figure 1. Figure 1: General mobile phone architecture The central unit of the phone is the CPU. The CPU controls the communication circuits of the phone, in addition to control the communication with the user. For intermediary storage, the CPU uses a RAM. RAM is used for all intermediary storage during communication and user interaction. The RAM can be implemented as a separate intergrated circuit or it can be integrated with the CPU in a single integrated circuit. The phone also needs a secondary non-volatile storage (shown as secondary storage on the figure). This is needed for storage of all data pertaining to user and communcation that needs to persist during a power failure. Secondary storage can be implemented in various ways. The most common implementation today on mobile phones is a separate flash memory integrated circuit on the system board. In addition to these elements, the CPU has communication with the SIM, and optionally other external storage media. It is also common to have a special unit to control the usage of power in a mobile phone.
5 One should note the similarity of the architecture of a mobile phone with that of a computer. Where computers normally use a hard drive for secondary storage, a mobile phone uses flash memory. Otherwise the mobile phone architecture is like a computer. In this essence, it is not unfair to say that the mobile phone is a computer. The difference in secondary storage is however very imporant for forensic investigators. 4.0 Current Analysis methods for internal memory 4.1 Analysis process There is currently no standard method for analyzing mobile phone internal memory. The methods that are currently used, focus on extracting information from the phone by utilizing a cable, infrared or bluetooth connection to the phone, and then extract information by using the AT-command set that has been specified for communication with serial modems. GSM specifcations [18] specify a standard command set for the extraction of certain evidence items. Other items are specific to the different handsets and must be extracted with AT commands that are specific from manufacturer to manufacturer or even from model to model. To aid investigators with such information extraction, several software packages exist to perform this process. Cell-Seizure, TULP and Oxygen Phone Manager are examples of such software packages. [12] [13] [14] 4.2 Weakness of current methods Extracting information with AT-commands implies obtaining information through the operating system of the phone. Under this paradigm, the investigator is only able to enumerate the content that mobile phone operating system itself will recognize. Thus; deleted information cannot be extracted with this method. This very important weakness should warrant a search for new analysis methods. As mentioned, important evidence items will on some models become deleted if the phone is analyzed with a new SIM. However, if turned off, one will subsequently need the PIN-code for the SIM in order to analyze the phone with the original SIM. Some therefore suggest that the phone, if turned on when seized, should be kept on until analyzed. To avoid new activity on the phone, it is suggested to utilize a jammer that jams the GSM signal so that the phone cannot communicate. One could also use a Faraday cage or Faraday bag to prevent the phone from communicating. Allegedly, this kind of protection will prevent new information from contaminating the phone memory. As will be shown later in this paper, this is not necessarily the case. Also, it should be clear that being barred from signals is not a normal situation for a mobile phone. It will search for network channels, and consume more energy than normal, thereby potentially exhausting the battery. It has also been suggested to analyze the phone with a cloned SIM-card, where the PIN-code has been removed. Although more appealing, this method still involves turning the phone on and reading memory through the operating system. Indeed, as long as the phone is turned on, changes can potentially occur that will overwrite any deleted information resident on the phone. This is the case with mobile phones as with any other digital evidence. In the search for possible new methods, one should therefore look for methods that allow forensic analysis of a dead mobile phone. With such a paradigm,
6 mobile phones can be shut off as soon as they have been seized, and investigators can be sure that they do not introduce any changes to the system themselves. To explore possibilities for imaging and analysis of internal memory, research has been conducted for two possible methods; the use of desoldering techniques to desolder and image a memory integrated circuit, and the use of built-in test methodology to image memory contents. In the following chapters, these two different methods are explored, together with a review of analysis of the resulting image. One could also imagine a third method; loading software into the system RAM that allows reading of flash memory through the system interface. This method would require software specific to each phone and has not been further explored. 5.0 Forensic Desoldering The first proposed method for imaging of mobile internal memory is by desoldering the memory circuit. Since content stored inside the mobile phone resides on an on-board flash memory chip, the seemingly obvious method to access the content is to attach to the chip itself and read off the contents. Although seemingly a simple and elegant solution, the approach has some challenges that need to be addressed. 5.1 Ball Grid Array Technology Figure 2: BGA Technology Ball Grid Array Technology (BGA) is a mounting technology for the mounting of SMT (Surface Mount Technology) components on a PCB. Instead of the conventional usage of small leads leading from the side of the package soldered to pads on the PCB, the chip is manufactured with an array of pads on the bottom. Small balls of solder are placed on these pads. When mounting to the PCB, the chip is placed on top of matching pads on the PCB and soldered with Reflow soldering. Reflow soldering means heating the unit to the melting point (reflow temperature) of the solder, so that the melted balls bond to the pads on the PCB. From the electronics manufacturer s perspective, the use of BGA technology has several advantages. The foremost advantage is that BGA devices use less space on the PCB. The typical space constraint on a conventional integrated circuit is not the limited area of the chip
7 itself, but the limited area for pins on the sides. With BGA, the full area of the bottom of the chip can be utilized to get the signal out. Figure 3: Example BGA ball configuration From the perspective of the forensic investigator however, the use of BGA technology presents some difficulties. With conventional surface mounting, it would be possible to attach probes to the pins and read and analyze the chip without desoldering it from the PCB. With such analysis it would be possible to analyze the content of the memory without destroying the unit. This is not possible with BGA circuits. Since the chip is bonded directly to the PCB through molten solder balls, it is not possible to attach individual probes to each connection. The chip must therefore be soldered off before it can be read. Desoldering a chip presents new challenges to the forensic investigator. Desoldering must be performed with great care to avoid damaging the memory circuit. After desoldering, the solders balls will be melted and most likely short circuit the pads of the chip. Solder residue must therefore be removed, and the chip must either be restored to its original state by using a re-balling process, or the contents must be read off by connecting directly to the pads. 5.2 BGA Reballing Many device readers require that the chip package is intact with balls in place. It may therefore be required to reball the circuit before the contents can be read. Reballing is the process of restoring the solder balls correctly placed on the pads on the lower side of the BGA package. The most common method to achieve this is to use a stencil that has been specificly manufactured to reball a certain package. The stencil has small holes that match the placement and size of the pads on the package. When reballing, the stencil is placed on top of the lower side of the package and aligned, so that each hole matches a pad. Solder paste is then applied on the stencil and evenly distributed using a squeegee until all holes are properly filled. Reflow is then applied, and the solder paste in the holes will form balls that are fixed to the pads on the chip.
8 BGA reballing using this method requires stencils that match the chip in question. In particular, ball size, inter-ball distance ( pitch ) and ball configuration of the package must be matched by the stencil. Since there exist a long range of different packages with various sizes and configurations, obtaining the correct stencil may be a practical difficulty. 5.3 Reading memory in a device programmer For the purpose of reading memory circuits, such as EPROM, EEPROM, flash, volatile memories and microcontrollers with embedded memory, one can obtain a device programmer. A device programmer is an electronic device specially made for the reading and programming of memory circuits and microcontrollers with embedded memory. The device attaches to a computer and (most often) allows reading and programming a wide range of memory circuits through the use of adapters. An adapter can be general (such as an adapter for all DIP or SOIC packages with up to 40 leads) or specific (such as an adapter for the Intel 28F640). In addition to the physical adapter, the correct software for reading a specific chip is needed, since the pin configuration can vary greatly between packages with the same physical layout. Manufacturers of device programmers usually supply software with their programmers to read and program of a wide range of devices. Many devices have built-in checksum capabilities that allow for the detection of inconsistencies when reading a device. Checksum capability must be supported in the programming software. In the application of forensic analysis of mobile phone memory, the device programmer must be used for reading BGA circuits. In this case it is necessary with very specific adapters for each circuit type. The adapter must have pins that match the ball size, intra-ball distance ( pitch ) and ball layout (for example 4x10 or 8x8). In addition, since mounting a chip in the adapter requires mounting the chip in a tight slot to ensure alignment, the adapter must match with the physical size of the package. Adapters for BGA circuits can be made in several different ways. Two common technologies for the adapter-chip connection are Y-shaped springs or spring-loaded pogo-pins. A Y-shaped pin needs to have a ball in place in order to establish an electric connection. The pogo-pin however, can be used directly on the pads on the chip without balls. Therefore, from a forensic point of view, an adapter with spring-loaded pogo-pins would be a better choice, since device reballing can be avoided. Availability of the two types for different devices seems to vary. 5.4 Desoldering background and practical possibilites There exist a long range of different equipment types for performing soldering and desoldering. These equipments are usually based on heating the device and solder through heat conduction, convection or radiation. Equipments range from the simple soldering iron heating a device by conducting heat through its tip to massive reflow ovens for use in production equipment. The most important for the forensic investigator is to consider the possibilites to damage the unit. Any integrated circuit can not endure more than a certain number of heatings to reflow temperature. Intel states that BGA circuits manufactured by them are guaranteed to endure reflow three times. [4] Since a PCB with SMT components on both sides will have to be assembled with two reflows, there is only one left for the forensic investigator. This is not
9 enough if both desoldering and reballing is needed. Experience however shows that most components will handle many more reflows if handled correctly. The most important factors to avoid damage are correct maximum temperature and correct temperature gradient. Since it in contrast to conventional mounting technology is not possible to heat only the lead, the whole chip has to be heated. The maximum temperature should be only nominally above the reflow temperature of the solder. The gradient should be so that the temperature rises slow enough to avoid damage. According to Lee, the temperature should have a tent profile, with peak temperature around 210 C, heating to this temperature in 3-4 minutes. [5] It is also recommended to pre-bake the unit to remove moisture that has been soaked in the unit. Heating to reflow temperature could otherwise cause a popcorn-effect, whereby water vapor cause cracks in the circuit substrate and permanently damage the circuit. This could be extra important for circuits in mobile phones, since these units must be assumed to have lived in conditions of high moisture. Figures for moisture sensivity and conditioning requirement are given in [7]. These requirements rule out any use of hand soldering tools. Forensic desoldering should only be performed by using an automatic soldering station with possibilities for temperature gradient programming and automatic component removal. The most common equipment for professional desoldering is a soldering station with a combination of convection heating through hot air and radiation heating through an infrared light source. The station has a temperature controlled hot air nozzle, and can be programmed to follow a specific heating curve, allowing the operator to program the unit to correctly specify the gradient and the maximum temperature. 5.5 Dismantling and identification To test the methodology and identify these challenges, several different phone models were dismantled, desoldered and read. The results will be summarized in the following. Before desoldering, the units were dismantled. Most mobile phones can easily be dismantled when proper tools and care is used. A set of torx screwdrivers is needed in most cases. All dismantling should be done in an electrostatically safe environment since the exposed components are sensitive. In some cases, it is also necessary with special tools from the manufacturer, in which case such tools should be obtained, or a repair business consulted. It is also possible to obtain dismantling instructions for various models by contacting the manufacturer. After dismantling the unit, one or several printed circuit boards (PCB) are exposed. It was found that most modern phones for reasons of space constraints implement the design on a single circuit board with surface mounted components on both sides. The circuit board is layered with several inner layers that are not exposed. It is therefore not possible to follow the leads on the design by examining the board directly. Among the surface mounted devices there are a number of integrated circuits. The boards that were examined had 5-10 surface mounted integrated circuits, of which most utilize Ball Grid Array Technology (see table 1). These can be identified by examining identification text printed on each circuit. By carefully noting the written text and comparing with datasheets available from databooks and IC manufacturer websites, integrated circuits corresponding to each element in the system architecture were identified.
10 Figure 4: Nokia 6310i main board For each model, a Central Processing Unit (CPU), Main memory (RAM) and storage memory (flash) was identified. Table shows a summary of the models that were examined in the experiment and identification of the on board flash memory integrated circuit. Model Chip Chip technology Nokia 5110 Sharp L28F800BE-TL85 TSOP Nokia 6310i Intel 28F320B3TA BGA Nokia 6610 Intel 128W18T BGA Sony Ericsson T68i Intel 28F640W18T BGA 5.6 The desoldering experiments Table 1: Memory Technologies used Having identified the flash memory circuits, the circuits could now be desoldered. The units were pre-baked for 24 hours at 80 C to dry out moisture. The chips were thereafter desoldered using a hot air soldering station with IR preheating. A temperature profile was constructed with a maximum temperature of 220 C, with a gradient such that the temperature was reached in 5 minutes. The chips were removed from the PCB at the maximum temperature with a robot arm mounted on the soldering station using vacuum to remove the hot circuit from the board. It could be possible to remove the chip with the solder balls intact, by using a vacuum sucker at a temperature where the solder ball is just marginally above the melting point at 183 C. This would in most cases result in the balls being intact due to the surface tension of the molten solder. This practice would however be risky since it is difficult to know the exact temperature under the circuit. Trying to remove the circuit at too low a temperature could possibly rip off the pads and damage the circuit beyond repair. Due to this risk it was decided to use the temperature of 220 C which should be sufficiently above the melting point. After the removal of the circuits from the board, the undersides of the circuits were exposed. The pads of the chips were exposed, but partially covered with solder residue, from the molten solder balls. The residue covered several pads and short circuited them. Several methods could be utilized to remove the residue. In the experiments, the residue was removed by using a temperature controlled hot air soldering station and soldering wick, a method that proved to be efficient. It is important to understand that also the process of removing solder
11 residue implies heating the unit, and should be performed with the same care as the removal of the circuit itself. A reballing process was now applied for those of the packages where stencils were available. (See table 2) Figure 5: Successfully reballed 8x6 7x11 mm BGA package with 0.75 mm pitch (smart card shown for size comparison) 5.7 Reading in a device programmer The devices from the phones were mounted in a commercially available device programmer, and content were read using the supplied software. For some of the packages, an adapter was not commercially available at the time. For others, check of the built in checksum resulted in an error. For the examined devices, it was not possible to determine where in the memory dump the error occurred. Thus, it was not possible to determine if the error occured due to damage caused by the desoldering-reballing process or other cause. Model Chip Adapter Read Successful Nokia 5110 Sharp L28F800BE-TL85 Yes Yes Nokia 6310i Intel 28F320B3TA Yes* Yes Nokia 6610 Intel 128W18T No N/A Sony Ericsson T68i Intel 28F640W18T Yes Yes * Modification of the 28F320B3TA adapter was necessary to read the chip Table 2: Reading desoldered memory packages The read operation resulted in a computer file of the same size as the chip, containing a dump of all the memory. These files could be used for forensic analysis of the memory contents.
12 6.0 Using embedded test technology for memory extraction Most embedded systems are built with embedded test technology. The reason is that manufacturing of electronic devices is a complex process where many things can go wrong. Unless the manufacturer has an automated way of testing the functionality of the device, elements and interconnections, the quality of the resulting product can not be guaranteed. The current trend in test technology is called boundary-scan. Using this technique, each integrated component has a shift register which can be used to probe and set the pins of the components. The shift register can be loaded serially from a test access port accessible as test points on the device. If the CPU of a device has support for boundary-scan, the bus can be controlled from the test access port, and consequently it is possible to read or program the memory attached to the bus. This is called technique is called in-system programming and is frequently used in the manufacturing process. Figure 6: JTAG system overview The Joint Test Action Group (JTAG) has standardized a procedure for implementing boundary-scan in order to facilitate interoperability between components from different manufacturers. The standard is published as IEEE [8], and is frequently called the JTAG-standard. 6.1 The IEEE standard The JTAG-standard defines a Test Access Port (TAP) controlling implementation of test functionality in integrated circuits. 7 new signals are defined (see table 3) that has to be provided as external pins on compliant circuits. Signal Description
13 TCK TMS TDI TDO TRST Test Clock Input Test Mode Select Input Test Data Input Test Data Output Test Reset Input (not compulsory) Table 3: JTAG signals The test system works by letting the operator clock in data into two shift registers; the instruction- and data register of the TAP controller. Instructions can now be given in order to read or set the values of the boundary scan register. Since each bit in the boundary scan register is coupled to external pins of the circuit, this can be used to set and read values to/from the system bus. Figure 7: JTAG Test Access Port On a printed circuit board, the layout can be made specifically to allow for using JTAG as test standard. The manufacturer can lay out test points that directly access the JTAG pins of each integrated circuit. More conveniently, the JTAG pins of each integrated circuit can be interconnected, so that only one set of test points is required. This can be done in various configurations, one of which is serial as shown in figure 8. Figure 8: JTAG serial system board interconnection 6.2 In-System Programming with JTAG In system programming (or reading) can be accomplished with JTAG. If the memory device supports JTAG itself, the TAP of the memory device itself can be addressed through the JTAG interface. For each memory address, the in-system programmers sets the correct address value on the memory device s address bus by shifting in the proper bits through the boundary scan register. The data bus will now contain the content of that memory address and
14 can be read by shifting the value of the boundary scan register back through the JTAG chain. By probing all memory addresses in this fashion, the entire contents of the memory can be read. If the memory device itself does not support JTAG, in-system programming can be performed by using the TAP of another device connected to the memory system bus. This device may for instance be the system processor, which almost always will have a direct connection to the memory via the system bus. Reading the memory can be done in a similar fashion as with the memory device TAP by manipulating the boundary scan register of the CPU, setting an address on the bus, and reading back the resulting data through the CPU TAP. 6.3 Challenges with forensic memory reading through JTAG It is important to understand that JTAG is not a bus standard, but rather specifications standardizing a Test Access Port on each component, allowing interconnection between components on a board. It is entirely up to the manufacturer of each integrated circuit to decide on the configuration and working of the pins on the chip, and the configuration of the boundary scan register. Moreover, it is up to the printed circuit board designer to decide if JTAG ports shall be interconnected, or at all accessible from test points on the board. The designer can decide to not use JTAG at all, leaving the test pins on integrated circuits unconnected. With BGA circuits in such designs, attaching a probe to the test pins is impossible and memory reading through JTAG is not an option. It is however common to implement JTAG in designs with BGA circuits, since the manufacturer otherwise would have no way to test the design. Before trying to use JTAG to read memory, the following must be considered: - One must know which system processor and memory circuits are used and how they are connected on a system bus. This is required since it otherwise would be impossible to find the right bits in the boundary scan register. - One must find test points for the JTAG on the printed circuit board and determine which test point is which signal. - One must know the protocol for memory reading/writing. - One must determine the correct voltage. Using too high voltage may damage the circuits. The voltage can in most cases be determined by measuring on a live board. The memory protocol is in most cases available by downloading information about a memory circuit from the manufacturer s website. The two first considerations however may be a major challenge, since it in practice is very difficult and tedious to perform this task without complete system documentation including schematics. When it comes to mobile phones, such documentation is in most cases not available. In any case, the implementation of a system for memory reading via JTAG will be different from phone to phone. Even within one specific model, small configuration changes (such as using a different memory circuit) may require another implementation of JTAG memory reading. 6.4 JTAG memory reading experiment In order to explore the possibility to read memory with JTAG, experiments were conducted. Nokia 5110 was chosen as a test model for the experiment. This model was chosen from the
15 fact that the service manual for this model including schematics was available. Since a large number of this rather old model exist in the market, it was easy to obtain a number of test models without consuming too much resources. Nokia 5110 only stores a few evidence items on the phone itself. It is however believed that a successful read of 5110 memory can be extended to other models. Starting the experiment, the service manual [10] was examined for signs of JTAG implementation. Indeed, the CPU, listed as MAD2, has pinouts for JTRst, JTClk, JTDI, JTMS and JTDO. These pins are coupled in a line JTAGEMU onto a connector which in the schematics is listed as not assembled. A 5110 was disabled however, and a set of test points corresponding to this connector on the system board was found. The connections between the test points and the CPU were in part visible (see figure 9) allowing easy identification of the test points. Figure 9: 5110 system board with JTAG test points. Measurements of the voltage on these test points indicated that they were in fact connected to the JTAG interface of the CPU. Test wires were carefully soldered to the connectors using very thin wires extracted from an 80 lead ATA cable and soldering paste applied from an applicator gun. Since the test points are very small, the soldering was found to be fairly difficult. The key to success is to use soldering paste and sufficiently thin wires. Unlike desoldering of BGA chips, the risk of damaging the evidence medium itself is not very high in this soldering process. It can however be tedious to accomplish proper connections without any short circuits. Figure 10: Applying soldering paste and soldering thin wires to the JTAG test points. By connecting the wires to a breadboard, the 5110 could now be connected to a computer through the JTAG interface. JTAG interfaces can easily be built, but commercial solutions are
16 also available. For this experiment, the Chameleon POD programmable JTAG interface [15] was used. When connecting the phone to the interface, the voltage level of the phone system board and the interface should be considered. For the 5110, the system board uses 2,7V technology, being within the handling range of the Chameleon POD. Newer phones use 1.8V technology. At this voltage level, a level shifter would be required. Connecting a 1.8V system board directly to a JTAG adapter of higher voltage could damage the processor. Now, the JTAG interface was connected to a computer running Linux with the open source package JTAG-Tools installed. This package allows for connection with a JTAG device through a number of different adapters, including several that the Chameleon can be programmed for. The package supports various processors and configurations and with a modular architecture, it should be easy to extend to allow for extensions to support more processors and memories. After a few changes, a connection with the 5110 processor TAP was established. Although it is known from the service manual that the processor design is based on ARM7, and documentation on the JTAG interface for this processor design is publicly available, it was decided to proceed treating the TAP as a black box, as this will be the case in most situations. JTAG-tools allows for black-box analysis through the use of the command discovery. This function will cycle a 1 through the JTAG-chain and detect the number of available TAPs and the length of their instruction register (IR). For the 5110, the IR length was determined to be 12 bits, with only one JTAG TAP connected (the processor). The software then continues the analysis by probing all possible values of the IR with cycling of a 1 through the JTAG chain and thereby detecting the data register length for each instruction. Thus, it is possible to determine the values for different instructions. This process proved to be rather time consuming, as 4096 different possibilites were tested, but eventually resulted in the discovery of commands that can be used to set and probe the boundary scan register. The command probing itself will not change the content of the boundary-scan register and can therefore be executed without risk for altering memory content. Through detailed examination of the schematics, it was found which bits in the boundary scan register to set/probe for reading the on board Sharp L28F800BE-TL85 flash memory. These details were implemented in definition files for JTAG-Tools, and the memory could be read with the command readmem. 7.0 Memory Content analysis After reading the memory using desoldering or JTAG analysis, the contents of the flash memory is available as a binary file, and can be analyzed. A special tool for this purpose is for the time being not available. The binary file may however be analyzed with a standard Hexeditor, such as Win-Hex. [16] An initial analysis of the Sony-Ericsson T68i memory dump was conducted. The dump is a raw dump of the 8 Mb of data stored in the Intel 28F640W18T. At first glance, the memory dump seems to contain useless information. Further analysis reveals that useful readable information is available, such as error messages probably belonging to the operating system. (See figure 11) This confirms that the chip has been read successfully and that the content is readable in clear. Further examination shows that the first 4-5 Mb of the dump seems to contain binary data of high entropy, corresponding to what one would expect system software to look like. The
17 remaining dump contains large areas filled with byte-value 255 (hex FF) and some areas filled with what seems to be data. These could be user-data. Figure 11: Hex-print from T68i memory dump The mentioned data areas were thoroughly examined. Through this analysis, interesting data such as gif-images, jpg-images, phone numbers, calendar-items and text messages in the TPDU format [17] were found. Some of the content was recognized as content present and available in the phone operating system. Figure 12 shows the existence of a GIF-picture in the memory dump. It was confirmed that this and many other pictures could be extracted and viewed on a computer. Figure 13 shows items that were recognized as items that were known to be stored on the phone. A stored contact item Bryn Linda, and a stored calendar item Torsdag Ingebjørg was identified. It is believed that the other information assosiated with these items (phone number, date/time et.c.) can be extracted by interpreting the binary data in the dump. The exact format of the items needs to be understood in order to do this.
18 Figure 12: Content identified as a GIF-picture Figure 13: Content identified as a contact and a calendar item Analysis of the same type was conducted with all the other memory dumps available, with similar result. It is however clear that further work should be done in order to identify evidence items in memory dumps and present them clear and without doubt. Since memory content will vary from phone model to phone model, this is a research that will have to be on going as new models emerge on the market. 7.1 Memory Content Experiments
19 The focus of this research has been to identify if deleted items can be recovered by analyzing memory dumps, and in particular if deleted text messages can be recovered. Several experiments were done to find out if deleted text messages can be recovered. The experiments were conducted by successively reading out internal memory after commiting changes to the system using the phone operating system. The limitations of the memory reading methods made it difficult to do such experiments on more than a few tests. Another difficulty was the lack of a software tool to do identification and interpretation of TPDU messages inside memory dumps. The implementation of such a tool was beyond the scope of this project. Several interesting observations were done: - Text messages were still in flash memory after they had been deleted in the operating system. - It was found that images, MMS, calendar items and contacts were also in memory after they had been deleted. Contrary from what is possible on SIM-cards it is therefore possible to recover deleted items of this type from internal memory. - Copies of items from previously used SIM-cards were found in some occasions. During the analysis of successice memory dumps from the same device, another very important property was discovered. During the search for deleted text messages it was found that memory areas found in one memory dump was moved to quite another area on the following dump. This is most likely due to the existence of a Memory Manager that dynamically reallocates memory during phone usage in order to ensure optimal memory organization and utilization at all times during phone usage. Although not particularly surprising, the existence of such memory managers do have ramifications for the forensic handling of mobile phones. 7.2 Implications for the current analysis paradigm As previously mentioned, current handling of mobile phones often involves keeping the phone on for a period of time after it has been seized. Phone content is then analyzed by connecting the phone to a computer using a cable and read off the content through the operating system. The phone must be turned on during the analysis, and some therefore recommend to keep the phone on at all times after seizure. In the light of the discovery of possibilities to recover deleted items, and existence of memory managers for memory remapping, it is clear that the current practice for analysis of mobile phone internal memory is not ideal. By keeping the operating system operational and using the operating system itself for obtaining the memory content, the investigator keeps the memory manager functional, allowing for reorganization of memory potentially overwriting important evidence at any time. The overwriting of evidence items will make the recovery of deleted items that may have existed in memory at the time of seizure with the methods described in this paper impossible. Most likely, it will also rule out any future analysis with new and better analysis methods. It has not been shown that it is possible in practice to recover overwritten data from flash memory, nor is it likely that this will be a possibility any time soon. The situation is in many ways analogous to the development that has taken place in the development of practice for forensic analysis of computers. In the beginning, forensic analysis of computers was conducted by booting the operating system and looking for evidence.
20 Today, it is widely recognized that such an approach can be destructive to the evidence, and the method of imaging the hard drive before analysis is widely accepted as standard practice. This development will also have to take place for mobile phones. This is especially the case considering the small size of mobile phone flash memories when compared to computer hard drives, increasing the risk for the overwriting of important evidence by keeping the phone memory manager functional. 8.0 Results It has been shown that a logical analysis of a memory dump can be conducted in order to enumerate evidence items present on the phone, including items that have been deleted. The existence of embedded memory managers in mobile phones was discovered. Memory manager s reorganization of memory can result in the overwriting of deleted evidence items. Therefore, the current practice of analyzing mobile phone internal memory through phone operating system should be reconsidered. Based on these results, it must be clear that a new method for forensic sound analysis of mobile phone internal memory must be based on a system for imaging and direct analysis of the flash memory. Under such a paradigm, mobile phone analysis will follow in the tracks of forensic analysis of computers, where the current practice of imaging and analysis of hard drives has been widely accepted by courts. A requirement to adopt this paradigm for mobile phones is to find a practical method to perform such imaging and analysis of flash memory. This paper has presented two different approches in finding a technique for the physical extraction of flash memory. Both methods are challenging, but it has been shown that they are possible in practice. For the purpose of further research and ultimately as a new standard method, a new paradigm for mobile phone forensic analysis is hereby proposed: When mobile phones are seized, they must immediately be shut off. Any SIM card or external flash memory is removed and analyzed separately with a forensic analysis solution. The internal memory of the phone is imaged and analyzed using a method that has yet to be defined. Further research should be conducted in order to determine more practical methods for reading mobile phone internal memory, and enumerate evidence items found therein. As a final remark, it should be noted that the methods and discoveries developed through this research may be valid not only for mobile phones, but for all forensic analysis of electronics with embedded memory. For example, the author finds it more likely than not that memory managers similar to those on mobile phones exist on units such as PDAs, GPS, vehicle navigation systems and other devices with embedded memory. The successful conservation and extraction of deleted items on such items may rely on the usage of physical memory extraction rather than the current practice of operating system access. The memory extraction methods presented in this paper may be utilized also for such units. This is an imporant area of further research.
21 About the Author Svein Y. Willassen has a MSc in Telematics from the Norwegian University of Science and Technology. He has worked as a special investigator at the Norwegian National Computer Crime Center and as Computer Forensic Investigation Manager at Ibas AS. Willassen is currently working on a PhD within Digital Forensics in a research project at the Norwegian University of Science and Technology. He can be reached at [email protected]
22 References [1] S. Willassen, Forensics and the GSM mobile telephone system, International Journal on Digital Evidence 2003:2:1 [2] R. Knijff, Embedded Systems Analysis, Handbook of Computer Crime Investigation, Academic Press, 2002 [3] Intel Corporation, Ball Grid Array Packaging, 2000 Packaging Handbook [4] Intel Corporation, Intel Wireless Communications and Computing Package User s Guide version 1.2, May [5] N. Lee, Reflow Soldering Processes and Troubleshooting: SMT, BGA,CSP and Flip Chip Technologies, Newnes, 2001 [6] H. Manko, Solders and Soldering, 4 th ed. McGraw-Hill, 2001 [7] B. Vaccaro, R. Shook, D. Gerlach, The Impact of Lead-free Reflow temperatures on the Moisture Sensivity Performance of Plastic Surface Mount Packages, SMTA International, Chicago, 2000 [8] IEEE , IEEE Standard Test Access Port and Boundary-Scan Architecture, IEEE- ANSI, 2001 [9] Intel Corporation, Designing for On-Board Programming Using the IEEE (JTAG) Access Port, Application Note, November 1996 [10] Nokia Corporation, Service Manual NSE-1 Series Cellular Phones, March [11] JTAG-Tools, Open Source Project, Available: [12] Paraben Cell Seizure, Software Package, Commercial. Available: [13] Oxygen Phone Manager, Software Package, Commercial. Available: [14] TULP2G, Open Source Project, Available: [15] Chameleon POD, Reconfigurable JTAG-adapter, Available: [16] Win-Hex, Software Package, Commercial. Available: [17] 3G Partnership Project, ETSI TS Technical Realization of Short Message Service (SMS), version 5.6.1, Sept 2003.
23 [18] 3G Partnership Project, ETSI TS AT command set for GSM mobile equipment, version 5.6.1, Oct [19] G. Le Bodic, Mobile Messaging Technologies and Services, Wiley, 2003 [20] EnCase, Software Package, Commercial. Available: [21] The Sleuthkit, Software Package, Open Source. Available:
A universal forensic solution to read memory chips developed by the Netherlands Forensic Institute. The NFI Memory Toolkit II
A universal forensic solution to read memory chips developed by the Netherlands Forensic Institute The NFI Memory Toolkit II The NFI Memory Toolkit II The NFI Memory Toolkit II is a universal forensic
An Example of Mobile Forensics
An Example of Mobile Forensics Kelvin Hilton K319 kchilton@staffsacuk [email protected] www.soc.staffs.ac.uk/kch1 Objectives The sources of evidence The subscriber The mobile station The network
Reballing Rework Bright New Future
Reballing Rework Bright New Future Components are continuing to evolve. One of those evolutions is the Ball Grid Array or BGA. Add in the advent of the RoHS and WEEE directives and rework of the BGA is
User Guide Reflow Toaster Oven Controller
User Guide Reflow Toaster Oven Controller Version 1.5-01/10/12 DROTEK Web shop: www.drotek.fr SOMMAIRE 1. Introduction... 3 2. Preparation of THE REFLOW CONTROLLER... 4 2.1. Power supply... 4 2.2. USB
MARTECH SPI Tools. MARTECH SPI Tools User Manual v1.0. User Manual
MARTECH SPI Tools v1.0 Contents 1. Basic informations about the product...3 1.1 Memory types supported by SPI Tool...3 2. Main features and application possibilities...4 2.1 Technical Support activation...4
NIST Mobile Forensics Workshop and Webcast. Mobile Device Forensics: A Z
NIST Mobile Forensics Workshop and Webcast Mobile Device Forensics: A Z June 2014 Disclaimer: Certain commercial entities, equipment, or materials may be identified in this presentation. Such identification
Testing and Programming PCBA s during Design and in Production
Testing and Programming PCBA s during Design and in Production Hogeschool van Arnhem en Nijmegen 6 June 23 Rob Staals JTAG Technologies [email protected] Copyright 23, JTAG Technologies juni 3 The importance
DEDICATED TO EMBEDDED SOLUTIONS
DEDICATED TO EMBEDDED SOLUTIONS RELIABILITY IN SUBSEA ELECTRONICS TECHNIQUES TO OBTAIN HIGH RELIABILITY STIG-HELGE LARSEN KARSTEN KLEPPE DATA RESPONS 2012-10-16 AGENDA Introduction Analysis and Design
GSMPBX version 1.3 Datasheet
GSMPBX version.3 Datasheet Document Rev.:.3 Revision Date: 23.03.203 (preliminary data) Figure - GSMPBX Introduction The GSMPBX is designed to commute phone calls between a cellular network (GSM) and the
How To Clean A Copper Board With A Socket On It (Ios)
Den-on Rework Reference Process for Desktop platform and new Intel Socket LGA-1156 using the Den-on BGA rework station RD-500II and III *This document shows the whole process on how to repair the Intel
Computer Components Study Guide. The Case or System Box
Computer Components Study Guide In this lesson, we will briefly explore the basics of identifying the parts and components inside of a computer. This lesson is used to introduce the students to the inside
Development of a GSM based Control System for Electrical Appliances
International Journal of Engineering and Technology Volume 3 No. 4, April, 2013 Development of a GSM based Control System for Electrical Appliances Oke A. O., Emuoyibofarhe J. O., Adetunji A. B. Department
A+ Guide to Managing and Maintaining Your PC, 7e. Chapter 1 Introducing Hardware
A+ Guide to Managing and Maintaining Your PC, 7e Chapter 1 Introducing Hardware Objectives Learn that a computer requires both hardware and software to work Learn about the many different hardware components
Validating Tools for Cell Phone Forensics
Validating Tools for Cell Phone Forensics Neil Bhadsavle and Ju An Wang Southern Polytechnic State University 1100 South Marietta Parkway Marietta, GA 30060 (01) 678-915-3718 {nbhadsav, jwang}@spsu.edu
Mobile memory dumps, MSAB and MPE+ Data collection Information recovery Analysis and interpretation of results
Mobile memory dumps, MSAB and MPE+ Data collection Information recovery Analysis and interpretation of results Physical Extraction Physical extraction involves either Removing chips from circuit board
Solder Reflow Guide for Surface Mount Devices
June 2015 Introduction Technical Note TN1076 This technical note provides general guidelines for a solder reflow and rework process for Lattice surface mount products. The data used in this document is
DESIGN OF SMS ENABLED CAR SECURITY SYSTEM
DESIGN OF SMS ENABLED CAR SECURITY SYSTEM K. A. Amusa Federal University of Agriculture, Abeokuta, O. O. Nuga Federal University of Agriculture, Abeokuta, A. A. Adetomi Federal University of Agriculture,
Testing of Digital System-on- Chip (SoC)
Testing of Digital System-on- Chip (SoC) 1 Outline of the Talk Introduction to system-on-chip (SoC) design Approaches to SoC design SoC test requirements and challenges Core test wrapper P1500 core test
Eureka Technology. Understanding SD, SDIO and MMC Interface. by Eureka Technology Inc. May 26th, 2011. Copyright (C) All Rights Reserved
Understanding SD, SDIO and MMC Interface by Eureka Technology Inc. May 26th, 2011 Copyright (C) All Rights Reserved Copyright by Eureka Technology Inc. All Rights Reserved Introduction This white paper
Non-Contact Test Access for Surface Mount Technology IEEE 1149.1-1990
Non-Contact Test Access for Surface Mount Technology IEEE 1149.1-1990 ABSTRACT Mechanical and chemical process challenges initially limited acceptance of surface mount technology (SMT). As those challenges
MAX II ISP Update with I/O Control & Register Data Retention
MAX II ISP Update with I/O Control & Register Data Retention March 2006, ver 1.0 Application Note 410 Introduction MAX II devices support the real-time in-system mability (ISP) feature that allows you
Cellebrite UFED Physical Pro Cell Phone Extraction Guide
Cellebrite UFED Physical Pro Cell Phone Extraction Guide By Colby Lahaie Patrick Leahy Center for Digital Investigation Champlain College May 16, 2012 Table of Contents 1 Introduction... 2 1.1 Research
2.0 Command and Data Handling Subsystem
2.0 Command and Data Handling Subsystem The Command and Data Handling Subsystem is the brain of the whole autonomous CubeSat. The C&DH system consists of an Onboard Computer, OBC, which controls the operation
Fondamenti su strumenti di sviluppo per microcontrollori PIC
Fondamenti su strumenti di sviluppo per microcontrollori PIC MPSIM ICE 2000 ICD 2 REAL ICE PICSTART Ad uso interno del corso Elettronica e Telecomunicazioni 1 2 MPLAB SIM /1 MPLAB SIM is a discrete-event
1.Introduction. Introduction. Most of slides come from Semiconductor Manufacturing Technology by Michael Quirk and Julian Serda.
.Introduction If the automobile had followed the same development cycle as the computer, a Rolls- Royce would today cost $00, get one million miles to the gallon and explode once a year Most of slides
PCB Quality Inspection. Student Manual
PCB Quality Inspection Student Manual Unit 2: Inspection Overview Section 2.1: Purpose of Inspection What Is The Purpose of Inspection? There are 2 reasons why Inspection is performed: o To verify the
Capacitive Touch Sensor Project:
NOTE: This project does not include a complete parts list. In particular, the IC described here does not come in a dual-inline-package (DIP), and so a gull-wing package has to be soldered to an adaptor
Auditing Contract Manufacturing Processes
Auditing Contract Manufacturing Processes Greg Caswell and Cheryl Tulkoff Introduction DfR has investigated multiple situations where an OEM is experiencing quality issues. In some cases, the problem occurs
USER MANUAL V5.0 ST100
GPS Vehicle Tracker USER MANUAL V5.0 ST100 Updated on 15 September 2009-1 - Contents 1 Product Overview 3 2 For Your Safety 3 3 ST100 Parameters 3 4 Getting Started 4 4.1 Hardware and Accessories 4 4.2
Programming the On-Chip Flash on a phycore-xc161 phycore-xc167
Application Note Programming the On-Chip Flash on a phycore-xc161 phycore-xc167 Application Note Edition July 2003 LAN-020e_1 Application Note Preface...1 1 Installing Infineon MemTool...2 2 Preparing
THE MODULAR INTEGRATED STACKABLE LAYERS SYSTEM: A NASA DEVELOPMENT PARTNERSHIP
1 THE MODULAR INTEGRATED STACKABLE LAYERS SYSTEM: A NASA DEVELOPMENT PARTNERSHIP Tanner L. Perkins, Kelson G. Astley, Ty B. Navarrete, Paul B. Delaune, and Joseph A. Morgan Abstract Electronic Systems
MANUAL FOR RX700 LR and NR
MANUAL FOR RX700 LR and NR 2013, November 11 Revision/ updates Date, updates, and person Revision 1.2 03-12-2013, By Patrick M Affected pages, ETC ALL Content Revision/ updates... 1 Preface... 2 Technical
JTAG Applications. Product Life-Cycle Support. Software Debug. Integration & Test. Figure 1. Product Life Cycle Support
JTAG Applications While it is obvious that JTAG based testing can be used in the production phase of a product, new developments and applications of the IEEE-1149.1 standard have enabled the use of JTAG
In-System Programmability
In-System Programmability in MAX Devices September 2005, ver. 1.5 Application Note 95 Introduction Features & Benefits MAX devices are programmable logic devices (PLDs), based on the Altera Multiple Array
AN4128 Application note
Application note Demonstration board for Bluetooth module class 1 SBT2632C1A.AT2 Introduction This document describes the STEVAL-SPBT4ATV3 demonstration board (dongle) for the Bluetooth class 1 SPBT2632C1A.AT2
T-BOXN12R. First steps with T-BOXN12R. You can make it wireless. Date: 2004-07-16 Version 1.0
T-BOXN12R You can make it wireless First steps with T-BOXN12R Date: 2004-07-16 Version 1.0 Content 1. Purpose of this document... 3 2. T-BoxN12R overview... 4 3. First step... 5 3.1. Preparing your workshop
FLYPORT Wi-Fi 802.11G
FLYPORT Wi-Fi 802.11G System on module 802.11g WIFI - Infrastructure mode - softap mode - Ad hoc mode Microchip PIC 24F 16 bit processor Microchip MRF24WG0MA/MB - Native WiFi 802.11g transceiver - PCB
Security & Chip Card ICs SLE 44R35S / Mifare
Security & Chip Card ICs SLE 44R35S / Mifare Intelligent 1 Kbyte EEPROM with Interface for Contactless Transmission, Security Logic and Anticollision according to the MIFARE -System Short Product Info
The Proper Acquisition, Preservation, & Analysis of Computer Evidence: Guidelines & Best-Practices
The Proper Acquisition, Preservation, & Analysis of Computer Evidence: Guidelines & Best-Practices Introduction As organizations rely more heavily on technology-based methods of communication, many corporations
How to connect to a Class II router using a mobile-phone data cable specifically for Solwise & Safecom routers
USB to router s serial port How to connect to a Class II router using a mobile-phone data cable specifically for Solwise & Safecom routers by Neo at RouterTech.Org Introduction Routers based on the AR7RD/AR7WRD
Display Message on Notice Board using GSM
Advance in Electronic and Electric Engineering. ISSN 2231-1297, Volume 3, Number 7 (2013), pp. 827-832 Research India Publications http://www.ripublication.com/aeee.htm Display Message on Notice Board
SECTION G2: CABLE PROCESSOR MODULE MAINTENANCE
SECTION G2: CABLE PROCESSOR MODULE MAINTENANCE Cable Processor Module overview WARNING! When tipping the Cable Processor Module back, (after removing the toggle arm pin), use extreme caution not to drop
Key features: About this backplane:
Key features: Topology: Full Mesh VPX Backplane compliant to the VITA 46.0 core specification Backplane is supporting subsidiary specifications for protocols as: Serial Rapid IO (VITA 46.3), PCI Express
Module 2. Embedded Processors and Memory. Version 2 EE IIT, Kharagpur 1
Module 2 Embedded Processors and Memory Version 2 EE IIT, Kharagpur 1 Lesson 5 Memory-I Version 2 EE IIT, Kharagpur 2 Instructional Objectives After going through this lesson the student would Pre-Requisite
Adapters - Overview. Quick-Turn Solutions for IC Supply Issues
Adapters - Overview BGA to BGA Adapter BGA to PGA BGA to QFP BGA to BGA QFP to BGA SMT to DIP SMT to SMT PGA to PGA BGA to QFP Adapter with VR using FlexFrame Interconnect TSOP Adapter Packaged Die to
Version Date Author Description 1.00 19.07.2010 Jpo First version 1.01 21.12.2010 Jpo FET output descriptions made clearer 1.02 04.02.
+3 # Version Date Author Description 1.00 19.07.2010 Jpo First version 1.01 21.12.2010 Jpo FET output descriptions made clearer 1.02 04.02.2011 Jpo Reset button added 1. Purpose of this user manual...
IP4234CZ6. 1. Product profile. Single USB 2.0 ESD protection to IEC 61000-4-2 level 4. 1.1 General description. 1.2 Features. 1.
Rev. 01 16 April 2009 Product data sheet 1. Product profile 1.1 General description The is designed to protect Input/Output (I/O) USB 2.0 ports, that are sensitive to capacitive loads, from being damaged
DKWF121 WF121-A 802.11 B/G/N MODULE EVALUATION BOARD
DKWF121 WF121-A 802.11 B/G/N MODULE EVALUATION BOARD PRELIMINARY DATA SHEET Wednesday, 16 May 2012 Version 0.5 Copyright 2000-2012 Bluegiga Technologies All rights reserved. Bluegiga Technologies assumes
Case Study: Smart Phone Deleted Data Recovery
Case Study: Smart Phone Deleted Data Recovery Company profile McCann Investigations is a full service private investigations firm providing complete case solutions by employing cutting-edge computer forensics
Multilevel Socket Technologies
Multilevel Socket Technologies High Performance IC Sockets And Test Adapters Overview Company Overview Over 5,000 products High Performance Adapters and Sockets Many Custom Designs & Turn-Key Solutions
GSM Desktop phone DPH101. User manual v1.00
GSM Desktop phone DPH101 User manual v1.00 LEGAL NOTICE Copyright 2011 TELTONIKA Ltd. All rights reserved. Reproduction, transfer, distribution or storage of part or all of the contents in this document
The Motherboard Chapter #5
The Motherboard Chapter #5 Amy Hissom Key Terms Advanced Transfer Cache (ATC) A type of L2 cache contained within the Pentium processor housing that is embedded on the same core processor die as the CPU
FLEET MANAGEMENT & CAR SECURITY SYSTEM GPRS/GPS
FLEET MANAGEMENT & CAR SECURITY SYSTEM FOR PROVIDERS AND CUSTOMERS The Tracker Server Communication Program for data collection The Tracker Client Map Program intended for dispatching desks The GSM/GPRS
Soldering of EconoPACK TM, EconoPIM TM, EconoBRIDGE TM, EconoPACK +, EconoDUAL, EasyPACK and EasyPIM TM - Modules
Seite 1 Soldering of EconoPACK TM, EconoPIM TM, EconoBRIDGE TM, EconoPACK +, EconoDUAL, EasyPACK and EasyPIM TM - Modules Soldering with alloys containing lead (SnPb) is the standard connection technology
nanoetxexpress Specification Revision 1.0 Figure 1 nanoetxexpress board nanoetxexpress 26.02.2009 Specification Rev 1.
nanoetxexpress Specification Revision 1.0 Figure 1 nanoetxexpress board Specification Rev 1.0 Page 1 of 12 Contents Figure 1 nanoetxexpress board...1 1. Introduction...3 2. Module Configuration...4 3.
Accelerometer and Gyroscope Design Guidelines
Application Note Accelerometer and Gyroscope Design Guidelines PURPOSE AND SCOPE This document provides high-level placement and layout guidelines for InvenSense MotionTracking devices. Every sensor has
White Paper: Pervasive Power: Integrated Energy Storage for POL Delivery
Pervasive Power: Integrated Energy Storage for POL Delivery Pervasive Power Overview This paper introduces several new concepts for micro-power electronic system design. These concepts are based on the
Frequently Asked Questions for TFT Remote Controlled Monitors. First Rev 4/6/2005 SGMc Second Rev 5/7/2005 Third Rev 11/15/2005
Frequently Asked Questions for TFT Remote Controlled Monitors. First Rev 4/6/2005 SGMc Second Rev 5/7/2005 Third Rev 11/15/2005 1. What was the primary spark that started the fire under TFT to make remote
Application Note, V2.2.1, July 2003 AP24001. OCDS Level 1 JTAG Connector. 16-Bit & 32-Bit Microcontrollers. AI Microcontrollers. Never stop thinking.
Application Note, V2.2., July 2003 AP2400 OCDS Level JTAG Connector 6-Bit & 32-Bit Microcontrollers AI Microcontrollers Never stop thinking. OCDS Level JTAG Connector Revision History: 2003-07 V2.2. Previous
USER MANUAL V5.0 VT300
GPS Vehicle Tracker USER MANUAL V5.0 VT300 Updated on 26/12/2008 Contents 1 Product Overview 3 2 For Your Safety 3 3 VT300 Parameters 3 4 Getting Started 4 4.1 Hardware and Accessories 4 4.2 Light and
Assembly of LPCC Packages AN-0001
Assembly of LPCC Packages AN-0001 Surface Mount Assembly and Handling of ANADIGICS LPCC Packages 1.0 Overview ANADIGICS power amplifiers are typically packaged in a Leadless Plastic Chip Carrier (LPCC)
NAND Flash FAQ. Eureka Technology. apn5_87. NAND Flash FAQ
What is NAND Flash? What is the major difference between NAND Flash and other Memory? Structural differences between NAND Flash and NOR Flash What does NAND Flash controller do? How to send command to
LAN9514/LAN9514i. USB 2.0 Hub and 10/100 Ethernet Controller PRODUCT FEATURES PRODUCT PREVIEW. Highlights. Target Applications.
LAN9514/LAN9514i 2.0 Hub and 10/100 PRODUCT FEATURES Data Brief Highlights Four downstream ports, one upstream port Four integrated downstream 2.0 PHYs One integrated upstream 2.0 PHY Integrated 10/100
HomeSeer Technologies. HomeSeer Technologies LLC 35 Constitution Dr, Suite C Bedford NH, 03110 www.homeseer.com
HomeSeer Technologies HomeSeer Z-Troller Z-Wave Computer Interface Installation guide HomeSeer Technologies LLC 35 Constitution Dr, Suite C Bedford NH, 03110 www.homeseer.com Description Thank for your
Destroying Flash Memory-Based Storage Devices (draft v0.9)
Destroying Flash Memory-Based Storage Devices (draft v0.9) Dr. Steven Swanson Director, Non-volatile Systems Laboratory Department of Computer Science and Engineering University of California, San Diego
isppac-powr1220at8 I 2 C Hardware Verification Utility User s Guide
November 2005 Introduction Application Note AN6067 The isppac -POWR1220AT8 device from Lattice is a full-featured second-generation Power Manager chip. As part of its feature set, this device supports
White Paper. Recommendations for Installing Flash LEDs on Flex Circuits. By Shereen Lim. Abstract. What is a Flex Circuit?
Recommendations for Installing Flash LEDs on Circuits By Shereen Lim White Paper Abstract For the mobile market some PCB assemblies have been converted to flex circuit assemblies, in part because flex
C8051F020 Utilization in an Embedded Digital Design Project Course. Daren R. Wilcox Southern Polytechnic State University Marietta, Georgia
C8051F020 Utilization in an Embedded Digital Design Project Course Daren R. Wilcox Southern Polytechnic State University Marietta, Georgia Abstract In this paper, the utilization of the C8051F020 in an
Customer Service Note Lead Frame Package User Guidelines
Customer Service Note Lead Frame Package User Guidelines CSN30: Lead Frame Package User Guidelines Introduction Introduction When size constraints allow, the larger-pitched lead-frame-based package design
Home Security System Using Gsm Modem
RESEARCH ARTICLE OPEN ACCESS Home Security System Using Gsm Modem Mehek Potnis 1, Ayesha Chimnani 1, Vishal Chawla 1 Mr. Amit Hatekar 2 1. Undergraduate Students, Department of EXTC, Thadomal Shahani Engineering
FM4100 USER MANUAL V1.4
FM4100 USER MANUAL V1.4 Table of Contents ATTENTION!... 2 INSTRUCTIONS OF SAFETY... 3 LEGAL NOTICE... 4 Short description...5 1.1 About the document... 5 1.2 Acronyms... 5 1.3 Mounting guidelines... 5
Open Architecture Design for GPS Applications Yves Théroux, BAE Systems Canada
Open Architecture Design for GPS Applications Yves Théroux, BAE Systems Canada BIOGRAPHY Yves Théroux, a Project Engineer with BAE Systems Canada (BSC) has eight years of experience in the design, qualification,
- 35mA Standby, 60-100mA Speaking. - 30 pre-defined phrases with up to 1925 total characters.
Contents: 1) SPE030 speech synthesizer module 2) Programming adapter kit (pcb, 2 connectors, battery clip) Also required (for programming) : 4.5V battery pack AXE026 PICAXE download cable Specification:
Pololu DRV8835 Dual Motor Driver Shield for Arduino
Pololu DRV8835 Dual Motor Driver Shield for Arduino Pololu DRV8835 Dual Motor Driver Shield for Arduino, bottom view with dimensions. Overview This motor driver shield and its corresponding Arduino library
TAP CONNECT JTAG CABLE
TAP CONNECT JTAG Cable Application Notes TAP CONNECT JTAG CABLE ontap JTAG Test & Programming Cable Installation and Setup Instructions for Standard and Low Voltage Cable Rev. V Table of Contents About
User Guide. Memo S580. www.poshmobile.com
User Guide Memo S580 www.poshmobile.com Welcome to POSH S580 Memo Quick Guide S580 is designed with Android system, support dual Sim and dual stand-by. Except for the standard communication function, it
The following is a summary of the key features of the ARM Injector:
Intended Use The ARM Injector is an indispensable tool for engineers who work with JTAG enabled target systems based on an ARM processor core with Debug and EmbeddedICE capability. The ARM Injector provides
RC2200DK Demonstration Kit User Manual
Demonstration Kit User Manual Table of contents TABLE OF CONTENTS... 1 QUICK INTRODUCTION... 2 INTRODUCTION... 3 DEMONSTRATION BOARD... 4 POWER SUPPLY SECTION... 5 RS-232 INTERFACE... 6 CONNECTORS... 7
User Manual GSM Alarm System. www.deltasecurity.cn. All rights reserved by Delta Security Co., Ltd
User Manual GSM Alarm System All rights reserved by Delta Security Co., Ltd Dear Clients, Thank you for using our GSM Alarm System. We are committed to giving you the best home security available today
IC 1101 Basic Electronic Practice for Electronics and Information Engineering
7. INDUSTRIAL CENTRE TRAINING In the summer between Year 1 and Year 2, students will undergo Industrial Centre Training I in the Industrial Centre (IC). In the summer between Year 2 and Year 3, they will
Edition 2012-032 Published by Infineon Technologies AG 81726 Munich, Germany 2013 Infineon Technologies AG All Rights Reserved.
Recommendations for Printed Circuit Board Assembly of Infineon Laminate Packages Additional Information DS1 2012-03 Edition 2012-032 Published by Infineon Technologies AG 81726 Munich, Germany 2013 Infineon
Rework stations: Meeting the challenges of lead-free solders
Rework stations: Meeting the challenges of lead-free solders Market forces, particularly legislation against the use of lead in electronics, have driven electronics manufacturers towards lead-free solders
Application Note 58 Crystal Considerations with Dallas Real Time Clocks
www.dalsemi.com Application Note 58 Crystal Considerations with Dallas Real Time Clocks Dallas Semiconductor offers a variety of real time clocks (RTCs). The majority of these are available either as integrated
The Programming Interface
: In-System Programming Features Program any AVR MCU In-System Reprogram both data Flash and parameter EEPROM memories Eliminate sockets Simple -wire SPI programming interface Introduction In-System programming
Chapter 14. Printed Circuit Board
Chapter 14 Printed Circuit Board A printed circuit board, or PCB, is used to mechanically support and electrically connect electronic components using conductive pathways, or traces, etched from copper
EZmoto V2. Product description Rev. 6 10/01/2014. EZmoto V2 Product description Rev.6 10/01/2014
EZmoto V2 Product description Rev. 6 10/01/2014 1 Contents 1. Overview... 3 2. Hardware Interface Description... 3 2.1 Main features of the EZmoto... 3 2.2 Hardware block diagram... 4 2.3 Internal Hardware
Building a Basic Communication Network using XBee DigiMesh. Keywords: XBee, Networking, Zigbee, Digimesh, Mesh, Python, Smart Home
Building a Basic Communication Network using XBee DigiMesh Jennifer Byford April 5, 2013 Keywords: XBee, Networking, Zigbee, Digimesh, Mesh, Python, Smart Home Abstract: Using Digi International s in-house
Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation
Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation Nokia E70 Configuring connection settings Nokia E70 Configuring connection settings Legal Notice Copyright Nokia 2006. All
17 IMPLEMENTATION OF LEAD-FREE SOLDERING TECHNOLOGY. Eva Kotrčová České Vysoké Učení Technické Fakulta Elektrotechnická Katedra Elektrotechnologie
17 IMPLEMENTATION OF LEAD-FREE SOLDERING TECHNOLOGY Eva Kotrčová České Vysoké Učení Technické Fakulta Elektrotechnická Katedra Elektrotechnologie 1. Introduction Lead is the toxic heavy metal which is
The Boundary Scan Test (BST) technology
The Boundary Scan Test () technology J. M. Martins Ferreira FEUP / DEEC - Rua Dr. Roberto Frias 42-537 Porto - PORTUGAL Tel. 35 225 8 748 / Fax: 35 225 8 443 ([email protected] / http://www.fe.up.pt/~jmf) Objectives
SMD Terminal Blocks with Push-Buttons
SMD Terminal Blocks with Push-Buttons SMD Terminal Blocks Small is Big WAGO s new SMD Terminal Blocks provide push-button termination for conductors 0. 0.75 mm/awg 4 18 (060 Series) and 0.5 1.5 mm/awg
Introducing AVR Dragon
Introducing AVR Dragon ' Front Side Back Side With the AVR Dragon, Atmel has set a new standard for low cost development tools. AVR Dragon supports all programming modes for the Atmel AVR device family.
SMS based remote control system
EE 318 Electronics Design Project Report, EE Department, IIT Bombay, April 2006 SMS based remote control system Ashish Deswal ( 03007020 ) Shaleen Harlalka ( 03007015 ) Arjun Arikeri ( 03007032 ) Ashish
Chapter 11. Using MAX II User Flash Memory for Data Storage in Manufacturing Flow
Chapter 11. Using MAX II User Flash Memory for Data Storage in Manufacturing Flow MII51011-1.1 Introduction Small capacity, non-volatile memory is commonly used in storing manufacturing data (e.g., manufacturer
i.mx USB loader A white paper by Tristan Lelong
i.mx USB loader A white paper by Tristan Lelong Introduction This document aims to explain the serial downloader feature of i.mx SoCs on Linux (available across i.mx family starting with i.mx23). This
Series Six Plus Programmable Controller
Series Six Plus Programmable Controller Gl?K-0147B June 1989 Central Processor Unit 8-Slot Rack 1l-Slot Rack General Description The Central Processor Unit (CPU) for the Series Six Plus Programmable Logic
GPS & GSM BASED REAL-TIME VEHICLE TRACKING SYSTEM.
GPS & GSM BASED REAL-TIME VEHICLE TRACKING SYSTEM. Introduction: The Proposed design is cost-effective, reliable and has the function of accurate tracking. When large object or vehicles were spread out
GSM HOME SECURITY SYSTEM
Cell /Mobile phone home security system GSM HOME SECURITY SYSTEM Model : GSM-120 TABLE OF CONTENTS 1. FEATURES... 1 2. APPLICATION... 2 3. SPECIFICATIONS... 3 4. FRONT PANEL & LAYOUT DESCRIPTION...6 5.
Quectel M72 Development Board
Quectel M95GSM/GPRS Module Quad Band Module supporting 850/900/1800/1900 MHz. Supports GPRS Multi-slot Class 12 with max of 85.6 kbps( uplink & downlink) speeds. Fax support with specs of Group 3, Class
Trabajo 4.5 - Memorias flash
Memorias flash II-PEI 09/10 Trabajo 4.5 - Memorias flash Wojciech Ochalek This document explains the concept of flash memory and describes it s the most popular use. Moreover describes also Microdrive
