Theory and Practice of Flash Memory Mobile Forensics PDF
Theory and Practice of Flash Memory Mobile Forensics PDF
Abstract
This paper is an introduction to flash memory forensics with a special focus on completeness of evidence acquired from
mobile phones. Moving through academic papers and industrial documents will be introduced the particular nature of
non-volatile memories present in nowadays mobile phones; how they really work and which challenges they pose to
forensic investigators. Then will be presented an advanced test in which some brand new flash memories have been
used to hide data in man-made bad blocks: the aim is to verify if forensic software tools are able to acquire data from
such blocks, and to evaluate the possibility to hide data at analysts eyes.
Keywords
Mobile forensic, OneNAND, NAND, NOR, bad blocks, wear levelling, ECC, FTL
Fig. 1: Old mobile equipment layout with optional NAND module (Kwon, 2009)
During its evolution mobile phone passed from the PDA phase up to nowadays smart phones that lessen differences
with personal computers (ibid). Storage capability also increased dramatically ranging from few Kilobits at very
beginning up to several Gigabits of current mobile phones, increasing the space where data can be stored or hided, and
adding complexity to work of law enforcement officers (Al-Zarouni, 2006): this paper aims to contribute in the shifting
of the flash forensic field from the knowable to known Cynefin domain (Kurtz and Snowden, 2003).
On nowadays mobile equipment there are generally two memories: one for the operating system (the NOR flash) and
the other (the NAND flash) for user data (Chang and Kuo, 2004). The extent of this paper is limited to data stored in
NAND flashes: volatile RAM and SIM card analysis will be kept aside.
52 | P a g e
Proceedings of the 7th Australian Digital Forensics Conference
Fig. 2 Basic design of memory chip (left) and flash memory links (right) (OKelly, 2007)
Code model
There are two techniques to execute program code on flash devices (Numonyx, 2008a): Store and Download (SnD),
requiring external RAM, and eXecute in Place (XiP) - faster than SnD but requiring random access. NOR uses XiP
while NAND uses SnD.
Fig. 3 Store and Download Code Model (left) and XiP Code Model (right) (Numonyx, 2008a)
One-way programming
Flash devices are only able to program a value from 1 to 0 but not from 0 to 1, so when data is updated, it is written to a
new location and the old location is marked as invalid (Numonyx, 2008a). The invalid location is then erased - usually
during a background process - before being reused.
53 | P a g e
Proceedings of the 7th Australian Digital Forensics Conference
LUNs are then split in blocks. Each block can vary in size, where the most common is 128KB. In the majority of
NAND flash devices each block is made of 64 pages of 2KB each. A page is divided in two regions: the data area, and
the spare area used for memory management purposes (more later). Pages are divided in sector units (or chunks) of 512
byte to emulate the popular sector size (ibid). The block is the smallest erasable unit while the page is the smallest
programmable unit.
At first, a page was 528 bytes long as the original intent of the NAND Flash was to replace magnetic hard disk drives,
so it was required a page to be big enough to store one sector (512 bytes) of data with extra 16 Bytes for management
purpose (Inoue and Wong, 2004). Then, as capacity storage of flash increased, so did the default page size to comply
with FAT file system. On 1Gb flash memory, there are 128 MB of addressable space: for hard drives sized up to 128
MB, the default cluster size in FAT system is 2KB with 4 sectors each, as in the flash memory except for the extra bytes
(64B) (Microsoft, 2009)
Fig. 7 Assignment of the spare area in the Internal Memory NAND on OneNAND (source: Samsung)
Fig. 8 Spare Area Assignment in the Internal Memory NAND on OneNAND (source: Samsung)
55 | P a g e
Proceedings of the 7th Australian Digital Forensics Conference
The are two storage methods for spare areas: adjacent to data area or separate from it (Micron, 2006a). Looking at most
of the Samsung datasheets it seems their mainly used model is the second one.
Fig. 10 Standard size of sector block of devices under 256 Mb and over 512 Mb density
(source: Samsung)
The main mission an FTL carries out is to support all tasks required for managing data transparently to host filesystem:
i.e. a FAT filesystem will demand to the FTL all activities required to store and retrieve data properly to/from the
NAND flash devices. (BPMicrosystems, 2008, Intel, 1998, Morris, 2007)
FTL main tasks are:
Mapping the storage area in virtual small sectors
Managing data on the flash so they appears to write in place
Housekeeping: as flash memories are subject to wear, it is required a software that will level the use of
memory areas.
57 | P a g e
Proceedings of the 7th Australian Digital Forensics Conference
Note: in the example above, are used only two blocks but in the real world reclaiming could involve more blocks
To avoid excessive usury of same area despite others, a process called Wear Levelling manages blocks so that they are
wisely used: there is a static wear levelling and a dynamic wear levelling, both attempts to extend lifetime of flash
(Numonyx, 2008c, Jones, 2008). Wear levelling procedure can be embedded in the firmware of memory flash or left
under care of host file system (Numonyx, 2008b, Numonyx, 2008c, Jones, 2008, JI et al., 2009).
Data in the invalid blocks or dead pages can store information of interest for the forensic analyst and should be acquired
before Reclaim take place: analysts are asked not to alter the state of the evidence, but as Wear Levelling and Reclaim
are underground processes this requirement can be hard to achieve and difficult to manage. In future works will be
examined the effect of Reclaim in embedded devices: outcomes will be reported.
Fig. 13 The state of blocks before and after Reclaim (Intel, 2006)
58 | P a g e
Proceedings of the 7th Australian Digital Forensics Conference
Fig. 14 Skip Bad Block (left) vs. Reserve Block Area replacement strategy (right) (BPMicrosystems, 2008)
Fig. 15 Block encroachment (left) and Block number duplication (right) (ibid)
Fig. 16 Partitioning for Skip Bad Blocks (left) and Reserve Block Area (right) (White, 2008)
59 | P a g e
Proceedings of the 7th Australian Digital Forensics Conference
Y K Z
Units of evidences (A/E) (O/A) (O/E)
(tool quality) (analyst skill) (overall
Existing Acquired Observed quality of
(E) (A) (O) analysis)
Tab. 1 Quantitative relation between evidences, analysts skill, and quality of tools
Thus, a good tool with a good analyst gives an overall good analysis (case 1), a mediocre tool (case 2) or a mediocre
analyst (case 3) will limit the overall value of examination. Of course this is just a quantitative and not qualitative
measurement: the importance of each evidence is set aside.
Fig. 20 Quantitative relation between evidences, analysts skill, and quality of tools
61 | P a g e
Proceedings of the 7th Australian Digital Forensics Conference
Fig. 21 Logical vs. Physical acquisition for flash memory on the hosting device (not extracted)
Proprietary cables with USB interface are used for both techniques, while JTAG or FBUS interfaces (where present) are
mainly used for physical acquisition; it is also possible get data via infrared and Bluetooth interface using OBEX
protocol, but this is a method that poses some limitation and is generally less used (McCarthy, 2005). Some Nokia
phones are now explored: registry addresses are blurred for confidentiality.
3
There is still an open debate on hard disk bad block management. Some interesting links are:
http://tech.groups.Yahoo.
com/group/ForensicAnalysis/message/82,
62 | P a g e
Proceedings of the 7th Australian Digital Forensics Conference
HOW THE CHOICE OF THE FLASH MEMORY AND MOBILE PHONE WAS DRIVEN
AND THE TEAM WAS SET
Simply, the choice of mobile phone and flash memory to use was made by statistics. Nokia is the best seller in the
mobile phone market and Samsung is the leader in the NAND flash market
Fig. 23 Worldwide Mobile Terminal Sales to End Users in Fig. 24 4Q08 NAND Flash brand sales break down
2Q09 (Gartner, 2009) (DRAMeXchange, 2009)
Then the choice to use an OneNAND was made for its advanced characteristics and the Nokia model was chosen on the
basis of a block of ten OneNAND available at moment. Numonyx has licensing agreement with Samsung to produce
OneNAND, so it was decided to call Numonyx for support and the folks there were happy to help. Then, was asked
support to an advanced Nokia service repair centre that was willing to help, too: in few days a virtual team with high
skilled people was s and ready to start. As this market is so hard-hitting, a low profile participation has been adopted.
64 | P a g e
Proceedings of the 7th Australian Digital Forensics Conference
Fig. 25 Layout of a Nokia N70 (left), and OMAP and NAND flash relation on Nokia N70 (right)
4
1024 Mb are equal to 128 MB.
65 | P a g e
Proceedings of the 7th Australian Digital Forensics Conference
Fig. 26 From left to right (clockwise): Nokia 6650F layout; the internal hardware, stencil pointing at the OneNAND
flash; schematic showing connections between CPU and OneNAND, and generic OneNAND pins layout.
How data on NAND are accessed via USB or JTAG on a Nokia 6120c
To perform a memory dump of the flash memory via physical acquisition on a Nokia 6120c, either with a USB cable or
a FBUS/JTAG interface, it is required processor involvement (in this case it is a RapidoYawe5). In the tables below are
presented schematics of connections between two devices (memory and processor). This phone will replace the Nokia
6650F in our tests, as explained later: the layout is very similar. Larger images are available in appendices.
Fig. 27 Adapted layout of access to NAND memory via USB (left) or JTAG (right)
5
The chip with HSDPA logic (YAWE) stacked on the RAP3G processor unit (RAPIDO) forms the RapidoYawe CPU
66 | P a g e
Proceedings of the 7th Australian Digital Forensics Conference
On a new flash memory (identical to the one on the testing Nokia mobile phone) were stored some data in four good
blocks; such blocks were then marked as bad, by opportunely manipulating the relative spare area. Next, the original
flash device embedded in the phone was replaced with the one with four bad blocks and the phone refurbished with
original software: now, there is a working phone with data hided in bad blocks. The detailed procedure is in the
appendices.
Test Phase 2. Feeding forensic tools with our phones: results and feedbacks.
At beginning, when decision on which type of phone to use was made, it was considered an advantage to use a Nokia
phone, due to its popularity. Not too much attention was paid on the specific model we were using: all in all there was
an OneNAND inside and this was considered an advantage for the research. As the testing memory was a raw
NAND, we were optimist forensic software would be able to acquire bad blocks because there were not embedded FTL
layer could interfere with the imaging process.
Then, we used some of the best forensic software to test the acquisition of bad blocks from our phones, and this is what
we got (in alphabetical order).
CelleBrite UFED.
This solution was not able to perform the physical acquisition.
Logicube CellDEK
We were not able to perform any acquisition with CellDEK because the required module, even
already ordered, was not available at time of examination.
Micro Systemation XACT
This solution was not able to perform the physical acquisition.
Paraben Device Seizure 3.1
This solution was not able to perform the physical acquisition.
At this stage, was decided to speak directly with technical support of these companies and tell them the problem we
faced. An email was sent either to companies aforementioned and to others that have been tested their products with
NIST (as reported in the CFTT web page http://www.cftt.nist.gov/mobile_devices.htm). The test of the emails is
reported in appendices. So far, these are the replies we got:
CelleBrite, Micro Systemation and Paraben confirmed the inability of their solution to get physical acquisition of our
phone (even they can do with others); Guidance Software, Logicube, and Susteen did not reply.
For what we tested and understood, with these solutions and the phone we used, if sensitive data are hided in bad blocks
they will go undetected. Furthermore, with this software, good blocks with wrong ECC (i.e. due to power failure) could
hide valid data to forensic analyst.
67 | P a g e
Proceedings of the 7th Australian Digital Forensics Conference
Quantitative relation between existing evidences, quality of tools, and analysts skill
Optional test cases are treated as Core test cases IF the tool provides the capability defined by the test
case. Unfortunately, all mobile forensic tools do not have the ability to perform a physical acquisition
at this time. The CFTT formal testing methodology validates that tools perform as they are designed
not as one might wish them to.
Physical Acquisition is not an unreachable limit, but some tools are designed only for logical acquisitions.
The specification and test plan state that if the tool provides the functionality optional cases and
assertions are tested as if they are core. By following the CFTT formal testing methodology it allows
all tools that have the ability to acquire data from mobile devices to receive a fair validation.
The aim of this paper is not to argue with NIST, but for what is written in the second sentence above, test on tools
designed either for logical and physical acquisition, like Cellebrite UFED 1.1.05, should report physical acquisition in
the core features: but by reading Test Results for Mobile Device Acquisition Tool: Cellebrite UFED 1.1.05 it is possible
to see that physical acquisitions is reported in the CFTIMO05 section, as an optional feature.
In the email sent to NIST, author suggests to shift this feature from optional to core section, because a document
released from so regarded source, should not allow a workaround of an important point like this.
68 | P a g e
Proceedings of the 7th Australian Digital Forensics Conference
A confidential answer
We asked to forensic software houses cited above, why it is so difficult to perform a physical acquisition of non-volatile
memory6 embedded in phones made by different manufacturers but using the same raw flash memory and the same I/O
interface. This is the answer got from a source asked not to be disclosed:
IP protection: many phone manufacturers need to protect their know-how, so they encrypt some area of
the memory and use proprietary bootloading solutions. This means that a forensic software house
should be able to decrypt, without altering, the content of the evidence and also it need do this for any
mobile phone on the market: a very onerous task that in the lack of a collaboration between chip
manufacturer and software developers is too uneconomical. When a flasher is used to change IMEI or
unlock a phone it exactly circumvents this protection (for this, the source states further that in future
mobile phones, JTAG interface will be disabled to prevent illegal activities).
Market alliance: for reasons seen above, forensic solution providers could not have interest to release
something harmful for phone manufacturers because otherwise the latter will not be anymore
cooperative with them.
The ONFI project
The resolve the problem of disorder in the flash market, some manufacturers decided to setup a consortium to define
some standards: it is the Open NAND Flash Interface (ONFI) consortium. The ONFI is an industry Workgroup made
up of more than 80 companies that build, design-in, or enable NAND Flash memory, dedicated to simplifying NAND
Flash integration into consumer electronic products, computing platforms, and any other application that requires solid
state mass storage. We define standardized component-level interface specifications as well as connector and module
form factor specifications for NAND Flash(http://onfi.org).
FUTURE WORKS
We plan to do some feature works especially to test the effect of reclaim in a controlled environment (like a mobile
phone left in standby), and capture (by sniffing) and analysis of data travelling on the bus to/from mcu and NAND.
Results will be reported to community.
CONCLUSION
In this paper has been attempted to offer a wide overview of forensic analysis of non-volatile flash memory.
Starting from academic and industrial literature, we ended with a practical and documented test in which some data
were hided in memory blocks (then marked as bad) to verify if it was possible to foul the acquisition process of
nowadays forensic solutions. It was demonstrated that hiding data in such blocks is achievable: none of the software
tested was able to get a physical acquisition of the flash memory.
Furthermore a suggestion to considerer physical acquisition a core feature was sent to the NIST to make them more
aware of the problem of data hiding in flash memories and the need to grant the completeness of evidence.
COPYRIGHT
Salvatore Fiorillo 2009. The author assigns Edith Cowan University a non-exclusive license to use this document for
personal use provided that the article is used in full and this copyright statement is reproduced. Such documents may be
published on the World Wide Web, CD-ROM, in printed form, and on mirror sites on the World Wide Web. The author
also grants a non-exclusive license to ECU to publish this document in full in the Conference Proceedings. Any other
usage is prohibited without the express permission of the author
6
We should not forget that on OneNAND we have both volatile memory (DDR) and non-volatile memory (NAND).
69 | P a g e
Proceedings of the 7th Australian Digital Forensics Conference
From: [contact-name]@msab.com
Hi Salvatore,
I have checked regarding your question and the particular phone, Nokia 6120c is supported in our product .XRY
(logical acquisition) but not yet in XACT (physical acquisition). We do not have a problem with physical extraction of
the OneNAND flash memory, but that this phone is not supported in XACT.
Hope this information helps!
Kind Regards,
Maria
70 | P a g e
Proceedings of the 7th Australian Digital Forensics Conference
From: [contact-name]@paraben.com
Salvatore,
Some of what you are asking below is not exactly clear so I will do my best to get you some base information.
With the scenario you are describing I dont believe any software will be able to read that memory. We can get a
physical image of memory off of a Nokia phone, but the issue is that with what you are wanting to read the only way to
do that low level of access to OneNAND memory for a Nokia device is to physically remove the chip and read the chip
itself.
--Amber
Dear all,
I am writing you to suggest a revision of GSM Mobile Device and Associated Media Tool Specification and Test
Plan, section CFT-IMO-04.
Please, let me explain how I come to such request.
I am preparing a forensic paper on non-volatile memory (flash) embedded in mobile phone: the paper should be
presented at 7th forensic conference in Perth. My aims were to (a) make a basic point in flash forensic field and (b)
verify the possibility to retrieve data from fake bad blocks.
I used a Nokia mobile phone and OneNAND flash memory. In the latter were stored data in four good blocks and
subsequently such blocks were marked as bad (I did it by disassembling, programming and then reassembling the chip
from the PCB).
To retrieve hided data, were used some major forensic tools like CelleBrite UFED, Logicube CellDEK, Micro
Systemation XACT and Paraben Device Seizure 3.1. I was not able to get data from bad blocks because none of
software used were able to acquire a physical image of the testing memory.
A request of verification was send to software houses: CelleBrite and Micro Systemation confirmed the inability of
their solution to get physical acquisition of that phone (even they can do with many others); Paraben will reply after
the 13th, Guidance Software, Logicube, and Susteen did not reply.
In the paper is stated that with these solutions and the phone used, if sensitive data were hided in bad blocks they will
go undetected. Now with phones equipped with even more increasing storage area, IMHO, this could led to a problem:
how many data we can store in , say, 30% of 1 Gb of space? Should a forensic officer care of them?
So even I am conscious that it is hard to achieve and (at least in short term) not a feasible solution for all mobile
phones, I suggest to move Physical Acquisition section (9.2.3) from Optional features to Core features. To say more, I
have had further conversations with some lawyers, asking them if my outcomes could be used to invalidate (more or
less) the value of evidence acquired. The answer was positive: not because evidence found on the mobile phone could
be waived but because there is not assurance of completeness of acquisition. It is possible dont get an evidence that
could discharge a person (so we have an innocent condemned) or dont get an evidence could charge a person (so we
have a guilty set free). I suppose the second case have much more chances to happen.
With Regards
Salvatore Fiorillo
NOTE: The answers got from NIST/CFTT, as required, are kept confidential but a synthesis of their content is reported
in the section dedicated to NIST (Physical acquisition as option: what says the NIST).
71 | P a g e
Proceedings of the 7th Australian Digital Forensics Conference
Samsung
Samsung, with Unistore II handles bad blocks with the Block Management Layer (part of XSR) and a bad block
mapping table : this scheme remaps a bad block to one of the reserved blocks so that the data contained in a bad block is
not lost and new data writes on a bad block is avoided (Samsung, 2006b).
The eXtended Sector Remapper (XSR) adopts RBA and locates bad block info in the Reservoir area: that is, a zone
located in the highest address region of the NAND flash (Samsung, 2008). Any block not presenting the FFFFh value in
the 1st sector of the 1st and/or 2nd page in the spare area is to be considered a bad block
Once bad blocks have been located, Samsung, like others (BPMicrosystems, 2008) , recommends that the bad blocks be
no longer accessed.
Toshiba
In Toshiba flash memory, the standard factory location for the information of the bad block byte is stored to byte 0x205
(byte 517 or the 518th byte) of a NAND page. Usually, if this byte is 00h, then the block is bad since the making of the
device (factory default), if the byte is F0h then the block is gone bad during device lifecycle. Any block that is not all
FFh (all 1s) in byte 517 (starting from byte 0) of the 1st page of a block is a bad block. Toshiba NAND TSOP devices
can also use of a bad block table held in the first block of the NAND Flash Block 0. Toshiba recommends that the bad
blocks no longer be accessed (Inoue and Wong, 2004).
Micron
Micron flash devices identify bad blocks by setting 1st byte of 1st and 2nd page to a value not 0xFF. Many different ECC
implementations are available: to determine the level of ECC protection necessary, Micron policy is to refer to data
sheet and requirements of the end system using the device (Micron, 2006b).
Numonyx
Numonyx flash memory uses the Hardware Adaptation Layer (HAL) software to manage Bad Blocks that develop
during the lifetime of the NAND Flash device. Any block where the 6th Byte/ 1st Word in the spare area of the 1st or
2nd page (if the 1st page is Bad) does not contain FFh is a Bad Block. ST HAL can use either Skip Block Method or
Reserve Block Method. For ST NAND Flash devices, the Reserved Area size is equal to 2% If a block becomes bad
during the NAND Flash lifetime, the Bad Block Management software re-maps the Bad Block, and copies the data it
contains to the block that will replace it (Numonyx, 2008e).
The Bad Block Table is created by reading all the spare areas in the NAND Flash memory and saving the table in a safe
block (generally block 0) so that on rebooting the flash memory, the table is easy found in a known location. The blocks
72 | P a g e
Proceedings of the 7th Australian Digital Forensics Conference
contained in the Bad Block Table are not addressable: if the Flash Translation Layer addresses one of the Bad Blocks,
then the Bad Block Management software redirects it to a good block (ibid)
73 | P a g e
Proceedings of the 7th Australian Digital Forensics Conference
74 | P a g e
Proceedings of the 7th Australian Digital Forensics Conference
75 | P a g e
Proceedings of the 7th Australian Digital Forensics Conference
NOR NAND
Access to The data can be accessed at random like The NAND chips divide the storage
SRAM.
data into blocks, which are divided into pages again.
The operations on the flash can be:
Each page is divided into regular data and out-
Read routine: Read the contents of the of-band data. The out-of-band data is used for
flash. storing metadata such as ECC (Error-Correction
Code) data and bad block information.
Erase routine: Erase is the process of
making all the bits on a flash 1. Erase on The NAND flash like the NOR flash has three
the NOR chips happens in terms of blocks basic operations: read, erase, and write.
(referred to as erase regions). However, unlike NOR which can access data
randomly, the NAND reads and writes are done
Write routine: Write is the process of in terms of pages whereas erases happen in
converting a 1 to 0 on the flash. terms of blocks
Once a bit is made 0, it cannot be written
into until the block is erased, which sets all
the bits in a block to 1
Interface to the board These are connected like the normal There are multiple ways of connecting the
SRAM device to the processor address and NAND flash to the CPU varying across vendors.
data bus.
Raw NAND access is done by connecting the
data and command lines to the usually 8 IO lines
on the flash chip.
Execution of code Code can be executed directly from NOR If code is in NAND flash it needs to be copied to
because it is directly connected to the memory for execution.
address/data bus.
Performance NOR flash is characterized by slow erase, NAND flash is characterized by fast erase, fast
slow write, and fast read write, and fast read.
Bad blocks NOR flash chips are not expected to have These flashes have been designed as basically
bad blocks because they have been media storage devices at lower prices, so expect
designed to hold system data that they have bad blocks. Normally these flash
chips come with the bad sectors marked in them.
Also NAND flash sectors suffer more the
problem of bit flipping where a bit gets flipped
when being written to; this is detected by error
correcting algorithms called ECC/ EDC, which
are done either in hardware or in software
Usage These are basically used for code These are used mainly as storage devices for
execution. Boot loaders can exist on the embedded systems such as set-top boxes and
NOR flashes because the code from these MP3 players. If you plan to use a board with
flashes can be directly executed. These only NAND, you may have to put in an
flashes are pretty expensive and they additional boot ROM. They offer high densities
provide lesser memory densities and have a at lower prices and have a longer life span
relatively shorter life span (around 100,000 (around 10 to the power of 6 erase cycles)
erase cycles).
77 | P a g e
Proceedings of the 7th Australian Digital Forensics Conference
78 | P a g e
Proceedings of the 7th Australian Digital Forensics Conference
79 | P a g e
Proceedings of the 7th Australian Digital Forensics Conference
80 | P a g e
Proceedings of the 7th Australian Digital Forensics Conference
REFERENCES
AL-ZAROUNI, M. 2006. Mobile Handset Forensic Evidence - a challenge for Law Enforcement. [Online].
Available: http://viewer.zoho.com/docs/zwcUl [Accessed].
BPMICROSYSTEMS. 2008. Understanding NAND Flash Factory Programming [Online]. Available:
http://www.bpmicro.com/whitepapers/BPM_NAND_White_Paper_1008_docmetrics.pdf
[Accessed].
BREEUWSMA, M., JONGH, M. D., KLAVER, C., KNIJFF, R. V. D. & ROELOFFS, M. 2007. Forensic Data
Recovery from Flash Memory. Small Scale Digital Device Forensics Journal, 1.
CARRIER, B. 2005. File System Forensic Analysis, Addison-Wesley.
CASEY, E. 2004. Digital Evidence and Computer Crime: Forensic Science, Computers and the Internet,
Elsevier Academic Press.
CHANG, L.-P. & KUO, T.-W. 2004. A Real-Time Garbage Collection Mechanism for Flash-Memory Storage
Systems in Embedded Systems [Online]. Available:
http://www.cis.nctu.edu.tw/~lpchang/papers/RTCSA02-rdy.pdf [Accessed].
DAVID. 2009. Hide Data in Bad Blocks [Online]. Available: http://blog.crowdway.com/2009/04/22/hide-
data-in-bad-blocks/ [Accessed].
DRAMEXCHANGE. 2009. The 2009 Outlook of Taiwanese DRAM vendors [Online]. Available:
http://www.dramexchange.com/weeklyresearch/Post/2/1945.html [Accessed].
ELNEC. 2009. Understanding NAND Flash Factory Pre-Programming Schemes [Online]. Available:
http://www.elnec.com/sw/an_elnec_nand_schemes.pdf [Accessed].
GAL, E. & TOLEDO, S. 2005. Algorithms and data structures for flash memories. ACM Comput. Surv., 37, 138-
163.
GARTNER. 2009. Gartner Says Worldwide Mobile Phone Sales Declined 6 Per Cent and Smartphones Grew 27
Per Cent in Second Quarter of 2009 [Online]. Available:
http://www.gartner.com/it/page.jsp?id=1126812 [Accessed].
GUPTA, M. R., HOESCHELE, M. D. & ROGERS, M. K. 2006. Hidden Disk Areas: HPA and DCO.
International Journal of Digital Evidence 5.
HENDRIKX, J. 1998. Space efficiency [Online]. Available: http://www.xs4all.nl/~hjohn/SFS/spaceeff.htm
[Accessed].
HUFFMAN, A. 2006. A Standard Interface for NAND Flash [Online]. Available: http://onfi.org/wp-
content/uploads/2009/02/idf_s06_mems005_revd_taiwan.pdf [Accessed].
INOUE, A. & WONG, D. 2004. NAND Flash Applications Design Guide [Online]. Available:
http://www.toshiba.com/taec/components/Generic/nand_design/nand_design_guide.pdf
[Accessed].
INTEL. 1998. Understanding the Flash Translation Layer (FTL) Specification [Online]. Available:
http://www.scribd.com/doc/7168824/Understanding-Flash-Translation-Layer [Accessed].
INTEL. 2006. Flash File Systems Overview [Online]. Available: http://www.eet-
china.com/ARTICLES/2006NOV/PDF/Intel_WP_Flash_File_Systems_Overview.pdf
[Accessed].
JANSEN, W. & AYERS, R. 2007. NIST Special Publication 800-101. Guidelines on Cell Phone Forensics
[Online]. Available: http://csrc.nist.gov/publications/nistpubs/800-101/SP800-101.pdf
[Accessed].
JI, Y. L., CHANG, C. C., YEN, C. N. & SHONE, F. 2009. Method of wear leveling for non-volatile memory and
apparatus using the same. United States patent application.
81 | P a g e
Proceedings of the 7th Australian Digital Forensics Conference
82 | P a g e
Proceedings of the 7th Australian Digital Forensics Conference
83 | P a g e
Proceedings of the 7th Australian Digital Forensics Conference
WHITE, B. 2008. Factory Preprogramming Solutions for NAND Flash Devices [Online]. Available:
http://www.bpmmicro.com/pdf/FMS2008-WhiteT1BSlides.pdf?utm_source=flashstream-
site&utm_medium=footer-link&utm_campaign=nand-slides [Accessed].
WILLASSEN, S. Y. 2003. Forensics and the GSM mobile telephone system. International Journal of Digital
Evidence, 2
COPYRIGHT
Salvatore Fiorillio (2009). The author/s assign the Security Research Centre (SECAU) & Edith Cowan
University a non-exclusive license to use this document for personal use provided that the article is used in full
and this copyright statement is reproduced. The authors also grant a non-exclusive license to SECAU & ECU to
publish this document in full in the Conference Proceedings. Such documents may be published on the World
Wide Web, CD-ROM, in printed form, and on mirror sites on the World Wide Web. Any other usage is
prohibited without the express permission of the authors.
84 | P a g e