Skip to main content

Data Recovery Methods - Chip-Off and JTAG


There are two main techniques when dealing with mobile phone data recovery and flash recoveries. By interrogating the NAND memory chip, both of these techniques give data recovery engineers access to a low-level image of the data, although they are both very different. Mobile phones, flash storage and solid-state-drives all rely on memory chips for storing information in contrast to hard disk drives, which use rotating platters and read/write heads.

When it comes to hard disk drives they all tend to use a common approach to storing data, meaning that data recovery tools can be generic. Flash devices on the other hand vary a lot more having a wealth of different data formats, file structures, algorithms, memory types and configurations, data extractors are often 'device specific'. This means that the only way to gain a bit for bit copy of the raw data is to interrogate the memory chips directly, effectively bypassing the operating system. This is where chip-off and JTAG technology comes into play.

The first method is the chip-off approach. This technique requires de-soldering the memory chip from the circuitry. In order to remove the chip from the device without causing any damage it requires precision skill under a microscope as making any tiny mistakes risks losing all the data permanently. After the chip is removed it can be read with data extractors. NAND chips are usually much easier to read than other types of chip and are normally what SD cards and iPhones use. This is due to the memory architecture and pin configuration being standardised. The pins are on the outside meaning there is no need to rebuild the connectors. Other common types of chip such as the BGA have multiple connectors on the underside which are directly soldered to the motherboard with thousands of different configurations so are much more difficult to remove.

The second method is JTAG which doesn't require removal of the chip. A data recovery engineer can sometimes access the memory through the JTAG ports. This is a much more lengthy process and does not damage the media. This means it can be kept in a working state which is sometimes a critical requirement in forensic investigations. A downside of this method is that it is not always as successful and can be a riskier option.

Both methods will produce a low-level image which is then 'decoded' and the user's data can be rebuilt. Both chip-off and JTAG technology is growing and becoming much more reliable meaning that the success rates of data recovery from mobile phones is almost as good as that of hard disk drives.

Comments

Popular posts from this blog

The Ever-Present Need for Java Application Development Services

In spite of the fact that it is a typical misguided judgment in the realm of programming that the Java programming dialect will be short-lived.It isn't the situation in reality. Most trust that with the rising notoriety of programming dialects, for example, Ruby and Python, Java can never again fill the void that it once did. The proceeded with dependence on, and utilization of Java, as the main decision programming dialect for the making of money related applications demonstrates something else. The substantial reliance on Java by best association in the managing an account and monetary area can be ascribed to its security and unwavering quality. Notwithstanding those in the managing an account and money related segment, various best players in the online business industry, (for example, eBay and Amazon) additionally rely upon the Java programming dialect for the smooth working of their site back-end forms. Nature Of Mobile Application Development All things considered, the region...

The Real Reason Why Small Businesses Can't Get Approved for a Loan

Gee golly, not once more. Indeed, truth is stranger than fiction, I'm not going to go there... in any event not for now. There's no lack of reasons and reasons why private companies can't get endorsed for business credits. It never neglects to stun me the inclusion this theme gets particularly when the national economy goes into retreat or when major political races are in question. Truly, I concur that independent company development and achievement is the monetary spine of the US and furthermore, that over 60% of the US workforce are utilized by private companies. In any case, where I get off the gathering believe is with regards to the absence of financing for an independent company with a business credit. In this article, how about we investigate the REAL REASON that private company don't meet all requirements for credits and reality may even shock you. It's Deeper Than Statistics I adore numbers and far better, I cherish perusing fiscal summaries and the notes....

Dell Latitude 3570 Review - What Businesses Need to Know About This Quality Laptop and Configuration

If your organization is after a quality business laptop that offers more than the run-of-the-mill features, a good place to start your search is with the Dell Latitude 3570. It comes in a variety of configurations and there's a good chance that you will find exactly what you need without going over your budget. Dell has always done an impressive job at making reliable PCs available at affordable prices. What does this one have to offer? In addition to an excellent battery life, it has a pleasant design, a few upgrade options (memory and storage), nice input devices, Intel Core processor options, and more. There are also a lot of features that allow you to get the most out of your hardware. The Dell Client Command Suite, for instance, comes with multiple tools that allow automated and flexible system / BIOS configurations. The Suite comes factory installed, along with Power Manager, which gives you easy customization of energy and battery power options. Dell laptops such as the 3570...