A paper Lee Tobin, Ahmed Shosha and Pavel Gladyshev wrote has just been accepted to the Digital Investigation journal, it details an efficient and time economical way of reverse engineering a piece of hardware (a CCTV system in this case study paper).
Reverse engineering a CCTV system, a case study.
Given a disk image of a CCTV system with a non-standard file system, how is the data interpreted? Work has been done in the past detailing the reverse engineering of proprietary file systems and on the process of recovering data from CCTV systems. However, if given a disk image without the CCTV system itself, or if under time constraints, the task becomes much more difficult. This paper explains a different approach to recovering the data and how to make sense of data on a CCTV disk. The method does not require extensive reverse engineering of the CCTV system, or even to have access to the CCTV system itself.
cctv, reverse engineering, proprietary file-systems, disk image analysis, investigation, eavesdrop
More on this when it’s published…
Update: I’ve added a link to the paper.