{"id":1297,"date":"2014-08-06T11:12:06","date_gmt":"2014-08-06T11:12:06","guid":{"rendered":"http:\/\/digitalfire.ucd.ie\/?p=1297"},"modified":"2014-10-13T07:25:11","modified_gmt":"2014-10-13T07:25:11","slug":"reverse-engineering-hardware","status":"publish","type":"post","link":"https:\/\/dfire.ucd.ie\/?p=1297","title":{"rendered":"Reverse engineering a CCTV system, a case study"},"content":{"rendered":"<p>A <a href=\"http:\/\/www.sciencedirect.com\/science\/article\/pii\/S1742287614000917\">paper Lee Tobin, Ahmed Shosha and Pavel Gladyshev wrote<\/a>\u00a0has just been accepted to the\u00a0<a href=\"http:\/\/www.sciencedirect.com\/science\/journal\/17422876\">Digital Investigation<\/a>\u00a0journal, it details an efficient and time economical way of reverse engineering a piece of hardware (a CCTV system in this case study paper).<\/p>\n<p><a href=\"http:\/\/digitalfire.ucd.ie\/wp-content\/uploads\/2014\/08\/surveillance-155982_640.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone  wp-image-1306\" src=\"http:\/\/digitalfire.ucd.ie\/wp-content\/uploads\/2014\/08\/surveillance-155982_640-300x261.png\" alt=\"surveillance-155982_640\" width=\"174\" height=\"151\" srcset=\"https:\/\/dfire.ucd.ie\/wp-content\/uploads\/2014\/08\/surveillance-155982_640-300x261.png 300w, https:\/\/dfire.ucd.ie\/wp-content\/uploads\/2014\/08\/surveillance-155982_640.png 640w\" sizes=\"(max-width: 174px) 100vw, 174px\" \/><\/a><\/p>\n<p>Title:<\/p>\n<blockquote><p>Reverse engineering a CCTV system, a case study.<\/p><\/blockquote>\n<p>Abstract:<\/p>\n<blockquote><p>Given a disk image of a CCTV system with a non-standard file system, how\u00a0is the data interpreted? Work has been done in the past detailing the reverse\u00a0engineering of proprietary file systems and on the process of recovering data\u00a0from CCTV systems. However, if given a disk image without the CCTV\u00a0system itself, or if under time constraints, the task becomes much more\u00a0difficult. This paper explains a different approach to recovering the data and\u00a0how to make sense of data on a CCTV disk. The method does not require\u00a0extensive reverse engineering of the CCTV system, or even to have access to\u00a0the CCTV system itself.<\/p><\/blockquote>\n<p>Keywords:<\/p>\n<blockquote><p>cctv, reverse engineering, proprietary file-systems, disk image\u00a0analysis, investigation, eavesdrop<\/p><\/blockquote>\n<p>More on this when it&#8217;s published&#8230;<\/p>\n<p>Update: I&#8217;ve added a\u00a0link to the <a href=\"http:\/\/www.sciencedirect.com\/science\/article\/pii\/S1742287614000917\">paper<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A paper Lee Tobin, Ahmed Shosha and Pavel Gladyshev wrote\u00a0has just been accepted to the\u00a0Digital Investigation\u00a0journal, it details an efficient and time economical way of reverse engineering a piece of hardware (a CCTV system in this case study paper). Title: Reverse engineering a CCTV system, a case study. Abstract: Given a disk image of a [&hellip;]<\/p>\n","protected":false},"author":10,"featured_media":1318,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[60],"tags":[],"class_list":["post-1297","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-hardware"],"_links":{"self":[{"href":"https:\/\/dfire.ucd.ie\/index.php?rest_route=\/wp\/v2\/posts\/1297"}],"collection":[{"href":"https:\/\/dfire.ucd.ie\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dfire.ucd.ie\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dfire.ucd.ie\/index.php?rest_route=\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/dfire.ucd.ie\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1297"}],"version-history":[{"count":11,"href":"https:\/\/dfire.ucd.ie\/index.php?rest_route=\/wp\/v2\/posts\/1297\/revisions"}],"predecessor-version":[{"id":1326,"href":"https:\/\/dfire.ucd.ie\/index.php?rest_route=\/wp\/v2\/posts\/1297\/revisions\/1326"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/dfire.ucd.ie\/index.php?rest_route=\/wp\/v2\/media\/1318"}],"wp:attachment":[{"href":"https:\/\/dfire.ucd.ie\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1297"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dfire.ucd.ie\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1297"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dfire.ucd.ie\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1297"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}