Secure Chip-Off Method with Acoustic-based Fault Diagnostics for IoT and Smart Grid Data Recovery

Yerassyl Yermekov, Leila Rzayeva, Abilkair Imanberdi, Aigerim Alibek, Korhan Kayisli, Ali Myrzatay, Gerald Feldman

Abstract


This article explores modern methods for extracting information from faulty mobile devices, hard disk drives (HDDs), and solid-state drives (SSDs) while considering the physical integrity of data storage components. In the digital era, recovering data from damaged devices is crucial for forensic investigations, corporate security, and information protection. The study examines existing data extraction techniques for mobile devices, including both software-based and hardware-based approaches such as JTAG, SPI, UFI Box, and the “Chip-off” method. It highlights the importance of low-level data access, as logical extraction methods often fail to recover deleted or hidden files. For HDDs, the paper classifies possible failures into logical and physical damage categories. It discusses data recovery mechanisms, ranging from diagnosing disk health and analyzing SMART attributes to utilizing specialized recovery tools and hardware techniques, such as replacing the magnetic head assembly (MHA) and reconstructing the file system. Additionally, the work incorporates an Environmental Sound Recognition (ESR) module to enable the automated detection of mechanical failures based on acoustic signatures. As the adoption of IoT devices with onboard storage accelerates, ensuring secure, reliable, and forensic-ready data recovery methods becomes increasingly important. The proposed chip-off method with acoustic diagnostics supports critical security and privacy needs in IoT ecosystems by enabling recovery and analysis of compromised or tampered edge devices. The research contributes to the advancement of forensic analysis and data recovery techniques, offering valuable insights for law enforcement agencies, private investigators, and cybersecurity professionals. This methodology not only enhances forensic capabilities but also supports data recovery within secure smart grid environments and IoT-based infrastructures, where device tampering and data breaches are critical concerns.


Keywords


Smart Grid Security, IoT Data Integrity, Forensic Readiness, AI Diagnostics, HDD, data recovery, chip-off, environmental sound recognition (ESR), acoustic diagnostics, physical damage, logical malfunction, SMART attributes, magnetic head assembly (HSA), s

Full Text:

PDF

References


References

M. Gül and E. Kugu, “A survey on anti-forensics techniques,” in Proc. International Artificial Intelligence and Data Processing Symposium (IDAP), 2017.

J.-P. Van Belle, “Anti-Forensics: A Practitioner Perspective,” International Journal of Cyber-Security and Digital Forensics, vol. 4, no. 2, pp. 390–403, 2015, doi: 10.17781/p001593.

ABC News, “San Bernardino shooters tried to destroy phones, hard drives, sources say,” ABC News. [Online]. Available: https://abcnews.go.com/US/san-bernardino-shooters-destroy-phones-hard-drives-sources/story?id=35570286 [Accessed: Mar. 27, 2025].

P. Cruickshank, “Discarded laptop yields revelations on network behind Brussels, Paris attacks,” CNN, Jan. 25, 2017. [Online]. Available: https://edition.cnn.com/2017/01/24/europe/brussels-laptop-revelations/index.html [Accessed: Mar. 27, 2025].

EaseUS, Data Recovery E-Book V1.5. [Online]. Available: http://www.easeus.com [Accessed: Mar. 27, 2025].

A. Silberschatz, P. B. Galvin, and G. Gagne, Operating System Concepts, 6th ed., Wiley, 2003, ch. Secondary Storage Structure.

A. S. Tanenbaum and H. Bos, Modern Operating Systems, 5th ed. Harlow: Pearson Education, 2022.

B. P. Battula, B. K. Rani, R. S. Prasad, and T. Sudha, “Techniques in computer forensics: A recovery perspective,” ResearchGate Journal, vol. 3, no. 2, May 2009. [Online]. Available: https://www.researchgate.net/publication/xxxxxx [Accessed: Mar. 27, 2025].

A. Verducci, “How to absolutely, positively destroy your data,” Popular Mechanics, Feb. 2007. [Online]. Available: http://www.popularmechanics.com/technology/howto/4212242.html [Accessed: Mar. 27, 2025].

R. Xu, X. Wang, and J. Wu, “Classification based hard disk drive failure prediction: Methodologies, performance evaluation and comparison,” in Proc. 2022 IEEE 18th Int. Conf. Automation Science and Engineering (CASE), Aug. 2022, pp. 189–195, doi: 10.1109/case49997.2022.9926720.

TopTenReviews, “Top Ten Reviews,” Feb. 26, 2025. [Online]. Available: https://www.toptenreviews.com/money/business [Accessed: Mar. 27, 2025].

A. Mesaros, T. Heittola, and T. Virtanen, “Metrics for polyphonic sound event detection,” in Proc. 2016 IEEE Int. Conf. Acoustics, Speech and Signal Processing (ICASSP), 2016, pp. 351–355.

D. Barchiesi, D. Giannoulis, D. Stowell, and M. D. Plumbley, “Acoustic scene classification: Classifying environments from the sounds they produce,” IEEE Signal Processing Magazine, vol. 32, no. 3, pp. 16–34, 2015.

K. J. Piczak, “ESC: Dataset for environmental sound classification,” in Proc. 23rd ACM Int. Conf. Multimedia, 2015, pp. 1015–1018.

J. Salamon and J. P. Bello, “Deep convolutional neural networks and data augmentation for environmental sound classification,” IEEE Signal Processing Letters, vol. 24, no. 3, pp. 279–283, 2017.

K. J. Piczak, “Environmental sound classification with convolutional neural networks,” in Proc. 2015 IEEE 25th Int. Workshop Machine Learning for Signal Processing (MLSP), 2015, pp. 1–6.

S. Schneider, A. Baevski, R. Collobert, M. Auli, and A. Mohamed, “wav2vec 2.0: A framework for self-supervised learning of speech representations,” in Proc. 19th Annual Conf. Int. Speech Communication Association (Interspeech), 2021, pp. 3652–3656.

S. Hershey, S. Chaudhuri, D. Ellis, J. Gemmeke, A. Jansen, R. Moore, M. Plakal, D. Platt, R. Saurous, B. Seybold, M. Slaney, R. Weiss, and K. Wilson, “CNN architectures for large-scale audio classification,” in Proc. 2017 IEEE Int. Conf. Acoustics, Speech and Signal Processing (ICASSP), 2017, pp. 131–135.

Y. Su, Y. Yang, X. Liu, Q. Zhong, J. Liu, and Z. Liu, “Environmental sound classification with large-scale weakly labeled data,” in Proc. Detection and Classification of Acoustic Scenes and Events Workshop (DCASE2019), 2019, pp. 123–127.

Q. Kong, Y. Cao, T. Iqbal, Y. Wang, W. Wang, and M. Plumbley, “PANNs: Large-scale pretrained audio neural networks for audio pattern recognition,” IEEE/ACM Trans. Audio, Speech, and Language Processing, vol. 28, pp. 2880–2894, 2020.

F. Munir, J. Li, and Z. Yu, “Towards generalized environmental sound classification,” IEEE Access, vol. 9, pp. 72053–72065, 2021.

K. J. Piczak, “ESC-50 Dataset,” GitHub Repository. [Online]. Available: https://github.com/karolpiczak/ESC-50 [Accessed: Mar. 27, 2025].

L. Rzayeva, A. Imanberdi, I. Opirskyy, O. Harasymchuk, and G. Abitova, “Analysis of technical features of data encryption implementation on SD cards in the Android system,” Scientific Journal of Astana IT University, pp. 157–171, 2025.

S. A. Shaikh, S. R. Biradar, and S. S. Manvi, “Cyber physical system security for smart grid: A comprehensive survey,” International Journal of Smart Grid, vol. 6, no. 1, pp. 20–32, Mar. 2022.

K. Sharma and M. Bhatia, “Machine learning-based intrusion detection systems for smart grids: A review,” International Journal of Smart Grid, vol. 5, no. 4, pp. 134–140, Dec. 2021.

M. Alshahrani, M. Younis, and M. A. AlZain, “Cybersecurity challenges in smart grids and their mitigation using AI,” International Journal of Smart Grid, vol. 4, no. 3, pp. 85–94, Sep. 2020.




DOI (PDF): https://doi.org/10.20508/ijsmartgrid.v9i3.502.g392

Refbacks

  • There are currently no refbacks.


www.ijsmartgrid.com; www.ijsmartgrid.org

ilhcol@gmail.com; icolak@gazi.edu.tr

Online ISSN: 2602-439X

Publisher: ilhami COLAK

https://www.ilhamicolak.org/english.htm

Cited in SCOPUS Q1, SCIMAGO, Google Scholar and CrossRef

 

 

LinkedIn Logo Follow us on LinkedIn

Google Scholar Statistics of ijSmartGrid

https://scholar.google.com/citations?user=qP9ZUKAAAAAJ&hl=tr&authuser=1 

 

SCIMAGO information:

https://www.scimagojr.com/journalsearch.php?q=21101271431&tip=sid&clean=0#google_vignette

Q2, h-index:13