U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

Embedded Systems Analysis (From Handbook of Computer Crime Investigation: Forensic Tools and Technology, P 315-359, 2002, Eoghan Casey, ed, -- See NCJ-195111)

NCJ Number
195121
Author(s)
Ronald van der Knijff
Date Published
2002
Length
45 pages
Annotation
This chapter provides an overview of how embedded systems work as well as a description of the methods and techniques that may be used to access and analyze the data contained within them.
Abstract
The author of this chapter points out that today’s average person makes thorough use of embedded systems just in the course of everyday life. Which also means that a great deal of information may be contained about any one particular person within these many embedded systems. For example, a home alarm system can contain information concerning when someone is at home or when the house is empty. This chapter explains to the reader how embedded systems work and what types of information may be contained within them. the chapter gives information on the definition and operation of an embedded system that is preprogrammed for a specific task and built in or 'embedded' into a device that controls all or part of its function. The operation shows communication between the central processing unit (CPU), the memory and the I/O (input/output) components flows via the address bus, the data bus, and the control lines. Particular methods and techniques for retrieving and analyzing this information are offered to guide computer forensic experts in their investigations. Figures, references