The researchers conducted a comprehensive forensic analysis of the Bosch Nyon eBike board computers, including both the first-generation model released in 2014 and the second-generation model released in 2021.
For the Nyon 2014, the researchers were able to gain root access to the device's operating system by exploiting a design flaw in the update process. This allowed them to acquire comprehensive data from the device, including personal user information, detailed cycling activity data with timestamps and GPS coordinates, as well as information about connected Wi-Fi networks and Bluetooth devices. The researchers also demonstrated the possibility of data tampering on the Nyon 2014.
For the more recent Nyon 2021 model, the researchers were unable to gain software-based access due to enhanced security measures. They then resorted to a hardware-based chip-off procedure to extract the data, which was encrypted but could be decrypted using a key found on an unencrypted partition. The data extracted from the Nyon 2021 was similar to the first-generation model, but included additional forensically relevant information such as logs of nearby Bluetooth devices.
The researchers highlight the forensic significance of the data extracted from both Nyon models, which could be used to determine a suspect's whereabouts and assess the plausibility of their driving behavior. The study contributes to the evolving field of digital forensics by addressing the challenges of analyzing special-purpose mobile devices and underscoring their importance in investigative processes.
翻译成其他语言
从原文生成
arxiv.org
更深入的查询