Vis enkel innførsel

dc.contributor.authorStoykova, Radina
dc.contributor.authorNordvik, Rune
dc.contributor.authorAhmed, Munnazzar
dc.contributor.authorFranke, Katrin
dc.contributor.authorAxelsson, Stefan
dc.contributor.authorToolan, Fergus
dc.date.accessioned2023-03-06T15:16:54Z
dc.date.available2023-03-06T15:16:54Z
dc.date.created2022-09-20T12:40:03Z
dc.date.issued2022
dc.identifier.citationComputer Law and Security Review. 2022, 46 .en_US
dc.identifier.issn0267-3649
dc.identifier.urihttps://hdl.handle.net/11250/3056179
dc.description.abstractReverse engineering of file systems is indispensable for tool testing, accurate evidence acquisition, and correct interpretation of data structures by law enforcement in criminal investigations. This position paper examines emerging techno-legal challenges from the practice of reverse engineering for law enforcement purposes. We demonstrate that this new context creates uncertainties about the legality of tools and methods used for evidence acquisition and the compliance of law enforcement with obligations to protect intellectual property and confidential information. Further identified are gaps between legal provisions and practice related to disclosure and peer-review of sensitive digital forensic methodology, trade secrets in investigations, and governmental vulnerability disclosure. It is demonstrated that reverse engineering of file systems is insufficiently addressed by legislators, which results in a lack of file system interpretation and validation information for law enforcement and their dependence on tools. Outlined are recommendations for further developments of digital forensic regulation.en_US
dc.language.isoengen_US
dc.publisherElsevieren_US
dc.rightsNavngivelse 4.0 Internasjonal*
dc.rights.urihttp://creativecommons.org/licenses/by/4.0/deed.no*
dc.titleLegal and technical questions of file system reverse engineeringen_US
dc.title.alternativeLegal and technical questions of file system reverse engineeringen_US
dc.typePeer revieweden_US
dc.typeJournal articleen_US
dc.description.versionpublishedVersionen_US
dc.source.pagenumber22en_US
dc.source.volume46en_US
dc.source.journalComputer Law and Security Reviewen_US
dc.identifier.doi10.1016/j.clsr.2022.105725
dc.identifier.cristin2053477
cristin.ispublishedtrue
cristin.fulltextoriginal
cristin.qualitycode1


Tilhørende fil(er)

Thumbnail

Denne innførselen finnes i følgende samling(er)

Vis enkel innførsel

Navngivelse 4.0 Internasjonal
Med mindre annet er angitt, så er denne innførselen lisensiert som Navngivelse 4.0 Internasjonal