• Chip chop — smashing the mobile phone secure chip for fun and digital forensics 

      Alendal, Gunnar; Axelsson, Stefan; Dyrkolbotn, Geir Olav (Peer reviewed; Journal article, 2021)
      Performing mobile phone acquisition today requires breaking—often hardware assisted—security. In recent years, Embedded Secure Element (eSE) hardware has been introduced in mobile phones, with a view towards increasing the ...
    • Coffee forensics — Reconstructing data in IoT devices running Contiki OS 

      Sandvik, Jens-Petter; Franke, Katrin; Abie, Habtamu; Årnes, Andrè (Peer reviewed; Journal article, 2021)
      The ability to examine evidence and reconstruct files from novel IoT operating systems, such as Contiki with its Coffee File System, is becoming vital in digital forensic investigations. Two main challenges for an investigator ...
    • An Empirical Study of the NTFS Cluster Allocation Behavior Over Time 

      Karresand, Nils Martin Mikael; Dyrkolbotn, Geir Olav; Axelsson, Stefan (Peer reviewed; Journal article, 2020)
      The amount of data to be handled in digital forensic investigations is continuously increasing, while the tools and processes used are not developed accordingly. This especially affects the digital forensic subfield of ...
    • Evidence in the fog – Triage in fog computing systems 

      Sandvik, Jens-Petter; Franke, Katrin; Abie, Habtamu; Årnes, Andre (Journal article; Peer reviewed, 2023)
      Fog computing promises improved service scalability and lower latency for IoT systems. The concept closes the gap between full computing capabilities at the network's edge and cloud systems' centrally located processing ...
    • It is about time–Do exFAT implementations handle timestamps correctly? 

      Nordvik, Rune; Axelsson, Stefan (Peer reviewed; Journal article, 2022)
      Digital forensic investigations require that file metadata are interpreted correctly. In this paper we focus on the timestamps of the exFAT file system. How these timestamps are written may depend on the implementation of ...
    • Quantifying data volatility for IoT forensics with examples from Contiki OS 

      Sandvik, Jens-Petter; Franke, Katrin; Abie, Habtamu; Årnes, Andrè (Journal article; Peer reviewed, 2022)
      Forensic investigations are often conducted under limited resource availability such as time, equipment, and people. As data acquisition is resource-demanding already, a higher emphasis needs to be put on prioritizing the ...
    • Reliability assessment of digital forensic investigations in the Norwegian police 

      Stoykova, Radina; Andersen, Stig; Franke, Katrin; Axelsson, Stefan (Journal article; Peer reviewed, 2022)
    • Reliability validation for file system interpretation 

      Nordvik, Rune; Stoykova, Radina Raychova; Franke, Katrin; Axelsson, Stefan; Toolan, Fergus (Peer reviewed; Journal article, 2021)
      This paper examines current best practices for Digital Forensic (DF) tool and method validation in the context of file system interpretation for digital evidence. In order to meet the legal and scientific requirements in ...
    • Timestamp prefix carving for filesystem metadata extraction 

      Porter, Kyle; Nordvik, Rune; Toolan, Fergus; Axelsson, Stefan (Peer reviewed; Journal article, 2021)
      While file carving is a popular and effective method for extracting file content from unallocated space in a forensic image, it can be time consuming to carve for the wide variety of possible file signatures. Furthermore, ...