Vis enkel innførsel

dc.contributor.authorSandvik, Jens-Petter
dc.contributor.authorFranke, Katrin
dc.contributor.authorAbie, Habtamu
dc.contributor.authorÅrnes, Andrè
dc.date.accessioned2023-03-03T15:26:02Z
dc.date.available2023-03-03T15:26:02Z
dc.date.created2022-04-10T13:23:33Z
dc.date.issued2022
dc.identifier.issn2666-2825
dc.identifier.urihttps://hdl.handle.net/11250/3055855
dc.description.abstractForensic investigations are often conducted under limited resource availability such as time, equipment, and people. As data acquisition is resource-demanding already, a higher emphasis needs to be put on prioritizing the investigative steps to optimize the probability of collecting the relevant evidence. Data volatility measures how quickly data disappears from a system and is an essential part of assessing the likelihood of collecting the most valuable evidence. An investigator can use a model for the volatility to estimate the probability of the existence of evidence. This work motivates and details a model for data volatility and exemplifies it for the Coffee File System used in Contiki OS, an operating system for IoT devices. We conducted experiments to test how well the model corresponds to the collected simulated data and cross-validate the model with observations from file system operations. The results revealed that an approximated model based on the known workings of the file system underestimated the volatility. While there are many sources describing volatility qualitatively, there is little research on quantitative volatility, and this paper is a stepping stone to understanding a quantitative approach to evidence volatility.
dc.language.isoengen_US
dc.rightsNavngivelse-Ikkekommersiell-DelPåSammeVilkår 4.0 Internasjonal*
dc.rights.urihttp://creativecommons.org/licenses/by-nc-sa/4.0/deed.no*
dc.titleQuantifying data volatility for IoT forensics with examples from Contiki OSen_US
dc.title.alternativeQuantifying data volatility for IoT forensics with examples from Contiki OSen_US
dc.typeJournal articleen_US
dc.typePeer revieweden_US
dc.description.versionpublishedVersion
cristin.ispublishedtrue
cristin.fulltextoriginal
cristin.qualitycode1
dc.identifier.doi10.1016/j.fsidi.2022.301343
dc.identifier.cristin2016461
dc.source.journalForensic Science International: Digital Investigationen_US
dc.source.volume40en_US


Tilhørende fil(er)

Thumbnail

Denne innførselen finnes i følgende samling(er)

Vis enkel innførsel

Navngivelse-Ikkekommersiell-DelPåSammeVilkår 4.0 Internasjonal
Med mindre annet er angitt, så er denne innførselen lisensiert som Navngivelse-Ikkekommersiell-DelPåSammeVilkår 4.0 Internasjonal