hh.sePublications
Change search
Link to record
Permanent link

Direct link
Axelsson, Stefan
Publications (10 of 11) Show all publications
Karresand, M., Dyrkolbotn, G. O. & Axelsson, S. (2020). An Empirical Study of the NTFS Cluster Allocation Behavior Over Time. Forensic Science International: Digital Investigation, 33
Open this publication in new window or tab >>An Empirical Study of the NTFS Cluster Allocation Behavior Over Time
2020 (English)In: Forensic Science International: Digital Investigation, ISSN 2666-2817, Vol. 33Article in journal (Refereed) Published
Abstract [en]

© 2020 The Author(s)The amount of data to be handled in digital forensic investigations is continuously increasing, while the tools and processes used are not developed accordingly. This especially affects the digital forensic sub-field of file carving. The use of the structuring of stored data induced by the allocation algorithm to increase the efficiency of the forensic process has been independently suggested by Casey and us. Building on that idea we have set up an experiment to study the allocation algorithm of NTFS and its behavior over time from different points of view. This includes if the allocation algorithm behaves the same regardless of Windows version or size of the hard drive, its adherence to the best fit allocation strategy and the distribution of the allocation activity over the available (logical) storage space. Our results show that space is not a factor, but there are differences in the allocation behavior between Windows 7 and Windows 10. The results also show that the allocation strategy favors filling in holes in the already written area instead of claiming the unused space at the end of a partition and that the area with the highest allocation activity is slowly progressing from approximately 10 GiB into a partition towards the end as the disk is filling up.

Place, publisher, year, edition, pages
Elsevier Ltd, 2020
Keywords
Allocation algorithm, Cluster allocation pattern, Digital forensics, File carving, NTFS
National Category
Computer Systems
Identifiers
urn:nbn:se:hh:diva-44660 (URN)10.1016/j.fsidi.2020.301008 (DOI)000582272700007 ()2-s2.0-85106664524 (Scopus ID)
Available from: 2021-06-11 Created: 2021-06-11 Last updated: 2025-10-01Bibliographically approved
Karresand, M., Axelsson, S. & Dyrkolbotn, G. O. (2020). Disk Cluster Allocation Behavior in Windows and NTFS. Mobile Networks and Applications, 5(1), 248-258
Open this publication in new window or tab >>Disk Cluster Allocation Behavior in Windows and NTFS
2020 (English)In: Mobile Networks and Applications, ISSN 1383-469X, E-ISSN 1572-8153, Vol. 5, no 1, p. 248-258Article in journal (Refereed) Published
Abstract [en]

The allocation algorithm of a file system has a huge impact on almost all aspects of digital forensics, because it determines where data is placed on storage media. Yet there is only basic information available on the allocation algorithm of the currently most widely spread file system; NTFS. We have therefore studied the NTFS allocation algorithm and its behavior empirically. To do that we used two virtual machines running Windows 7 and 10 on NTFS formatted fixed size virtual hard disks, the first being 64 GiB and the latter 1 TiB in size. Files of different sizes were written to disk using two writing strategies and the $Bitmap files were manipulated to emulate file system fragmentation. Our results show that files written as one large block are allocated areas of decreasing size when the files are fragmented. The decrease in size is seen not only within files, but also between them. Hence a file having smaller fragments than another file is written after the file having larger fragments. We also found that a file written as a stream gets the opposite allocation behavior, i. e. its fragments are increasing in size as the file is written. The first allocated unit of a stream written file is always very small and hence easy to identify. The results of the experiment are of importance to the digital forensics field and will help improve the efficiency of for example file carving and timestamp verification. © 2019, The Author(s).

Place, publisher, year, edition, pages
Springer, 2020
Keywords
Allocation algorithm, Digital forensics, File carving, NTFS, Boron compounds, Digital storage, Electronic crime countermeasures, File organization, Titanium compounds, Bitmap files, Different sizes, File systems, Large blocks, Storage media, Computer forensics
National Category
Computer Systems Computer Sciences
Identifiers
urn:nbn:se:hh:diva-41539 (URN)10.1007/s11036-019-01441-1 (DOI)000513451700026 ()2-s2.0-85077062891 (Scopus ID)
Available from: 2020-02-03 Created: 2020-02-03 Last updated: 2025-10-01Bibliographically approved
Nordvik, R., Porter, K., Toolan, F., Axelsson, S. & Franke, K. (2020). Generic Metadata Time Carving. Paper presented at 20th Annual DFRWS USA Conference, Virtual, 20-24 July, 2020.. Forensic Science International: Digital Investigation, 33(S), Article ID 301005.
Open this publication in new window or tab >>Generic Metadata Time Carving
Show others...
2020 (English)In: Forensic Science International: Digital Investigation, ISSN 2666-2817, Vol. 33, no S, article id 301005Article in journal (Refereed) Published
Abstract [en]

Recovery of files can be a challenging task in file system investigations, and most carving techniques are based on file signatures or semantics within the file. However, these carving techniques often only recover the files, but not the metadata associated with the file. In this paper, we propose a novel, generic approach for carving metadata by searching for equal and co-located timestamps. The rationale is that there are some common metadata for files and directories within each file system. Our generic time carver provides potential timestamp locations for repeated timestamps in each metadata structure, identifying potential metadata for files. A semantic parser then filters the results with respect to the specific file system type. In our experiments, extraction of MFT entries in NTFS and inodes in Ext4 had near perfect precision for metadata entries with multiple equivalent timestamps, and for such metadata structures we obtained perfect recall for NTFS. For known file systems, we use the information found within identified metadata to recover files, and by recovering files and their associated metadata we increase the evidential value of recovered files. © 2020 The Author(s)

Place, publisher, year, edition, pages
Oxford: Elsevier, 2020
Keywords
Carving, Digital forensics, File system, Metadata
National Category
Computer Systems
Identifiers
urn:nbn:se:hh:diva-46076 (URN)10.1016/j.fsidi.2020.301005 (DOI)000582272700004 ()2-s2.0-85106585484 (Scopus ID)
Conference
20th Annual DFRWS USA Conference, Virtual, 20-24 July, 2020.
Available from: 2021-12-15 Created: 2021-12-15 Last updated: 2025-10-01Bibliographically approved
Karresand, M., Warnqvist, Å., Lindahl, D., Axelsson, S. & Dyrkolbotn, G. O. (2019). Creating a Map of User Data in NTFS to Improve File Carving. In: Gilbert Peterson & Sujeet Shenoi (Ed.), Gilbert Peterson & Sujeet Shenoi (Ed.), Advances in Digital Forensics XV: 15th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 28–29, 2019,Revised Selected Papers. Paper presented at 15th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 28–29, 2019 (pp. 133-158). Cham: Springer
Open this publication in new window or tab >>Creating a Map of User Data in NTFS to Improve File Carving
Show others...
2019 (English)In: Advances in Digital Forensics XV: 15th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 28–29, 2019,Revised Selected Papers / [ed] Gilbert Peterson & Sujeet Shenoi, Cham: Springer, 2019, p. 133-158Conference paper, Published paper (Refereed)
Abstract [en]

Digital forensics, and espesially, file carving are burdened by the large amounts of data that need to be processed. Attempts to solve this problem include efficient carving algorithms, parallel processing in the cloud and data reduction by filtering uninteresting files. This research addresses the problem by searching for data wher it is more likely to be found. This is accomplished by creating a probability map for finding unique data at various logical block addressing positions in storage media. SHA-1 hashes of 512B sectors are used to represent the data. The results, which are based on a collection of 30 NTFS partitions from computers runnign Microsoft Windows 7 and later versions, reveal that the mean probability of finding unique hash values at different logical block addressing positions vary between 12% and 41% in an NTFS partition. The probability map can be used by forensic analyst to prioritize relevant areas in storage media without the need for a working filesystem. It can also be used to increase the efficienty of hash-based carving by dinamically changing the random sampling frequency. The approach contributes to digital forensic processes by enabling them to focus on interesting regions in storage media, increasing the probability of obtaining relevant results faster. © IFIP International Federation for Information Processing 2019

Place, publisher, year, edition, pages
Cham: Springer, 2019
Series
IFIP Advances in Information and Communication Technology, ISSN 1868-4238, E-ISSN 1868-422X ; 569
Keywords
File carving, hash-based carving, partition content map, NTFS
National Category
Other Computer and Information Science
Identifiers
urn:nbn:se:hh:diva-41111 (URN)10.1007/978-3-030-28752-8_8 (DOI)2-s2.0-85071431317 (Scopus ID)978-3-030-28752-8 (ISBN)978-3-030-28751-1 (ISBN)
Conference
15th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 28–29, 2019
Available from: 2019-12-04 Created: 2019-12-04 Last updated: 2025-10-01Bibliographically approved
Gray, S. & Axelsson, S. (2019). Digital Forensic Atomic Force Microscopy of Semiconductor Memory Arrays. In: Gilbert Peterson & Sujeet Shenoi (Ed.), Advances in Digital Forensics XV: 15th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 28–29, 2019, Revised Selected Papers. Paper presented at 15th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 28–29, 2019 (pp. 219-237). Cham: Springer
Open this publication in new window or tab >>Digital Forensic Atomic Force Microscopy of Semiconductor Memory Arrays
2019 (English)In: Advances in Digital Forensics XV: 15th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 28–29, 2019, Revised Selected Papers, Cham: Springer, 2019, p. 219-237Conference paper, Published paper (Refereed)
Abstract [en]

Atomic force microscopy is an analytical technique that provides very high spatial resolution with independent measurements of surface topography and electrical properties. This chapter assesses the potential for atomic force microscopy to read data stored as local charges in the cells of memory chips, with an emphasis on simple sample preparation (“delidding”) and imaging of the topsides of chip structures, thereby avoiding complex and destructive techniques such as backside etching and polishing. Atomic force microscopy measurements of a vintage EPROM chip demonstrate that imaging is possible even when sample cleanliness, stability and topographical roughness are decidedly sub-optimal. As feature sizes slip below the resolution limits of optical microscopy, atomic force microscopy offers a promising route for functional characterization of semiconductor memory structures in RAM chips, microprocessors and cryptographic hardware. © IFIP International Federation for Information Processing 2019. Published by Springer Nature Switzerland AG 2019

Place, publisher, year, edition, pages
Cham: Springer, 2019
Series
IFIP Advances in Information and Communication Technology, ISSN 1868-4238, E-ISSN 1868-422X ; 569
Keywords
Atomic force microscopy, memory chip delidding, surface imaging
National Category
Other Computer and Information Science
Identifiers
urn:nbn:se:hh:diva-41118 (URN)10.1007/978-3-030-28752-8_12 (DOI)000662854900012 ()2-s2.0-85071508585 (Scopus ID)978-3-030-28752-8 (ISBN)978-3-030-28751-1 (ISBN)
Conference
15th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 28–29, 2019
Available from: 2019-12-04 Created: 2019-12-04 Last updated: 2025-10-01Bibliographically approved
Alendal, G., Axelsson, S. & Dyrkolbotn, G. O. (2019). Exploiting Vendor-Defined Messages in the USB Power Delivery Protocol. In: Peterson, Gilbert & Shenoi Sujeet (Ed.), Gilbert Peterson & Sujeet Shenoi (Ed.), Advances in Digital Forensics XV: 15th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 28–29, 2019, Revised Selected Papers. Paper presented at 15th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 28–29, 2019 (pp. 101-118). Cham: Springer
Open this publication in new window or tab >>Exploiting Vendor-Defined Messages in the USB Power Delivery Protocol
2019 (English)In: Advances in Digital Forensics XV: 15th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 28–29, 2019, Revised Selected Papers / [ed] Gilbert Peterson & Sujeet Shenoi, Cham: Springer, 2019, p. 101-118Conference paper, Published paper (Refereed)
Abstract [en]

The USB Power Delivery protocol enables USB-connected devices to negotiate power delivery and exchange data over a single connection such as a USB Type-C cable. The protocol incorporates standard commands; however, it also enables vendors to add non-standard commands called vendor-defined messages. These messages are similar to the vendor-specific commands in the SCSI protocol, which enable vendors to specify undocumented commands to implement functionality that meets their needs. Such commands can be employed to enable firmware updates, memory dumps and even backdoors.

This chapter analyzes vendor-defined message support in devices that employ the USB Power Delivery protocol, the ultimate goal being to identify messages that could be leveraged in digital forensic investigations to acquire data stored in the devices.

© IFIP International Federation for Information Processing 2019

Place, publisher, year, edition, pages
Cham: Springer, 2019
Series
IFIP Advances in Information and Communication Technology, ISSN 1868-4238, E-ISSN 1868-422X ; 569
Keywords
digital forensics
National Category
Other Computer and Information Science
Identifiers
urn:nbn:se:hh:diva-41120 (URN)10.1007/978-3-030-28752-8_6 (DOI)2-s2.0-85071507105 (Scopus ID)978-3-030-28751-1 (ISBN)978-3-030-28752-8 (ISBN)
Conference
15th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 28–29, 2019
Available from: 2019-12-04 Created: 2019-12-04 Last updated: 2025-10-01Bibliographically approved
Nordvik, R., Georges, H., Toolan, F. & Axelsson, S. (2019). Reverse engineering of ReFS. Digital Investigation. The International Journal of Digital Forensics and Incident Response, 30, 127-147
Open this publication in new window or tab >>Reverse engineering of ReFS
2019 (English)In: Digital Investigation. The International Journal of Digital Forensics and Incident Response, ISSN 1742-2876, E-ISSN 1873-202X, Vol. 30, p. 127-147Article in journal (Refereed) Published
Abstract [en]

File system forensics is an important part of Digital Forensics. Investigators of storage media have traditionally focused on the most commonly used file systems such as NTFS, FAT, ExFAT, Ext2-4, HFS+, APFS, etc. NTFS is the current file system used by Windows for the system volume, but this may change in the future. In this paper we will show the structure of the Resilient File System (ReFS), which has been available since Windows Server 2012 and Windows 8. The main purpose of ReFS is to be used on storage spaces in server systems, but it can also be used in Windows 8 or newer. Although ReFS is not the current standard file system in Windows, while users have the option to create ReFS file systems, digital forensic investigators need to investigate the file systems identified on a seized media. Further, we will focus on remnants of non-allocated metadata structures or attributes. This may allow metadata carving, which means searching for specific attributes that are not allocated. Attributes found can then be used for file recovery. ReFS uses superblocks and checkpoints in addition to a VBR, which is different from other Windows file systems. If the partition is reformatted with another file system, the backup superblocks can be used for partition recovery. Further, it is possible to search for checkpoints in order to recover both metadata and content. Another concept not seen for Windows file systems, is the sharing of blocks. When a file is copied, both the original and the new file will share the same content blocks. If the user changes the copy, new data runs will be created for the modified content, but unchanged blocks remain shared. This may impact file carving, because part of the blocks previously used by a deleted file might still be in use by another file. The large default cluster size, 64 KiB, in ReFS v1.2 is an advantage when carving for deleted files, since most deleted files are less than 64 KiB and therefore only use a single cluster. For ReFS v3.2 this advantage has decreased because the standard cluster size is 4 KiB. Preliminary support for ReFS v1.2 has been available in EnCase 7 and 8, but the implementation has not been documented or peer-reviewed. The same is true for Paragon Software, which recently added ReFS support to their forensic product. Our work documents how ReFS v1.2 and ReFS v3.2 are structured at an abstraction level that allows digital forensic investigation of this new file system. At the time of writing this paper, Paragon Software is the only digital forensic tool that supports ReFS v3.x. It is the most recent version of the ReFS file system that is most relevant for digital forensics, as Windows automatically updates the file system to the latest version on mount. This is why we have included information about ReFS v3.2. However, it is possible to change a registry value to avoid updating. The latest ReFS version observed is 3.4, but the information presented about 3.2 is still valid. In any criminal case, the investigator needs to investigate the file system version found. © 2019 The Authors

Place, publisher, year, edition, pages
Kidlington: Elsevier, 2019
Keywords
digital forensics, ReFS, File system
National Category
Other Computer and Information Science
Identifiers
urn:nbn:se:hh:diva-41107 (URN)10.1016/j.diin.2019.07.004 (DOI)000488201900013 ()2-s2.0-85071032823 (Scopus ID)
Available from: 2019-12-04 Created: 2019-12-04 Last updated: 2025-10-01Bibliographically approved
Karresand, M., Axelsson, S. & Dyrkolbotn, G. O. (2019). Using NTFS Cluster Allocation Behavior to Find the Location of User Data. Paper presented at 19th DFRWS conference, Portland, OR, USA, July 14-17, 2019. Digital Investigation. The International Journal of Digital Forensics and Incident Response, 29(Supplement), S51-S60
Open this publication in new window or tab >>Using NTFS Cluster Allocation Behavior to Find the Location of User Data
2019 (English)In: Digital Investigation. The International Journal of Digital Forensics and Incident Response, ISSN 1742-2876, E-ISSN 1873-202X, Vol. 29, no Supplement, p. S51-S60Article in journal (Refereed) Published
Abstract [en]

Digital forensics is heavily affected by the large and increasing amount of data to be processed. To solve the problem there is ongoing research to find more efficient carving algorithms, use parallel processing in the cloud, and reduce the amount of data by filtering uninteresting files. Our approach builds on the principle of searching where it is more probable to find what you are looking for. We therefore have empirically studied the behavior of the cluster allocation algorithm(s) in the New Technology File System (NTFS) to see where new data is actually placed on disk. The experiment consisted of randomly writing, increasing, reducing and deleting files in 32 newly installed Windows 7, 8, 8.1 and 10 virtual computers using VirtualBox. The result show that data are (as expected) more frequently allocated closer to the middle of the disk. Hence that area should be getting higher attention during a digital forensic investigation of a NTFS formatted hard disk. Knowledge of the probable position of user data can be used by a forensic investigator to prioritize relevant areas in storage media, without the need for a working file system. It can also be used to increase the efficiency of hash-based carving by dynamically changing the sampling frequency. Our findings also contributes to the digital forensics processes in general, which can now be focused on the interesting regions on storage devices, increasing the probability of getting relevant results faster. © 2019 Martin Karresand, Stefan Axelsson, Geir Olav Dyrkolbotn

Place, publisher, year, edition, pages
Oxon: Elsevier, 2019
Keywords
Digital forensics, File carving, Partition content map, Allocation algorithm, NTFS
National Category
Other Computer and Information Science
Identifiers
urn:nbn:se:hh:diva-41110 (URN)10.1016/j.diin.2019.04.018 (DOI)000475407000007 ()2-s2.0-85069550388 (Scopus ID)
Conference
19th DFRWS conference, Portland, OR, USA, July 14-17, 2019
Note

Funding sponsor: Research Council of Norway programme IKTPLUSS, under the research and development project Ars Forensica Funding number: 248094/O70

Available from: 2019-12-04 Created: 2019-12-04 Last updated: 2025-10-01Bibliographically approved
Nordvik, R., Toolan, F. & Axelsson, S. (2019). Using the Object ID index as an investigative approach for NTFS file systems. Digital Investigation. The International Journal of Digital Forensics and Incident Response, 28(Supplement), S30-S39
Open this publication in new window or tab >>Using the Object ID index as an investigative approach for NTFS file systems
2019 (English)In: Digital Investigation. The International Journal of Digital Forensics and Incident Response, ISSN 1742-2876, E-ISSN 1873-202X, Vol. 28, no Supplement, p. S30-S39Article in journal (Refereed) Published
Abstract [en]

When investigating an incident it is important to document user activity, and to document which storage device was connected to which computer. We present a new approach to documenting user activity in computer systems using the NTFS file system by using the $ObjId Index to document user activity, and to correlate this index with the corresponding records in the MFT table. This may be the only possible approach when investigating external NTFS storage devices, and is hence a valuable addition to the storage forensics toolbox. © 2019 Rune Nordvik, Fergus Toolan, Stefan Axelsson

Place, publisher, year, edition, pages
Kidlington: Elsevier, 2019
Keywords
User activity, NTFS, Object ID
National Category
Computer Sciences
Identifiers
urn:nbn:se:hh:diva-39450 (URN)10.1016/j.diin.2019.01.013 (DOI)000465506500005 ()2-s2.0-85064883237 (Scopus ID)
Available from: 2019-05-22 Created: 2019-05-22 Last updated: 2025-10-01Bibliographically approved
Lopez-Rojas, E., Axelsson, S. & Baca, D. (2018). Analysis of fraud controls using the PaySim financial simulator. International Journal of Simulation and Process Modelling, 13(4), 377-386
Open this publication in new window or tab >>Analysis of fraud controls using the PaySim financial simulator
2018 (English)In: International Journal of Simulation and Process Modelling, ISSN 1740-2123, E-ISSN 1740-2131, Vol. 13, no 4, p. 377-386Article in journal (Refereed) Published
Abstract [en]

Fraud controls for financial transactions are needed and required by law enforcement agencies to flag suspicious criminal activity. These controls, however, require deeper analysis of the effectiveness and the negative impact for the legal customers. Owing to the intrinsically private nature of financial transactions, this analysis is often performed after several months of actively using fraud controls. In this paper, we present an analysis of different fraud prevention controls on a mobile money service based on thresholds using a simulator called PaySim. PaySim uses aggregated data from a sample dataset to generate a synthetic dataset that resembles the normal operation of transactions and injects malicious behaviour. With technology frameworks such as agent-based simulation techniques, and the application of mathematical statistics, we show in this paper that the simulated data can be as prudent as the original dataset for setting optimal controls for fraud detection.

Place, publisher, year, edition, pages
Olney: InderScience Publishers, 2018
Keywords
Multi-agent-based simulation, MABS, financial fraud, mobile money, fraud detection, synthetic data
National Category
Computer Sciences
Identifiers
urn:nbn:se:hh:diva-36643 (URN)10.1504/IJSPM.2018.10014984 (DOI)
Available from: 2018-04-19 Created: 2018-04-19 Last updated: 2025-10-01Bibliographically approved
Organisations

Search in DiVA

Show all publications