Change search
Link to record
Permanent link

Direct link
Publications (4 of 4) Show all publications
Olegård, J. & Axelsson, S. (2025). Digital Forensic Acquisition Using Private Internet of Things Cloud Application Programming Interfaces. In: Elizabeth Kurkowski, Sujeet Shenoi (Ed.), Advances in Digital Forensics XX: 20th IFIP WG 11.9 International Conference, New Delhi, India, January 4–5, 2024, Revised Selected Papers. Paper presented at 20th IFIP WG 11.9 International Conference, New Delhi, India, January 4–5, 2024 (pp. 141-163). Springer
Open this publication in new window or tab >>Digital Forensic Acquisition Using Private Internet of Things Cloud Application Programming Interfaces
2025 (English)In: Advances in Digital Forensics XX: 20th IFIP WG 11.9 International Conference, New Delhi, India, January 4–5, 2024, Revised Selected Papers / [ed] Elizabeth Kurkowski, Sujeet Shenoi, Springer, 2025, p. 141-163Conference paper, Published paper (Refereed)
Abstract [en]

Digital forensic practitioners face two key challenges when investigating Internet of Things devices. One is the need to reverse engineer a plethora of different devices and the other is the volatility of device data, including deleted data. This chapter attempts to address these challenges by focusing on the extraction of Internet of Things device data from the cloud by leveraging private application programming interfaces, an area that is relatively understudied in digital forensics. Specifically, this chapter presents the results of a study of decrypted traffic between six Android mobile apps (not the Internet of Things devices) and their respective cloud systems. The study results point to the feasibility of the approach and highlight the challenge involved in discovering additional application programming interface endpoints in a non-intrusive manner.

Place, publisher, year, edition, pages
Springer, 2025
Series
IFIP Advances in Information and Communication Technology, ISSN 1868-4238, E-ISSN 1868-422X ; 724 IFIP
Keywords
Application Programming Interface Forensics, Internet of Things Forensics, Reverse Engineering, Transport Layer Security
National Category
Bioinformatics (Computational Biology)
Identifiers
urn:nbn:se:su:diva-240210 (URN)10.1007/978-3-031-71025-4_8 (DOI)2-s2.0-85216105798 (Scopus ID)9783031710247 (ISBN)
Conference
20th IFIP WG 11.9 International Conference, New Delhi, India, January 4–5, 2024
Available from: 2025-03-06 Created: 2025-03-06 Last updated: 2025-03-06Bibliographically approved
Olegård, J., Axelsson, S. & Li, Y. (2025). When is logging sufficient? — Tracking event causality for improved forensic analysis and correlation. Forensic Science International: Digital Investigation, 52, Article ID 301877.
Open this publication in new window or tab >>When is logging sufficient? — Tracking event causality for improved forensic analysis and correlation
2025 (English)In: Forensic Science International: Digital Investigation, ISSN 2666-2825, Vol. 52, article id 301877Article in journal (Refereed) Published
Abstract [en]

It is generally agreed that logs are necessary for understanding cyberattacks post-incident. However, little is known about what specific information logs should contain to be forensically helpful. This uncertainty, combined with the fact that conventional logs are often not designed with security in mind, often results in logs with too much or too little information. Events in one log are also often challenging to correlate with events in other logs. Most previous research has focused on preserving, filtering, and interpreting logs, rather than addressing what should be logged in the first place. This paper explores logging sufficiency through the lens of Digital Forensic Readiness, and highlights the absence of causal information in conventional logs. To address this gap, we propose a novel logging system leveraging “gretel numbers” to track causal information—such as attacker movement—across multiple applications in a tamper-resistant manner. A prototype, implemented using the Extended Berkeley Packet Filter (EBPF) and an Nginx web server, shows that causality tracking imposes minimal resource overhead, though log size management remains critical for scalability.

Keywords
Anti-anti-forensics, Digital forensics, Event-reconstruction, Logging, Provenance graph
National Category
Computer and Information Sciences
Identifiers
urn:nbn:se:su:diva-242034 (URN)10.1016/j.fsidi.2025.301877 (DOI)001460881900004 ()2-s2.0-105000598471 (Scopus ID)
Available from: 2025-04-14 Created: 2025-04-14 Last updated: 2025-04-24Bibliographically approved
Ekvall, M., Bergenstrahle, L., Andersson, A., Czarnewski, P., Olegård, J., Kaell, L. & Lundeberg, J. (2024). Spatial landmark detection and tissue registration with deep learning. Nature Methods, 21, 673-679
Open this publication in new window or tab >>Spatial landmark detection and tissue registration with deep learning
Show others...
2024 (English)In: Nature Methods, ISSN 1548-7091, E-ISSN 1548-7105, Vol. 21, p. 673-679Article in journal (Refereed) Published
Abstract [en]

Spatial landmarks are crucial in describing histological features between samples or sites, tracking regions of interest in microscopy, and registering tissue samples within a common coordinate framework. Although other studies have explored unsupervised landmark detection, existing methods are not well-suited for histological image data as they often require a large number of images to converge, are unable to handle nonlinear deformations between tissue sections and are ineffective for z-stack alignment, other modalities beyond image data or multimodal data. We address these challenges by introducing effortless landmark detection, a new unsupervised landmark detection and registration method using neural-network-guided thin-plate splines. Our proposed method is evaluated on a diverse range of datasets including histology and spatially resolved transcriptomics, demonstrating superior performance in both accuracy and stability compared to existing approaches. Effortless landmark detection is an unsupervised deep learning-based approach that addresses key challenges in landmark detection and image registration for accurate performance across diverse tissue imaging datasets.

National Category
Biochemistry Molecular Biology
Identifiers
urn:nbn:se:su:diva-227723 (URN)10.1038/s41592-024-02199-5 (DOI)001178071600001 ()38438615 (PubMedID)2-s2.0-85186550191 (Scopus ID)
Available from: 2024-03-26 Created: 2024-03-26 Last updated: 2025-02-20Bibliographically approved
Heiding, F., Süren, E., Olegård, J. & Lagerström, R. (2023). Penetration testing of connected households. Computers & Security, 126, Article ID 103067.
Open this publication in new window or tab >>Penetration testing of connected households
2023 (English)In: Computers & Security, ISSN 0167-4048, E-ISSN 1872-6208, Vol. 126, article id 103067Article in journal (Refereed) Published
Abstract [en]

Connected devices have become an integral part of modern homes and household devices, such as vacuum cleaners and refrigerators, are now often connected to networks. This connectivity introduces an entry point for cyber attackers. The plethora of successful cyber attacks against household IoT indicates that the security of these devices, or the security of applications related to these devices, is often lacking. Existing penetration testing studies usually focus on individual devices, and recent studies often mention the need for more extensive vulnerability assessments. Therefore, this study investigates the cyber security of devices commonly located in connected homes. Systematic penetration tests were conducted on 22 devices in five categories related to connected homes: smart door locks, smart cameras, smart car adapters/garages, smart appliances, and miscellaneous smart home devices. In total, 17 vulnerabilities were discovered and published as new CVEs. Some CVEs received critical severity rankings from the National Vulnerability Database (NVD), reaching 9.8/10. The devices are already being sold and used worldwide, and the discovered vulnerabilities could lead to severe consequences for residents, such as an attacker gaining physical access to the house. In addition to the published CVEs, 52 weaknesses were discovered that could potentially lead to new CVEs in the future. To our knowledge, this is the most comprehensive study on penetration testing of connected household products.

Keywords
Penetration testing, Ethical hacking, Internet of things, Connected households, Smart home, Pentest, Cyber security
National Category
Computer and Information Sciences
Identifiers
urn:nbn:se:su:diva-214798 (URN)10.1016/j.cose.2022.103067 (DOI)000917439700001 ()2-s2.0-85144826963 (Scopus ID)
Available from: 2023-02-16 Created: 2023-02-16 Last updated: 2025-08-28Bibliographically approved
Organisations
Identifiers
ORCID iD: ORCID iD iconorcid.org/0000-0001-9082-4318

Search in DiVA

Show all publications