Skip to main content

Research Repository

Advanced Search

On the development of automated forensic analysis methods for mobile devices (2014)
Journal Article
Andriotis, P., Tryfonas, T., Oikonomou, G., Li, S., Tzermias, Z., Xynos, K., …Prevelakis, V. (2014). On the development of automated forensic analysis methods for mobile devices. Lecture Notes in Artificial Intelligence, 8564, 212-213. https://doi.org/10.1007/978-3-319-08593-7_17

We live in a connected world where mobile devices are used by humans as valuable tools. The use of mobile devices leaves traces that can be treasured assets for a forensic analyst. Our aim is to investigate methods and exercise techniques that will m... Read More about On the development of automated forensic analysis methods for mobile devices.

Complexity metrics and user strength perceptions of the pattern-lock graphical authentication method (2014)
Journal Article
Andriotis, P., Tryfonas, T., & Oikonomou, G. (2014). Complexity metrics and user strength perceptions of the pattern-lock graphical authentication method. Lecture Notes in Artificial Intelligence, 8533 LNCS, 115-126. https://doi.org/10.1007/978-3-319-07620-1_11

One of the most popular contemporary graphical password approaches is the Pattern-Lock authentication mechanism that comes integrated with the Android mobile operating system. In this paper we investigate the impact of password strength meters on the... Read More about Complexity metrics and user strength perceptions of the pattern-lock graphical authentication method.

Smartphone message sentiment analysis (2014)
Book Chapter
Andriotis, P., Takasu, A., & Tryfonas, T. (2014). Smartphone message sentiment analysis. In G. Peterson, & S. Shenoi (Eds.), Advances in Digital Forensics X, 253-265. Springer Berlin Heidelberg. https://doi.org/10.1007/978-3-662-44952-3_17

Humans tend to use specific words to express their emotional states in written and oral communications. Scientists in the area of text mining and natural language processing have studied sentiment fingerprints residing in text to extract the emotiona... Read More about Smartphone message sentiment analysis.

A pilot study on the security of pattern screen-lock methods and soft side channel attacks (2013)
Conference Proceeding
Andriotis, P., Tryfonas, T., Oikonomou, G., & Yildiz, C. (2013). A pilot study on the security of pattern screen-lock methods and soft side channel attacks. In L. Buttyan, A. Sadeghi, & M. Gruteser (Eds.), Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 1-6. https://doi.org/10.1145/2462096.2462098

Graphical passwords that allow a user to unlock a smartphone's screen are one of the Android operating system's features and many users prefer them instead of traditional textbased codes. A variety of attacks has been proposed against this mechanism,... Read More about A pilot study on the security of pattern screen-lock methods and soft side channel attacks.

Multilevel visualization using enhanced social network analysis with smartphone data (2013)
Journal Article
Andriotis, P., Tzermias, Z., Mparmpaki, A., Ioannidis, S., & Oikonomou, G. (2013). Multilevel visualization using enhanced social network analysis with smartphone data. International Journal of Digital Crime and Forensics, 5(4), 34-54. https://doi.org/10.4018/ijdcf.2013100103

While technology matures and becomes more productive, mobile devices can be affordable and, consequently, fully integrated in peopleàs lives. After their unexpected bloom and acceptance, Online Social Networks are now sources of valuable information.... Read More about Multilevel visualization using enhanced social network analysis with smartphone data.

JPEG steganography detection with Benford's Law (2013)
Journal Article
Andriotis, P., Oikonomou, G., & Tryfonas, T. (2013). JPEG steganography detection with Benford's Law. Digital Investigation, 9(3-4), 246-257. https://doi.org/10.1016/j.diin.2013.01.005

In this paper we present a novel approach to the problem of steganography detection in JPEG images by applying a statistical attack. The method is based on the empirical Benford's Law and, more specifically, on its generalized form. We prove and exte... Read More about JPEG steganography detection with Benford's Law.

Forensic analysis of wireless networking evidence of Android smartphones (2012)
Conference Proceeding
Andriotis, P., Oikonomou, G., & Tryfonas, T. (2012). Forensic analysis of wireless networking evidence of Android smartphones. In 2012 IEEE International Workshop on Information Forensics and Security (WIFS), (109-114). https://doi.org/10.1109/WIFS.2012.6412634

This paper introduces a method for acquiring forensic-grade evidence from Android smartphones using open source tools. We investigate in particular cases where the suspect has made use of the smartphone's Wi-Fi or Bluetooth interfaces. We discuss the... Read More about Forensic analysis of wireless networking evidence of Android smartphones.