NTNU Digital Forensics

Research Group

NTNU Digital Forensics

The research group focuses on research and development of advanced computational methods to establish and prove the scientific basis of forensic investigative procedures, with the objective to support forensic examiners in their daily casework. 

About

About our Research Group

We conduct fundamental and applied research to enhance prevention, investigation and prosecution of cybercrime, cyber-enabled fraud, and high technology crime.

We also contribute to advisory services, forensic casework, and expert witness in cooperation with partners from national, European and international law enforcement agencies (LEA), academia and the private sector.

 

 

Topics

  • Research in the area of large-scale investigations; automatic search through terabytes of electronic data storage within closed systems and the Internet,
  • Research and development for the rapid acquisition, correlation and analysis of Internet-related evidence,
  • Technologies for cross-media search and data integration to access diverse sources of information, in particular data enrichment from Internet sources,
  • Algorithms for the analysis of encrypted evidence and cryptographic credentials,
  • Design of advanced computing technologies to achieve more objective evidence analysis and final decision making by implementing computational intelligence.
  • Development of methods and tools for digital penetrator attribution and profiling, visualization of serious criminal relationships and associations, and geographical mapping of digital and physical evidence.

Governance

Mission statement

  • Forensic Teaching Environment
  • Postgraduate Education and Training
  • Curiosity-driven, fundamental research and publications 
  • Applied Research and Development on behalf of Industrial and Governmental Entities
  • Forensic Casework, Expert Witnesses, and Advisory Services in Cooperation with Partners
  • Networking and Community-building Activities, e.g., Workshops, Tutorials, Competitions,…

Objective

  • Study and development of advanced computational methods to
    • Assist in basic and applied forensic research, e.g. to establish or prove the scientific basis of a particular forensic investigative procedure,
    • Support the forensic examiner in their daily casework.
  • Modern crime investigation, prosecution and prevention shall profit from the joint intelligence of humans and machines.

Research activity

Result 30 of 127 for
Publications Authors Journal Year
Blockchain as a Driver of Vertical and Horizontal Information Sharing for Sustainable Innovations P.K. Wan, H. Holtskog, L. Huang, M. Nowostawski ...more authors Blockchain as a Technology for Environmental Sustainability 2024
A Taxonomy of Challenges for Self-Sovereign Identity Systems A. Satybaldy, M.S. Ferdous, M. Nowostawski ...more authors IEEE Access 2024
Runtime Evolution of Bitcoin's Consensus Rules J.S. Notland, M. Nowostawski, J. Li ...more authors IEEE Transactions on Software Engineering 2023
Insecurity Refactoring: Automated Injection of Vulnerabilities in Source Code F. Schuckert, B. Katt, H. Langweg ...more authors Computers and Security 2023
Automated infection risks assessments (AIRa) for decision-making using a blockchain-based alert system: A case study in a representative building P.K. Wan, L. Huang, Z. Lai, X. Liu, M. Nowostawski, H. Holtskog, Y. Liu ...more authors Environmental Research 2023
An offline mobile access control system based on self-sovereign identity standards A. Enge, A. Satybaldy, M. Nowostawski ...more authors Computer Networks 2022
A Framework for Online Document Verification Using Self-Sovereign Identity Technology A. Satybaldy, A. Subedi, M. Nowostawski ...more authors Sensors 2022
Preface S.M. Idrees, M. Nowostawski ...more authors Transformations Through Blockchain Technology: The New Digital Revolution 2022
Transformations Through Blockchain Technology: The New Digital Revolution S.M. Idrees, M. Nowostawski ...more authors Transformations Through Blockchain Technology: The New Digital Revolution 2022
An architectural framework for enabling secure decentralized P2P messaging using DIDComm and Bluetooth Low Energy Enge A. Heireth, A. Satybaldy, M. Nowostawski ...more authors Proceedings - 2022 IEEE 46th Annual Computers, Software, and Applications Conference, COMPSAC 2022 2022
Systematic Generation of XSS and SQLi Vulnerabilities in PHP as Test Cases for Static Code Analysis F. Schuckert, H. Langweg, B. Katt ...more authors Proceedings - 2022 IEEE 14th International Conference on Software Testing, Verification and Validation Workshops, ICSTW 2022 2022
DECENTRALIZED IDENTITY MANAGEMENT FOR E-HEALTH APPLICATIONS: STATE-OF-THE-ART AND GUIDANCE FOR FUTURE WORK A. Satybaldy, A. Hasselgren, M. Nowostawski ...more authors Blockchain in Healthcare Today 2022
Serious games as a tool to model attack and defense scenarios for cyber-security exercises M.M. Yamin, B. Katt, M. Nowostawski ...more authors Computers and Security 2021
Security aspects of blockchain technology intended for industrial applications S.M. Idrees, M. Nowostawski, R. Jameel, A.K. Mourya ...more authors Electronics (Switzerland) 2021
Blockchain-based digital contact tracing apps for COVID-19 pandemic management: Issues, challenges, solutions, and future directions S.M. Idrees, M. Nowostawski, R. Jameel ...more authors JMIR Medical Informatics 2021
Modelling Damage Propagation in Complex Networks: Life Exists in Half-Chaos A. Gecow, M. Nowostawski ...more authors Springer Proceedings in Complexity 2021
Exploring the Blockchain Technology: Issues, Applications and Research Potential S.M. Idrees, I. Aijaz, R. Jameel, M. Nowostawski ...more authors International journal of online and biomedical engineering 2021
Identifying Proficient Cybercriminals through Text and Network Analysis J.W. Johnsen, K. Franke ...more authors Proceedings - 2020 IEEE International Conference on Intelligence and Security Informatics, ISI 2020 2020
Review of techniques for privacy-preserving blockchain systems A. Satybaldy, M. Nowostawski ...more authors BSCI 2020 - Proceedings of the 2nd ACM International Symposium on Blockchain and Secure Critical Infrastructure, Co-located with AsiaCCS 2020 2020
Reducing Alert Fatigue by Sharing Low-Level Alerts with Patients and Enhancing Collaborative Decision Making Using Blockchain Technology: Scoping Review and Proposed Framework (MedAlert) P.K. Wan, A. Satybaldy, L. Huang, H. Holtskog, M. Nowostawski ...more authors Journal of Medical Internet Research 2020
Imbalance measure and proactive channel rebalancing algorithm for the Lightning Network R. Pickhardt, M. Nowostawski ...more authors IEEE International Conference on Blockchain and Cryptocurrency, ICBC 2020 2020
A Practical Approach to Stakeholder-driven Determination of Security Requirements based on the GDPR and Common Criteria S.D. Zinsmaier, H. Langweg, M. Waldvogel ...more authors International Conference on Information Systems Security and Privacy 2020
Preface Vorwort D. Reinhardt, H. Langweg, B.C. Witt, M. Fischer ...more authors Lecture Notes in Informatics (LNI), Proceedings - Series of the Gesellschaft fur Informatik (GI) 2020
A practical approach to stakeholder-driven determination of security requirements based on the GDPR and common criteria S.D. Zinsmaier, H. Langweg, M. Waldvogel ...more authors ICISSP 2020 - Proceedings of the 6th International Conference on Information Systems Security and Privacy 2020
Self-sovereign identity systems: Evaluation framework A. Satybaldy, M. Nowostawski, J. Ellingsen ...more authors IFIP Advances in Information and Communication Technology 2020
Difficult XSS Code Patterns for Static Code Analysis Tools F. Schuckert, B. Katt, H. Langweg ...more authors Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 2020
Towards Blockchain-Based GDPR-Compliant Online Social Networks: Challenges, Opportunities and Way Forward J. Ahmed, S.Y. Yayilgan, M. Nowostawski, M. Abomhara, R. Ramachandra, O. Elezaj ...more authors Advances in Intelligent Systems and Computing 2020
The impact of preprocessing in natural language for open source intelligence and criminal investigation J.W. Johnsen, K. Franke ...more authors Proceedings - 2019 IEEE International Conference on Big Data, Big Data 2019 2019
Privacy-preserving tax-case processing E.K. Lund, M. Nowostawski, A. Satybaldy, N. Aeinehchi ...more authors 2019 17th International Conference on Privacy, Security and Trust, PST 2019 - Proceedings 2019
Evaluating methods for the identification of off-chain transactions in the lightning network M. Nowostawski, J. Ton ...more authors Applied Sciences (Switzerland) 2019
Publication data downloaded weekly from Scopus API via api.elsevier.com and www.scopus.com.

Vacant positions

Key academic staff

Key Academic Staff


Part-time academic staff

Part-time Academic Staff


Part-time without Person Portlet

André Årnes, Adjunct Associate Professor

Jefferey D. Hamm, Lecturer, Mandiant/FireEye


Affiliated Academic Staff

Affiliated Academic Staff


Affiliated without person portlet

Inger Marie Sunde, Professor, The Norwegian Police University College (PHS)

Hallstein A. Hansen, PhD, Oslo Police District (OPD)

Jul Fredrik Kaltenborn, PhD Research Fellow, Department of Information Security and Communication Technology


News and events

News and Events


RSS Publisher

RSS Publisher

Digital forensics map

Visit us

Teknologivegen 22
Gjøvik


Phd research fellows

Ph.D. Research Fellows


person-portlet

Partners

Partners

Academic partners

  • United Nations Interregional Crime and Justice Research Institute
  • University California Santa Cruz, USA
  • Kyushu Institute of Technology, Japan
  • University of Groningen, The Netherlands
  • Norwegian Computing Centre (NR) , Norway
  • Norwegian Police University College (PHS), Norway
  • University in Oslo, Norway
  • University of Malta, Malta
  • National Research Council of Italy, Italy
  • National Intelligence Academy, Romania
  • Edith Cowan University, Australia
  • Fraunhofer Society, Germany
  • Hitachi Central Research Laboratory, Japan
  • École Polytechnique Fédérale de Lausanne, Switzerland
  • Ellinki Aeroporiki Viomichania Anonymi Etairei, Greece
  • National Institute of Standards and Technology (NIST), USA
  • Universität Stuttgart, Germany

User partners from public sector

  • Norwegian National Police Directorate (POD), Norway
  • Kripos, Norway
  • Økokrim, Norway
  • Oslo Police District (OPD), Norway
  • Netherlands Forensics Institute (NFI), Netherlands
  • Advance Technology Institute, Romania
  • Fraunhofer Society, Germany
  • Hitachi Central Research Laboratory, Japan
  • NorSIS – Norsk Senter for Informasjonssikring, Norway
  • Misa SA, Norway
  • Raufoss Technology AS, Norway
  • SINTEF Raufoss Manufacturing, Norway

Security-service providers

  • FinansCERT, Norway
  • mnemonic AS, Norway
  • Synergetics N.V. Group, Belgium
  • Xensics, USA
  • KraftCERT AS, Norway
  • National Sikkerhetsmyndighet (NSM), Norway
  • REALITY NET System Solutions, Italy
  • Ericsson AB, Sweden
  • C 3 M d.o.o., Slovenia
  • Promon, Norway
  • RD&T Technology AB, Sweden