Geir Olav Dyrkolbotn

According to our database1, Geir Olav Dyrkolbotn authored at least 18 papers between 2006 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Exploring a Low-Cost Hardware Reverse Engineering Approach: A Use Case Experiment.
Proceedings of the ICT Systems Security and Privacy Protection, 2024

2021
Chip chop - smashing the mobile phone secure chip for fun and digital forensics.
Digit. Investig., 2021

Digital Forensic Acquisition Kill Chain - Analysis and Demonstration.
Proceedings of the Advances in Digital Forensics XVII, 2021

Leveraging USB Power Delivery Implementations for Digital Forensic Acquisition.
Proceedings of the Advances in Digital Forensics XVII, 2021

2020
Disk Cluster Allocation Behavior in Windows and NTFS.
Mob. Networks Appl., 2020

An Empirical Study of the NTFS Cluster Allocation Behavior Over Time.
Digit. Investig., 2020

Detection of Running Malware Before it Becomes Malicious.
Proceedings of the Advances in Information and Computer Security, 2020

Detection of Previously Unseen Malware using Memory Access Patterns Recorded Before the Entry Point.
Proceedings of the 2020 IEEE International Conference on Big Data (IEEE BigData 2020), 2020

2019
Using NTFS Cluster Allocation Behavior to Find the Location of User Data.
Digit. Investig., 2019

Correlating High- and Low-Level Features: - Increased Understanding of Malware Classification.
Proceedings of the Advances in Information and Computer Security, 2019

Creating a Map of User Data in NTFS to Improve File Carving.
Proceedings of the Advances in Digital Forensics XV, 2019

Exploiting Vendor-Defined Messages in the USB Power Delivery Protocol.
Proceedings of the Advances in Digital Forensics XV, 2019

2018
Multinomial malware classification via low-level features.
Digit. Investig., 2018

Forensics acquisition - Analysis and circumvention of samsung secure boot enforced common criteria mode.
Digit. Investig., 2018

2017
Supporting the Human in Cyber Defence.
Proceedings of the Computer Security - ESORICS 2017 International Workshops, 2017

2012
Layout Dependent Phenomena A New Side-channel Power Model.
J. Comput., 2012

2010
Security Implications of Crosstalk in Switching CMOS Gates.
Proceedings of the Information Security - 13th International Conference, 2010

2006
A Wireless Covert Channel on Smart Cards (Short Paper).
Proceedings of the Information and Communications Security, 8th International Conference, 2006


  Loading...