example cover photo

Hi! I'm Dr. Konstantinos Xynos, and I specialise in Computer Security and Embedded Device Security. I have an excellent understanding of the Computer Forensic principles required when investigating or analysing a device.

(Not Available for contract work)

About Me

I am a Computer Security professional, researcher and educator, with 13+ years of experience in both areas of computer security and computer forensics. I currently work for an automative company in Germany. I have experience working as a consultant, team lead and project manager on a number of projects. I have written and co-authored a number of academic papers (20+) in the area of cyber security (i.e., computer security and forensics).

Selected Publications

2023
2022
2021
  • Sutherland, I., Read, H., and Xynos, K. (2021), "Educating the examiner: Digital forensics in an IoT and embedded environment", "20th European Conference on Cyber Warfare and Security", Chester, England, UK, June 24-25, 2021. [download from here]
2020
  • Dimitrios Sarris, Konstantinos Xynos, Huw Read and Iain Sutherland, "Toward a methodology for the classification of IoT devices", "19th European Conference on Cyber Warfare and Security", 2020 (ECCWS), Chester, England, UK, June 25-26, 2020. [download from here] https://doi.org/10.34190/EWS.20.013
2019
  • Gus Pessolano, Huw Read, Iain Sutherland and Konstantinos Xynos, "Forensic analysis of the Nintendo 3DS NAND", 19th Annual DFRWS USA 2019 Conference, July 12 to 19, 2019, University Place Hotel, Portland, OR. ( Abstract | Paper | Presentation) - Gus Pessolano, Huw O.L. Read, Iain Sutherland, Konstantinos Xynos, "Forensic Analysis of the Nintendo 3DS NAND", Digital Investigation, Volume 29, Supplement, 2019, Pages S61-S70, ISSN 1742-2876, https://doi.org/10.1016/j.diin.2019.04.015 (Open Access).
2018
  • Akshay Awasthi, Huw Read, Iain Sutherland and Konstantinos Xynos, (2018) “Welcome pwn: Almond smart home hub forensics”, 18th Annual DFRWS USA 2018 Conference, July 15 to 18, 2018 (Abstract | Paper | Presentation ) - Akshay Awasthi, Huw O.L. Read, Konstantinos Xynos, Iain Sutherland, "Welcome pwn: Almond smart home hub forensics", Digital Investigation, Volume 26, Supplement, 2018, Pages S38-S46, ISSN 1742-2876, https://doi.org/10.1016/j.diin.2018.04.014 (Open Access).
2017
  • Morrison L., Read H., Xynos K., Sutherland I. (2017) “Forensic Evaluation of an Amazon Fire TV Stick”. In: Peterson G., Shenoi S. (eds) Advances in Digital Forensics XIII. Digital Forensics 2017. IFIP Advances in Information and Communication Technology, vol 511. Springer, Cham - https://doi.org/10.1007/978-3-319-67208-3_4 (Open Access)
  • Huw Read, Iain Sutherland, Konstantinos Xynos, Tom Drange and Ernst Sundt, (2017), "The impact of changing technology on international cybersecurity curricula”, 19th International Conference on Human-Computer Interaction, HCI International 2017, Vancouver, CA, 9-14 July 2017 - https://link.springer.com/chapter/10.1007/978-3-319-58460-7_36 (Open Access)
2016
  • Read, H., Thomas, E., Sutherland I., Xynos K. and Burgess, M., (2016), A Forensic Methodology for the Analysis of a Nintendo 3DS, Twelfth Annual IFIP WG 11.9 International Conference on Digital Forensics, New Delhi, India January 4-6, 2016, www.ifip119.org https://doi.org/10.1007/978-3-319-46279-0_7 (Open Access)
2015
  • Davies M., Read H., Xynos K. and Sutherland I., (2015), Forensic Analysis of a Sony PlayStation 4: A First Look, DFRWS 2015 EU, Digital Investigation, Volume 12, Supplement 1, March 2015, Pages S81-S89, ISSN 1742-2876, https://dx.doi.org/10.1016/j.diin.2015.01.013. (https://www.sciencedirect.com/science/article/pii/S1742287615000146 (Open Access))
  • Read H., Sutherland I., Xynos K. and Roarson F., (2015), Locking out the Investigator: The need to circumvent security in embedded systems., Information Security Journal: A Global Perspective, Pages 1-9, https://dx.doi.org/10.1080/19393555.2014.998847, Taylor & Francis
  • Read H., Xynos K., Sutherland I., and Burgess M., (2015), "Visualising the Impact of Network Attacks on Business Processes using the DEViSE Framework" Norsk Informasjonssikkerhetskonferanse 2015, 23-25 Nov 2015.[download from here]
  • Read H., Xynos K., Sutherland I., Roarson F., Andriotis P. and Oikonomou G., (2015), An extensible platform for the forensic analysis of social media data, 17th International Conference on Human-Computer Interaction, HCI International 2015, Los Angeles, CA, USA, 2-7 August 2015. https://doi.org/10.1007/978-3-319-20376-8_36 (Open Access)
  • Sutherland I., Xynos K., Jones, A., Blyth, A., (2015) The Geneva Conventions and Cyber Warfare: A Technical Approach. The RUSI Journal, Aug 2015, Vol. 160, No. 4, Routledge. https://doi.org/10.1080/03071847.2015.1079044
2014
  • Sutherland, I., Read, H. and Xynos, K. (2014) Forensic Analysis of Smart TV: A current issue and call to arms, Digital Investigation, Volume 11, Issue 3, September 2014, Pages 175-178, ISSN 1742-2876, https://dx.doi.org/10.1016/j.diin.2014.05.019.
  • Andriotis, P., Tryfonas, T., Oikonomou, G., Li, S., Tzermias, Z., Xynos, K., Read, H. & Prevelakis, V. (2014). On the Development of Automated Forensic Analysis Methods for Mobile Devices. In: Holz, T., Ioannidis, S. (eds) Trust and Trustworthy Computing. Trust 2014. Lecture Notes in Computer Science, vol 8564. Springer, Cham. https://doi.org/10.1007/978-3-319-08593-7_17.
  • Sutherland I., Xynos K., Read H., Jones A., Drange T. (2014) A forensic overview of the LG Smart TV, Presented at the 12th Australian Digital Forensics Conference 2014 SRI Security Congress, “Security on the Move” 1-3 December, 2014, Perth, Western Australia. https://doi.org/10.4225/75/57b3e69dfb881 (Open Access)
2013
  • Fragkos, G, Angelopoulou, O., and Xynos, K., (2013), The issues of software being classified as malicious by Antivirus false positive alerts, Proceedings of the European Conference on Information Warfare and Security, 2013 (ECIW 2013), University of Jyväskylä, Finland, Jul 2013.
  • Huw Read, Konstantinos Xynos, Iain Sutherland, Gareth Davies, Tom Houiellebecq, Frode Roarson, Andrew Blyth, (2013) Manipulation of hard drive firmware to conceal entire partitions, Digital Investigation,Volume 10, Issue 4, December 2013, Pages 281–286, Available online 19 November 2013, ISSN 1742-2876, https://dx.doi.org/10.1016/j.diin.2013.10.001.
  • Read H., Sutherland I., Xynos K., (2013) Networked War Games: Training the Intrusion Detection Specialist, IADIS International Journal on WWW/INTERNET, Vol. 11, No. 1, pp. 53-61, ISSN: 1645-7641
  • Xynos K., Sutherland I. and Blyth A., (2013) "Effectiveness of blocking evasions in Intrusion Prevention Systems", Whitepaper, Apr 2013. Access here: Whitepaper download or HERE
2012
2010
  • Xynos K., Sutherland I, Huw Read, Emlyn Everitt and Blyth A. (2010), "Penetration Testing and Vulnerability Assessments: A Professional Approach", 2010 International Cyber Resilience Conference, 23-24 August 2010, Perth, Western Australia, ISBN 978-0-7298-0690-9. https://ro.ecu.edu.au/icr/16/ (Link to paper)
  • Xynos K., Harries S., Sutherland I., Davies G., and Blyth A., (2010), ”Xbox 360: A digital forensic investigation of the hard disk drive”, Digital Investigation, Volume 6, Issues 3-4, Embedded Systems Forensics: Smart Phones, GPS Devices, and Gaming Consoles, May 2010, Pages 104-111, ISSN 1742-2876, DOI: https://dx.doi.org/10.1016/j.diin.2010.02.004 (Link to paper) Second out of TOP 25 Hottest Articles April-June 2010
2009
  • Read H., Xynos K., Blyth A., (2009) ”Presenting DEViSE: Data Exchange for Visualizing Security Events”, IEEE Computer Graphics and Applications, vol. 29, no. 3, pp. 6-11, May/June 2009, doi:https://dx.doi.org/10.1109/MCG.2009.48
  • Xynos K. and Blyth A. (2009) ”XSM: A web service enabled database management system for relational databases”, Proceedings of the 4th Research Student Workshop (P.A Roach (Ed.)), University of Glamorgan, Pontypridd, Wales, UK, pp.85-89, 12 March 2009. ISBN:978-1-84054-224-0

Memberships

Organisations:
  • IEEE Member – kxynos[at]ieee.org
  • IEEE Computer Society – kxynos[at]computer.org (currently not working-2023)
  • IEEE Communications Society
  • IEEE Computational Intelligence Society (2009-2011)
  • BSidesAth Technical Support and site sponsorship (2016-2022)
  • BSidesAms Technical Support and site sponsorship (2017-2022)
  • TigerScheme Ltd (Examiner) (2009-2016) – CHECK Team Leader (expired)
  • Member of the British Computer Society (MBCS) (lapsed 2020)
Reviewer:
  • Conference: IFIP Working Group 11.9 on Digital Forensics - http://www.ifip119.org/Conferences/ (2023)
  • Journal: Computers & Security - https://www.sciencedirect.com/journal/computers-and-security (2023)
  • Journal: Forensic Science International: Digital Investigation - https://www.sciencedirect.com/journal/forensic-science-international-digital-investigation (2022-2023)
  • 44con UK CFP (2016-2019)
  • Journal: Acta Astronautica (2015-2016)

Contact

Feel free to get in touch via the following contact form. Please note that it uses a free service by https://formspree.io and therefore content should be brief and not contain any sensitive information.