example cover photo

Hi! I'm Prof. Dr. Konstantinos Xynos, and I specialise in Computer Security and Embedded Device Security. I have an excellent understanding of the Computer Forensic principles required when investigating or analysing a device.

(Available for contract work)

About Me

I am a Computer Security professional, researcher and educator, with 13+ years of experience in both areas of computer security and computer forensics. I currently work as a freelance consultant and Professor at Noroff University College. I have experience working as a consultant, team lead and project manager on a number of projects. I have written and co-authored a number of academic papers (20+) in the area of cyber security (i.e., computer security and forensics).

Please feel free to get in touch if you want to hire me for a project you or your team is working on. I can consult on topics covering digital security of embedded devices, IoT and mobile applications. In particular architecture design, applications, digital forensics of embedded systems and application testing as well as mobile application testing and automotive systems (Charging Stations and CAN bus).

Selected Publications

2020
  • Dimitrios Sarris, Konstantinos Xynos, Huw Read and Iain Sutherland, "Toward a methodology for the classification of IoT devices", European Conference on Cyber Warfare and Security 2020 (ECCWS), Chester, UK, (reviewed, accepted, to be presented).
2019
  • Gus Pessolano, Huw Read, Iain Sutherland and Konstantinos Xynos, "Forensic analysis of the Nintendo 3DS NAND", 19th Annual DFRWS USA 2019 Conference, July 12 to 19, 2019, University Place Hotel, Portland, OR. ( Abstract | Paper | Presentation) - Gus Pessolano, Huw O.L. Read, Iain Sutherland, Konstantinos Xynos, "Forensic Analysis of the Nintendo 3DS NAND", Digital Investigation, Volume 29, Supplement, 2019, Pages S61-S70, ISSN 1742-2876, https://doi.org/10.1016/j.diin.2019.04.015 (Open Access).
2018
  • Akshay Awasthi, Huw Read, Iain Sutherland and Konstantinos Xynos, (2018) “Welcome pwn: Almond smart home hub forensics”, 18th Annual DFRWS USA 2018 Conference, July 15 to 18, 2018 (Abstract | Paper | Presentation ) - Akshay Awasthi, Huw O.L. Read, Konstantinos Xynos, Iain Sutherland, "Welcome pwn: Almond smart home hub forensics", Digital Investigation, Volume 26, Supplement, 2018, Pages S38-S46, ISSN 1742-2876, https://doi.org/10.1016/j.diin.2018.04.014 (Open Access).
2017
  • Morrison L., Read H., Xynos K., Sutherland I. (2017) “Forensic Evaluation of an Amazon Fire TV Stick”. In: Peterson G., Shenoi S. (eds) Advances in Digital Forensics XIII. Digital Forensics 2017. IFIP Advances in Information and Communication Technology, vol 511. Springer, Cham - https://doi.org/10.1007/978-3-319-67208-3_4
  • Huw Read, Iain Sutherland, Konstantinos Xynos, Tom Drange and Ernst Sundt, (2017), "The impact of changing technology on international cybersecurity curricula”, 19th International Conference on Human-Computer Interaction, HCI International 2017, Vancouver, CA, 9-14 July 2017
2016
  • Huw Read, Elizabeth Thomas, Iain Sutherland, Konstantinos Xynos and Mikhaila Burgess, (2016) A Forensic Methodology for the Analysis of a Nintendo 3DS, Twelfth Annual IFIP WG 11.9 International Conference on Digital Forensics, New Delhi, India January 4-6, 2016, www.ifip119.org
2015
  • Davies M., Read H., Xynos K. and Sutherland I., (2015), Forensic Analysis of a Sony PlayStation 4: A First Look, DFRWS 2015 EU, Digital Investigation, Volume 12, Supplement 1, March 2015, Pages S81-S89, ISSN 1742-2876, http://dx.doi.org/10.1016/j.diin.2015.01.013. (http://www.sciencedirect.com/science/article/pii/S1742287615000146 [free access])
  • Read H., Sutherland I., Xynos K. and Roarson F., (2015), Locking out the Investigator: The need to circumvent security in embedded systems., Information Security Journal: A Global Perspective, Pages 1-9, http://dx.doi.org/10.1080/19393555.2014.998847, Taylor & Francis
  • Read H., Xynos K., Sutherland I., and Burgess M., (2015), Toward using security alerts to assess the impact of network attacks on business processes. Norsk Informasjonssikkerhetskonferanse 2015, 23-25 Nov 2015, http://itkonferanse.hials.no/en/about.php
  • Read H., Xynos K., Sutherland I., Roarson F., Andriotis P. and Oikonomou G., (2015), An extensible platform for the forensic analysis of social media data, 17th International Conference on Human-Computer Interaction, HCI International 2015, Los Angeles, CA, USA, 2-7 August 2015.
  • Sutherland I., Xynos K., Jones, A., Blyth, A., (2015) The Geneva Conventions and Cyber Warfare: A Technical Approach. The RUSI Journal, Aug 2015, Vol. 160, No. 4, Routledge.
2014
  • Sutherland, I., Read, H. and Xynos, K. (2014) Forensic Analysis of Smart TV: A current issue and call to arms, Digital Investigation, Volume 11, Issue 3, September 2014, Pages 175-178, ISSN 1742-2876, http://dx.doi.org/10.1016/j.diin.2014.05.019.
  • Sutherland I., Xynos K., Read H., Jones A., Drange T. (2014) A forensic overview of the LG Smart TV, Presented at the 12th Australian Digital Forensics Conference 2014 SRI Security Congress, “Security on the Move” 1-3 December, 2014, Perth, Western Australia.
2013
  • Fragkos, G, Angelopoulou, O., and Xynos, K., (2013), The issues of software being classified as malicious by Antivirus false positive alerts, Proceedings of the European Conference on Information Warfare and Security, 2013 (ECIW 2013), University of Jyväskylä, Finland, Jul 2013.
  • Huw Read, Konstantinos Xynos, Iain Sutherland, Gareth Davies, Tom Houiellebecq, Frode Roarson, Andrew Blyth, (2013) Manipulation of hard drive firmware to conceal entire partitions, Digital Investigation,Volume 10, Issue 4, December 2013, Pages 281–286, Available online 19 November 2013, ISSN 1742-2876, http://dx.doi.org/10.1016/j.diin.2013.10.001.
  • Read H., Sutherland I., Xynos K., (2013) Networked War Games: Training the Intrusion Detection Specialist, IADIS International Journal on WWW/INTERNET, Vol. 11, No. 1, pp. 53-61, ISSN: 1645-7641
  • Xynos K., Sutherland I. and Blyth A., (2013) "Effectiveness of blocking evasions in Intrusion Prevention Systems", Whitepaper, Apr 2013. Access here: Whitepaper download or HERE
2012
  • Sutherland I., Xynos K., Andrew Jones A. and Blyth A. (2012), Protective Emblems in Cyber Warfare, 2012 SECAU Security Congress, 3-5 December, 2012, Won: Best Paper in Theme and Best in Conference. (Paper)
2010
  • Xynos K., Sutherland I, Huw Read, Emlyn Everitt and Blyth A. (2010), "Penetration Testing and Vulnerability Assessments: A Professional Approach", 2010 International Cyber Resilience Conference, 23-24 August 2010, Perth, Western Australia, ISBN 978-0-7298-0690-9.
  • Xynos K., Harries S., Sutherland I., Davies G., and Blyth A., (2010), ”Xbox 360: A digital forensic investigation of the hard disk drive”, Digital Investigation, Volume 6, Issues 3-4, Embedded Systems Forensics: Smart Phones, GPS Devices, and Gaming Consoles, May 2010, Pages 104-111, ISSN 1742-2876, DOI: 10.1016/j.diin.2010.02.004. (Link to paper) Second out of TOP 25 Hottest Articles April-June 2010
2009
  • Read H., Xynos K., Blyth A., (2009) ”Presenting DEViSE: Data Exchange for Visualizing Security Events”, IEEE Computer Graphics and Applications, vol. 29, no. 3, pp. 6-11, May/June 2009, doi:10.1109/MCG.2009.48
  • Xynos K. and Blyth A. (2009) ”XSM: A web service enabled database management system for relational databases”, Proceedings of the 4th Research Student Workshop (P.A Roach (Ed.)), University of Glamorgan, Pontypridd, Wales, UK, pp.85-89, 12 March 2009. ISBN:978-1-84054-224-0

Memberships

Organisations:
  • Member of the British Computer Society (MBCS) – kxynos[at]bcs.org.uk
  • IEEE Member – kxynos[at]ieee.org
  • IEEE Computer Society – kxynos[at]computer.org
  • IEEE Communications Society
  • IEEE Computational Intelligence Society (2009-2011)
  • BSidesAth Technical Support and site sponsorship (2016-present)
  • BSidesAms Technical Support and site sponsorship (2017-present)
  • TigerScheme Ltd (Examiner) (2009-2016) – CHECK Team Leader (expired)
Reviewer:
  • 44con UK CFP (2016-present)
  • Journal: Acta Astronautica (2015-2016)

Contact

Feel free to get in touch via the following contact form. Please note that it uses a free service by https://formspree.io and therefore content should be brief and not contain any sensitive information.