Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Publications

Search Publications by

Richard Ayers (Fed)

Search Title, Abstract, Conference, Citation, Keyword or Author
Displaying 1 - 25 of 25

Quick Start Guide for Populating Mobile Test Devices

May 10, 2018
Author(s)
Richard Ayers, Benjamin R. Livelsberger, Barbara Guttman
This guide provides procedures for documenting and populating various data elements typically found within the contents of a mobile device, e.g., mobile phone, tablet, etc. The guide discusses techniques and considerations for preparing the internal memory

Mobile Device Tool Testing

February 19, 2015
Author(s)
Richard Ayers
The Computer Forensic Tool Testing program at NIST has spent several years researching and testing forensic tools capable of acquiring data from the internal memory of mobile devices and Subscriber Identity Modules (SIMs). Test reports provide a foundation

Guidelines on Mobile Device Forensics

May 15, 2014
Author(s)
Richard Ayers, Sam Brothers, Wayne Jansen
Mobile device forensics is the science of recovering digital evidence from a mobile device under forensically sound conditions using accepted methods. Mobile device forensics is an evolving specialty in the field of digital forensics. This guide attempts

A Strategy for Testing Graphic File Carving Tools

February 19, 2014
Author(s)
James R. Lyle, Richard P. Ayers
File carving is widely used in digital investigations to extract deleted files from unallocated storage. Usually file carving is applied to file types with a recognizable structure so that unallocated space can be scanned for file components that are then

Ten years of computer forensic tool testing

October 12, 2011
Author(s)
James R. Lyle, Barbara Guttman, Richard Ayers
The Computer Forensic Tool Testing (CFTT) project at the National Institute of Standards and Technology (NIST) has been active since 2000. The project develops methodologies for testing computer forensic software tools by the creation of general tool

Smart Phone Tool Specification

April 23, 2010
Author(s)
Richard Ayers
This paper defines requirements for mobile device applications capable of acquiring data from smart phones operating over a Global System for Mobile communication (GSM) network and a Code Division Multiple Access (CDMA) network, and test methods used to

Smart Phone Tool Test Assertions and Test Plan

April 23, 2010
Author(s)
Richard Ayers
This paper defines assertions and test cases for mobile device applications capable of acquiring data from mobile devices operating over a Global System for Mobile communication (GSM) and Code Division Multiple Access (CDMA) networks, used to determine

Hashing Techniques for Mobile Device Forensics

June 15, 2009
Author(s)
Richard Ayers, Shira Danker, Rick Mislan
Technological advances found in mobile devices today, equal or exceed that of the computing power present in desktop computers of less than a decade ago. As mobile devices proliferate, techno-logical advances provide users with increased power, range

Mobile Device Forensics - Tool Testing

May 6, 2009
Author(s)
Richard Ayers
The goal of the Computer Forensic Tool Testing (CFTT) project at the National Institute of Standards and Technology (NIST) is to establish a methodology for testing computer forensic software tools. The results provide information necessary for toolmakers

Non-GSM Mobile Device Tool Specification

January 7, 2009
Author(s)
Richard Ayers
As mobile devices proliferate, incorporating a host of integrated features and capabilities, their use can be seen everywhere in our world today. Mobile communication devices contain a wealth of sensitive and non-sensitive information. In the investigative

GSM Mobile Device and Associated Media Tool Specification

January 6, 2009
Author(s)
Richard Ayers
Mobile devices incorporating cellular capabilities are ubiquitous and contain a wealth of personal information useful in criminal cases, civil disputes, employment proceedings, and recreation of incidents. Due to the rapid rate of mobile devices appearing

Non-GSM Mobile Device Tool Test Assertions and Test Plan

January 1, 2009
Author(s)
Richard Ayers
As mobile devices proliferate, incorporating a host of integrated features and capabilities, their use can be seen everywhere in our world today. Mobile communication devices contain a wealth of sensitive and non-sensitive information. In the investigative

Digital Forensics at the National Institute of Standards and Technology

April 9, 2008
Author(s)
James R. Lyle, Douglas R. White, Richard P. Ayers
There are three digital forensic science projects: National Software Reference Library (NSRL), Computer Forensic Tool Testing (CFTT), Computer Forensic Reference Data Sets (CFReDS) currently providing resources for the digital investigator underway at the

Digital Forensics at the National Institute of Standards and Technology

April 1, 2008
Author(s)
James R. Lyle, Douglas R. White, Richard Ayers
There are three digital forensic science projects: National Software Reference Library (NSRL), Computer Forensic Tool Testing (CFTT), Computer Forensic Reference Data Sets (CFReDS) currently providing resources for the digital investigator underway at the

Cell Phone Forensic Tools: An Overview and Analysis Update

March 21, 2007
Author(s)
Richard Ayers, Wayne Jansen, Aurelien M. Delaitre, Ludovic Moenner
Cell phones and other handheld devices incorporating cell phone capabilities (e.g., Personal Digital Assistant (PDA) phones) are ubiquitous. Rather than just placing calls, certain phones allow users to perform additional tasks such as SMS (Short Message

Forensic Tools for Mobile Phone Subscriber Identity Modules

June 1, 2006
Author(s)
Wayne Jansen, Richard Ayers
Cell phones and other handheld devices incorporating cell phone capabilities (e.g., smart phones) are ubiquitous. Besides placing calls, cell phones allow users to perform other tasks such as text messaging and phonebook entry management. When cell phones

Forensic Software Tools for Cell Phone Subscriber Identity Modules

April 3, 2006
Author(s)
Wayne Jansen, Richard Ayers
Cell phones and other handheld devices incorporating cell phone capabilities (e.g., smart phones) are ubiquitous. Besides placing calls, cell phones allow users to perform other tasks such as text messaging and phonebook entry management. When cell phones

Cell Phone Forensics Tools: An Overview and Analysis

October 19, 2005
Author(s)
Richard Ayers, Wayne Jansen, Nicolas Cilleros, Ronan Daniellou
Cell phones and other handheld devices incorporating cell phone capabilities (e.g., Personal Digital Assistants (PDAs) phones) are ubiquitous. Rather than just placing calls, certain phones allow users to perform additional tasks such as SMS (Short Message

An Overview and Analysis of PDA Forensic Tools

April 2, 2005
Author(s)
Wayne Jansen, Richard Ayers
Mobile handheld devices are becoming evermore affordable and commonplace in society. When they are involved in a security incident or crime, forensic specialists require tools that allow proper extraction and speedy examination of any digital evidence

PDA Forensic Tools: an Overview and Analysis

August 1, 2004
Author(s)
Richard Ayers, Wayne Jansen
Adequate user authentication is a persistent problem, particularly with mobile devices such as Personal Digital Assistants (PDAs), which tend to be highly personal and at the fringes of an organization's influence. Yet these devices are being used

Picture Password: A Visual Login Technique for Mobile Devices

July 1, 2003
Author(s)
Wayne Jansen, Serban I. Gavrila, Vladimir Korolev, Richard P. Ayers, Ryan Swanstrom
Adequate user authentication is a persistent problem, particularly with handheld devices, which tend to be highly personal and at the fringes of an organization's influence. Yet, these devices are being used increasingly in corporate settings where they