SugarSync forensic analysis

Hi All,


Another research paper of our cyber forensics research team titled "" is published at Australian Journal of Forensics Science. Here is the link to the paper final version. The paper abstract is as follows:

Cloud storage services are popular with both individuals and businesses as they offer cost-effective, large capacity storage and multi-functional services on a wide range of devices such as personal computers (PCs), Mac computers, and smart mobile devices (e.g. iPhones). However, cloud services have also been known to be exploited by criminals, and digital forensics in the cloud remains a challenge, partly due to the diverse range of cloud services and devices that can be used to access such services. Using SugarSync (a popular cloud storage service) as a case study, research was undertaken to determine the types and nature of volatile and non-volatile data that can be recovered from Windows 8, Mac OS X 10.9, Android 4 and iOS 7 devices when a user has carried out different activities such as upload and download of files and folders. We then document the various digital artefacts that could be recovered from the respective devices.

Please cite the paper as:

Mohammad Shariati, Ali Dehghantanha, Raymond Choo, “Sugar Sync Forensics”- Australian Journal of Forensic Sciences, Vol 48, Issue 1, pp.95-117 (JCR IF 2013IF:0.704) – DOI:10.1080/00450618.2015.1021379



Ali Dehghantanha

Dr. AliDehghantanha ( has served for more than a decade in a variety of industrial and academic positions with leading players in Cyber-Security and E-Commerce. He has long history of working in different areas of computer security as security researcher, malware analyzer, penetration tester, security consultant, professional trainer, and university lecturer. Ali is imminently qualified in the field of cyber security; he has an EU Marie Curie post-doctoral fellowship in cyber forensics (the Marie Curie Fellowships are Europe’s most competitive and prestigious award), Ph.D in Security in Computing and a number of professional qualifications namely SANS-GIAC Exploit Researcher and Advanced Penetration Tester (GXPN), SANS-GIAC Reverse Engineering Malware (GREM), SANS-GIAC Certified Forensics Analyst (GCFA), CCFP (Certified Cyber Forensic Professional), CISSP (Certified Information Systems Security Professional), and CEH (Certified Ethical Hacker). Ali is a fellow of the UK Higher Education Academy (HEA) and served as a keynote speaker for a number of security conferences namely the International Conference on Information Security and Cyber Forensics (InfoSec2015) speaking about “Detection and analysis IoT Malwares" at Cape-Town, South Africa, keynote speaker at the International Conference on Information Security and Digital Forensics (ISDF2015) speaking on "Efficient Analysis of Malware Campaigns" at Kuala Lumpor, Malaysia and invited speaker for ISACA EuroCACS/ISRM 2015 speaking about "Finding the Needle in Internet of Everything Haystack" at Copenhagen, Denmark. In 2015, he was an invited speaker for ISACA North-West UK meeting and talked about "Strategic Cyber Threat Intelligence".  He was one of the lead editors for Elsevier book titled “Contemporary digital forensic investigations of cloud and mobile applications” and a guest editor for a special issue on “Internet of Things: Security and Forensics Trends and Challenges” in the Elsevier Future Generation Computer Systems journal, guest editor for a special issue on "Big Data Applications in Cyber Security and Threat Intelligence" in IEEE Transactions on Big Data.  Ali is the founder of annual “International Conference in Cyber-Security, Cyber Warfare and Digital Forensics (CyberSec)” and served as editor in chief for the International Journal of Cyber Security and Digital Forensics (IJCSDF) between Jan 2012 to Jan 2015!