Paper | Presentation Conference Downloads Author
A Comparative Study on Data Protection Legislations and Government Standards to Implement Digital Forensic Readiness as Legal Requirement DFRWS EU 2018 Sungmi Park, Nikolay Akatyev, Donghyun Kim, Jisoo Hwang, Woonseon Yoo, Hyunwoo Shin, Changhee Han, Kim Jong Hyun, Yunsik Jake Jang
A Standardized Corpus for SQLite Database Forensics DFRWS EU 2018 Sven Schmitt, Felix Freiling, Sebastian Nemetz
Advanced Acquisition & Analysis with the AFF4 DFRWS EU 2018 Bradley Schatz, Ph.D.
Anti-Forensics in ext4: On Secrecy and Usability of Timestamp-Based Data Hiding DFRWS EU 2018 Thomas Göbel, Harald Baier
Building Stack Traces From Memory Dump of Windows x64 DFRWS EU 2018 Yuto Otsuki, Yuhei Kawakoya, Makoto Iwamura, Jun Miyoshi, Kazuhiko Ohkubo
CASE Technical Implementation Workshop DFRWS EU 2018 Eoghan Casey, Ph.D., Ryan Griffith, Harm van Beek, Erwin van Eijk, Jared Stroud
Controlled Experiments in Digital Evidence Tampering DFRWS EU 2018 Felix Freiling, Leonhard Hösch
Data-Driven Approach for Automatic Telephony Threat Analysis and Campaign Detection DFRWS EU 2018 Houssem Eddine Bordjiba, ElMouatez Billah Karbab, Mourad Debbabi
Decision-Theoretic File Carver for Triage Situations DFRWS EU 2018 Pavel Gladyshev, Ph.D.
Educating Judges, Prosecutors and Lawyers  in the Use of Digital Forensic Experts DFRWS EU 2018 Hans Henseler, Ph.D., Sophie Van Loenhout
Forensic Framework to Identify Local vs Synced Artifacts DFRWS EU 2018 Jacques Boucher, Nhien An Le Khac
Forensicating the Apple TV DFRWS EU 2018 Mattia Epifani, Claudia Meda
Forensics Acquisition - Analysis and Circumvention of Samsung Secure Boot Enforced Common Criteria Mode DFRWS EU 2018 Gunnar Alendal, Geir Olav Dyrkolbotn, Stefan Axelsson
Image and Video Forensics: Enhancement and Analysis DFRWS EU 2018 Sebastiano Battiato, Martino Jerian
Image and Video Forensics: Fundamentals on Image Source Identification and Authenticity Verification DFRWS EU 2018 Roberto Caldelli, Irene Amerini
iOS Physical Acquisition Workflow: From Jailbreaking to Extraction DFRWS EU 2018 Oleg Afonin, Vladimir Katalov
MalDozer: Automatic Framework for Android Malware Chasing Using Deep Learning DFRWS EU 2018 ElMouatez Billah Karbab, Mourad Debbabi, Abdelouahid Derhab, Djedjiga Mouheb
Nugget: A Digital Forensics Language DFRWS EU 2018 Christopher Stelly, Vassil Roussev, Ph.D.
Obtaining Critical Real-Time Evidence From the Cloud DFRWS EU 2018 Vladimir Katalov
OpenForensics: A Digital Forensics GPU Pattern Matching Approach for the 21st Century DFRWS EU 2018 Ethan Bayne, Ian Ferguson, Adam Sampson
Styx: Countering Robust Memory Acquisition DFRWS EU 2018 Ralph Palutke, Felix Freiling
The Reliability of Clocks as Digital Evidence Under Low Voltage Conditions DFRWS EU 2018 Jens-Petter Sandvik, André Årnes
Using Computed Similarity of Distinctive Digital Traces to Evaluate Non-obvious Links and Repetitions in Cyber-investigations DFRWS EU 2018 Timothy Bollé, Eoghan Casey, Ph.D.
Where Did That Incriminating Evidence Come From? DFRWS EU 2018 Martin Westman
Advancing the AFF4 to the Challenges of Volatile Memory and Single Hashes DFRWS USA 2017 Bradley Schatz, Ph.D.
AFIDS: Another Forensic Image Data Set DFRWS USA 2017 Mark Guido, Michael McCarrin, David Baker, Vik Harichandran, Sam Brothers
Analyzing User-Event Data Using Score-based Likelihood Ratios with Marked Point Processes DFRWS USA 2017 Christopher Galbraith, Padhraic Smyth
Availability of Datasets for Digital Forensics - and What is Missing DFRWS USA 2017 Cinthya Grajeda Mendez, Frank Breitinger, Ibrahim Baggili
Browser Artifacts of Google Drive and Gmail DFRWS USA 2017 Elizabeth Schweinsberg
Carving Database Storage to Detect and Trace Security Breaches DFRWS USA 2017 James Wagner, Alexander Rasin, Boris Glavic, Karen Heart, Jacob Furst, Lucas Bressan, Jonathan Grier
Deleted File Persistence on Digital Media DFRWS USA 2017 Jim Jones, Tahir Khan
Digital Forensic Approaches for Amazon Alexa Ecosystem DFRWS USA 2017 Hyunji Chung, Jungheum Park, Sangjin Lee
DROP (DRone Open source Parser) Your Drone - Forensic Analysis of the DJI Phantom III DFRWS USA 2017 Devon Clark, Christopher Meffert, Ibrahim Baggili, Frank Breitinger
Extending The Sleuth Kit and its Underlying Model for Pooled Storage File System Forensic Analysis DFRWS USA 2017 Jan-Niclas Hilgert, Martin Lambertz, Daniel Plohmann
Finding Digital Evidence in Mobile Devices DFRWS USA 2017 Hans Henseler, Ph.D., Vince Noort
Gaslight: A Comprehensive Fuzzing Architecture for Memory Forensics Frameworks DFRWS USA 2017 Andrew Case, Arghya Das, Seung-Jong Park, Ram Ramanujam, Golden Richard III, Ph.D.
Insights Gained From Constructing a Large Scale Dynamic Analysis Platform DFRWS USA 2017 Cody Miller, Dae Glendowne, Henry Cook, Demarcus Thomas, Patrick Pape, Chris Lanclos
Leveraging the SRTP protocol for Over-The-Network Memory Acquisition of a GE Fanuc Series 90-30 DFRWS USA 2017 Denton George, Filip Karpisek, Frank Breitinger, Ibrahim Baggili
Linux Memory Forensics: Dissecting the User Space Process Heap DFRWS USA 2017 Frank Block, Andreas Dewald
Memory Based Dynamic Malware Analysis DFRWS USA 2017 Endre Bangerter, Jonas Wagner
Pull It Together: Enabling Interoperability of Digital Forensic Systems Using a Standard Representation and Supporting API DFRWS USA 2017 Sean Barnum, Ryan Griffith
SCADA Network Forensics of the PCCC Protocol DFRWS USA 2017 Saranyan Senthivel, Irfan Ahmed, Vassil Roussev, Ph.D.
SCARF: A Container-Based Approach to Cloud-Scale Digital Forensic Processing DFRWS USA 2017 Christopher Stelly, Vassil Roussev, Ph.D.
Time-of-Recording Estimation for Audio Recordings DFRWS USA 2017 Lilei Zheng, Ying Zhang, Chien Eao Lee, Vrizlynn Thing
Track 1: A Light Introduction to Linux Malware Analysis Workshop DFRWS USA 2017 Adam Pridgen
Track 1: Modern Password Cracking Systems Workshop DFRWS USA 2017 Sudhir Aggarwal, Shiva Houshmand
Track 2: Rekall Everywhere - DFIR in the Cloud Workshop DFRWS USA 2017 Michael Cohen
Track 2: SMS Recovery From NAND Memory of Erased eMMC Chip Workshop DFRWS USA 2017 Sasha Sheremetov
Use of Generalized Hough Transform on Interpretation of Memory Dumps DFRWS USA 2017 Paulo Roberto Nunes de Souza, Pavel Gladyshev, Ph.D.
Virtualization-Based Security: A Forensics Perspective DFRWS USA 2017 Jason Hale
AFEIC: Advanced Forensic Ext4 Inode Carving DFRWS EU 2017 Andreas Dewald, Sabine Seufert
Behavioral Service Graphs: A Formal Data-Driven Approach for Prompt Investigation of Enterprise and Internet-Wide Infections DFRWS EU 2017 Elias Bou-Harb, Mark Scanlon, Ph.D.
Bit-Errors as a Source of Forensic Information in NAND Flash Memory DFRWS EU 2017 Jan Peter van Zandwijk
Building Forensics Tools in Go Workshop (Part 1) DFRWS EU 2017 Joe Sylve, Ph.D., Vico Marziale, Ph.D.
Characterizing Loss of Forensic Information due to Abstraction Layers DFRWS EU 2017 Felix Freiling, Thomas Glanzmann, Hans Reiser
Chip Off Workshop DFRWS EU 2017 Sasha Sheremetov
Do Digital Investigators Have To Program? A Controlled Experiment in Digital Investigation DFRWS EU 2017 Felix Freiling, Christian Zoubek
eMMC Chip Off – Benefits and Risks Workshop DFRWS EU 2017 Martin Westman
Evidence Gathering for Network Security and Forensics DFRWS EU 2017 Dinil Mon Divakaran, Kar Wai Fok, Ido Nevat, Vrizlynn Thing
EviPlant: An Efficient Digital Forensic Challenge Creation, Manipulation and Distribution Solution DFRWS EU 2017 Mark Scanlon, Ph.D., Xiaoyu Du, David Lillis
Force Open: Lightweight Black Box File Repair DFRWS EU 2017 Karl Wust, Petar Tsankov, Sasa Radomirovic, Mohammad Torabi Dashti
Forensic Analysis of Deduplicated File Systems DFRWS EU 2017 Dario Lanterna, Antonio Barili
Forensic Artifacts in Windows 10 Workshop DFRWS EU 2017 Roman Locher
Hands-on Introduction to MattockFS Workshop DFRWS EU 2017 Rob Meijer
Improving the Reliability of Chip-Off Forensic Analysis of NAND Flash Memory Devices DFRWS EU 2017 Aya Fukami, Saugata Ghose, Yixin Luo, Yu Cai, Onur Mutlu
Introduction to Digital Forensic Prolog Workshop DFRWS EU 2017 Pavel Gladyshev, Ph.D.
Network Forensic Investigation in OpenFlow Networks with ForCon DFRWS EU 2017 Daniel Spiekermann, Jorg Keller, Tobias Eggendorfer
Picking Up the Trash: Exploiting Generational GC for Memory Analysis DFRWS EU 2017 Adam Pridgen, Simson Garfinkel, Ph.D., Dan Wallach
Selective Deletion of Non-Relevant Data DFRWS EU 2017 Christian Zoubek, Konstantin Sack
A practical approach to analyze smartphone backup data as a digital evidence DFRWS USA 2016 Jaehyeok Han, Sangjin Lee
Anti-forensics: Furthering digital forensic science through a new extended, granular taxonomy DFRWS USA 2016 Kevin Conlan, Ibrahim Baggili, Frank Breitinger
BinGold: Towards Robust Binary Analysis by Extracting the Semantics of Binary Code as Semantic Flow Graphs (SFGs) DFRWS USA 2016 Saed Alrabaee, Lingyu Wang, Mourad Debbabi
Coding Digital Forensics Tools in Go Workshop (part 1) DFRWS USA 2016 Lodovico Marziale, Joe Sylve, Ph.D.
Coding Digital Forensics Tools in Go Workshop (part 2) DFRWS USA 2016 Lodovico Marziale, Joe Sylve, Ph.D.
CuFA: a more formal definition for digital forensic artifacts DFRWS USA 2016 Vikram Harichandran, Daniel Walnycky, Ibrahim Baggili, Frank Breitinger
Data Sets Available from the National Software Reference Library DFRWS USA 2016 Douglas White
Database Image Content Explorer: Carving Data That Does Not Officially Exist DFRWS USA 2016 James Wagner, Alexander Rasin, Jonathan Grier
dbling: Identifying Extensions Installed on Encrypted Web Thin Clients DFRWS USA 2016 Mike Mabey, Adam Doupe, Ziming Zhao, Gail-Joon Ahn
Deleting collected digital evidence by exploiting a widely adopted hardware write blocker DFRWS USA 2016 Christopher Meffert, Ibrahim Baggili, Frank Breitinger
Detecting Objective-C Malware Through Memory Forensics DFRWS USA 2016 Andrew Case, Golden Richard III, Ph.D.
Digital Forensics as a Service: an update DFRWS USA 2016 Harm van Beek
Fingerprinting Android Packaging: Generating DNAs for Malware Detection DFRWS USA 2016 ElMouatez Billah Karbab, Mourad Debbabi, Djedjiga Mouheb
Forensic investigations in SDN networks DFRWS USA 2016 Izzat Alsmadi, Samer Khamaiseh
Hands-On With Open Source Similarity Digests DFRWS USA 2016 Jon Oliver
IED Forensics: Hunting the IED Engineer DFRWS USA 2016 Larry Leibrock
InVEST: Intelligent Visual Email Search and Triage DFRWS USA 2016 Jay Koven, Enrico Bertini, Luke Dubois, Nasir Memon
PeekaTorrent: Leveraging P2P Hash Values for Digital Forensics DFRWS USA 2016 Sebastian Neuner, Martin Schmiedecker, Edgar Weippl
Practical Analyzing the Relation of Wallet Addresses in Bitcoin DFRWS USA 2016 Hiroki Kuzuno, Christian Karam
Rapid differential forensic imaging of mobile devices DFRWS USA 2016 Mark Guido, Justin Grover, Jonathan Buttner
Rapid, Agentless, and Scalable Forensics and Incident Response Using WARDEN DFRWS USA 2016 Adam Meily, Sean LaPlante, Richard Gloo
Recovery method of deleted records and tables from ESE Database DFRWS USA 2016 Kim Jeonghyeon, Park Aran, Lee Sangjin
Recovery of Heavily Fragmented JPEG Files DFRWS USA 2016 Yanbin Tang, Junbin Fang, K.P. Chow, Siu Ming, Jun Xu, Bo Feng, Qiong Li, Qi Han
Robust Bootstrapping Memory Analysis against Anti-forensics DFRWS USA 2016 Kyoungho Lee, Hyunuk Hwang, Kibom Kim, Bongnam Noh
Table Topping for Incident and Data Breach Response DFRWS USA 2016 Brian Roux
Time is on my side: Steganography in filesystem metadata DFRWS USA 2016 Sebastian Neuner, Artemios Voyiatzis, Martin Schmiedecker, Stefan Brunthaler, Stefan Katzenbeisser, Edgar Weippl
Using GRR and Rekall for Scalable Memory Analysis (part 1) DFRWS USA 2016 Michael Cohen
Using GRR and Rekall for Scalable Memory Analysis (part 2) DFRWS USA 2016 Michael Cohen
A Method and a Case Study for the Selection of the Best Available Tool for Mobile Device Forensics Using Decision Analysis DFRWS EU 2016 Shahzad Saleem, Oliver Popov, Ibrahim Baggili
A Scalable Authorship Verification Method for Different Languages, Genres and Topics DFRWS EU 2016 Oren Halvani, Christian Winter, Anika Pflug
Automatic Profile Generation For Live Linux Memory Analysis DFRWS EU 2016 Michael Cohen, Arkadiusz Socala