Paper | Presentation Conference Downloads Author
Discovering Windows Phone 8 Artifacts and Secrets DFRWS EU 2016 Mattia Epifani, Francesco Picasso, Marco Scarito
Evaluating Atomicity and Integrity of Correct Memory Acquisition Methods DFRWS EU 2016 Michael Gruhn, Felix Freiling
Evidence Exchange between Courts in Europe: A standard proposal to be discussed DFRWS EU 2016 Mariangela Biasiotti, Mattia Epifani, Fabrizio Turchi, J. Deprez, N. Matskanis
Facilitating Forensic Examinations of Multi-User Computer Environments through Session-to-Session Analysis of Internet History DFRWS EU 2016 David Gresty, Diane Gan, George Loukas, Constantinos Ierotheou
Forensic Analysis of Cloud-Native Artifacts DFRWS EU 2016 Vassil Roussev, Ph.D., Shane McCulley
Forensic Investigation of Cyberstalking Cases using Behavioural Evidence Analysis DFRWS EU 2016 Noora Al Mutawa, Joanne Bryce, Virginia Franqueira, Andrew Marrington
Fun with the Beast: Traffic Mining (TM) using Brain and Tranalyzer. Part 1: Fundamentals of Traffic Mining DFRWS EU 2016 Stefan Burschka
Fun with the Beast: Traffic Mining (TM) using Brain and Tranalyzer. Part 2: Using Tranalyzer DFRWS EU 2016 Stefan Burschka
Generic RAID Reassembly using Block-Level Entropy DFRWS EU 2016 Christian Zoubek, Sabine Seufert, Andreas Dewald
Internet Forums: A Source of Intelligence to Monitor the Online Diffusion of Doping Products DFRWS EU 2016 Thomas Pineau, Adrien Schopfer, Lionel Grossrieder, Pierre Esseiva, Quentin Rossy
Lest We Forget: Cold-Boot Attacks on Scrambled DDR3 Memory DFRWS EU 2016 Johannes Bauer, Michael Gruhn, Felix Freiling
Life on Clouds, A Forensics Overview DFRWS EU 2016 Marco Scarito, Mattia Epifani, Francesco Picasso
Microsoft Exchange Forensics: Looking Beyond User Data DFRWS EU 2016 Owen O'Connor
Plaso Parser Workshop DFRWS EU 2016 Daniel White
Pool Tag: Quick Scanning for Windows Memory Analysis DFRWS EU 2016 Joe Sylve, Ph.D., Vico Marziale, Ph.D., Golden Richard III, Ph.D.
Sponsored Tutorial: Analysis of Deleted Data DFRWS EU 2016 Roman Locher
Sponsored Tutorial: Windows Event Log Analysis - Gathering great information the easy way! DFRWS EU 2016 Roman Locher
Study and Analysis of Orweb Anonymizer on Android Devices DFRWS EU 2016 Claudia Meda, Mattia Epifani
Studying the Structure and Organisation of Illicit Drug Trafficking on Darknet Markets Through the Analysis of Digital, Chemical and Physical Traces DFRWS EU 2016 Damien Rhumorbarbe, Ludovic Staehli, Julian Broséus, Quentin Rossy, Pierre Esseiva
The Digital Evidence Dashboard Project DFRWS EU 2016 Hans Henseler, Ph.D., Adrie Stander
Tiered Forensic Methodology Model for Digital Field Triage by Non-Digital Evidence Specialists DFRWS EU 2016 Ben Hitchcock, Nhien An Le Khac, Mark Scanlon, Ph.D.
TLSkex: Harnessing Virtual Machine Introspection for Decrypting TLS Communication DFRWS EU 2016 Benjamin Taubmann, Christoph Freidrich, Dominik Dusold, Hans Reiser
Virtual Currencies DFRWS EU 2016 André Fischer, Jakob Hasse, Thomas Gloe
2016 DFRWS Challenge DFRWS USA 2015 Michael McCarrin, Brian Greunke, Robert Beverly, Ph.D.
Advancing Mac OS X Rootkit Detection DFRWS USA 2015 Andrew Case, Golden Richard III, Ph.D.
Archival Science, Digital Forensics, and New Media Art DFRWS USA 2015 Dianne Dietrich, Frank Adelstein, Ph.D.
Automatic Classification of Object Code Using Machine Learning DFRWS USA 2015 John Clemens
BinComp: A Stratified Approach to Compiler Provenance Attribution DFRWS USA 2015 Saed Alrabaee, Paria Shirani, Mourad Debbabi, Ashkan Rahimian, Lingyu Wang
Database Forensic Analysis Through Internal Structure Carving DFRWS USA 2015 James Wagner, Alexander Rasin, Jonathan Grier
Detecting Very Large Sets Of Referenced Files At 40:100 Gbe, Especially Mp4 Files DFRWS USA 2015 Adrien Larbanet, Jonas Lerebours, Jean Pierre David
E-mail Authorship Attribution Using Customized Associative Classification DFRWS USA 2015 Michael Schmid, Farkhund Iqbal, Benjamin Fung
Federated Testing: Shared Test Materials from the CFTT Program at NIST DFRWS USA 2015 Ben Livelsberger, James Lyle
Finding your naughty BITS DFRWS USA 2015 Matthew Geiger
Graph-Theoretic Characterization of Cyber-threat Infrastructures DFRWS USA 2015 Amine Boukhtouta, Djedjiga Mouheb, Mourad Debbabi, Omar Alfandi, Farkhund Iqbal, May El Barachi
Hash-Based Carving: Searching Media For Complete Files And File Fragments With Sector Hashing And hashdb DFRWS USA 2015 Simson Garfinkel, Ph.D., Michael McCarrin
Inferring Past Activity from Partial Digital Artifacts DFRWS USA 2015 James Jones, Tahir Khan, Kathryn Laskey, Alexander Nelson, Ph.D., Mary Laamanen, Douglas White
LINCS: Towards Building a Trustworthy Litigation Hold Enabled Cloud Storage System DFRWS USA 2015 Shams Zawoad, Ragib Hasan, John Grimes
Network And Device Forensic Analysis Of Android Social-Messaging Applications DFRWS USA 2015 Daniel Walnycky, Ibrahim Baggili, Andrew Marrington, Frank Breitinger, Jason Moore
New Acquisition Method Based On Firmware Update Protocols For Android Smartphones DFRWS USA 2015 Seung Jei Yang, Jung Ho Choi, Ki Bom Kim, Tae Joo Chang
Privacy-Preserving Email Forensics DFRWS USA 2015 Frederik Armknecht, Andreas Dewald, Michael Gruhn
Rapid Forensic Imaging of Large Disks with Sifting Collectors DFRWS USA 2015 Jonathan Grier, Golden Richard III, Ph.D.
The Chain Of Custody: A Big Misconception DFRWS USA 2015 Tobias Eggendorfer
The Impact of GPU-Assisted Malware on Memory Forensics: A Case Study DFRWS USA 2015 Davide Balzarotti, Roberto Di Pietro, Antonio Villani
Video Authentication Using File Structure and Metadata DFRWS USA 2015 Jake Hall
Wirespeed: Extending The AFF4 Container Format For Scalable Acquisition And Live Analysis DFRWS USA 2015 Bradley Schatz, Ph.D.
A Scalable File Based Data Store For Forensic Analysis DFRWS EU 2015 Flavio Cruz, Andreas Moser, Michael Cohen
A Theoretic Framework For Evaluating Similarity Digesting Tools DFRWS EU 2015 Liwei Ren
Acquisition and Analysis of Compromised Firmware Using Memory Forensics DFRWS EU 2015 Johannes Stüttgen, Stefan Voemel, Michael Denzel
Characterization Of The Windows Kernel Version Variability For Accurate Memory Analysis DFRWS EU 2015 Michael Cohen
Designing Robustness and Resilience in Digital Investigation Laboratories DFRWS EU 2015 Philipp Amann, Joshua James
Digital Forensics - Behind the Scenes DFRWS EU 2015 David-Olivier Jaquet-Chiffelle
Fast and Generic Malware Triage Using openioc_scan Volatility Plugin DFRWS EU 2015 Takahiro Haruyama
Fast Contraband Detection In Large Capacity Disk Drives DFRWS EU 2015 Phil Penrose, William Buchanan, Richard Macfarlane
Forensic Analysis of a Sony PlayStation 4 - A First Look DFRWS EU 2015 Allen Davies, Huw Read, Konstantinos Xynos, Iain Sutherland
How I Forced An Android Vulnerability Into Bypassing Mdm Restrictions + Diy - Android Malware Analysis DFRWS EU 2015 Zubair Ashraf
How To Search Extracted Data DFRWS EU 2015 Javier Collado
Hviz HTTP(S) Traffic Aggregation and Visualization for Network Forensics DFRWS EU 2015 David Gugelmann, Fabian Gasser, Bernhard Ager, Vincent Lenders
Investigating Evidence of Mobile Phone Usage by Drivers in Road Traffic Accidents DFRWS EU 2015 Graeme Horsman, Lynne Conniss
Leveraging CybOX to Standardize Representation and Exchange of Digital Forensic Information DFRWS EU 2015 Eoghan Casey, Ph.D., Greg Back, Sean Barnum
On Criteria for Evaluating Similarity Digest Schemes DFRWS EU 2015 Jonathan Oliver
SIGMA - A Semantic Integrated Graph Matching Approach For Identifying Reused Functions In Binary Code DFRWS EU 2015 Saed Alrabaee, Paria Shirani, Lingyu Wang, Mourad Debbabi
Smart TV Forensics - Digital Traces On Televisions DFRWS EU 2015 Abdul Boztas, Remko Riethoven, Mark Roeloffs
Spam Campaign Detection, Analysis, and Investigation DFRWS EU 2015 Son Dinh, Taher Azeb, Francis Fortin, Djedjiga Mouheb, Mourad Debbabi
The Evidence Project - Bridging The Gap In The Exchange Of Digital Evidence Across Europe DFRWS EU 2015 Fabrizio Turchi
Tor Forensics on Windows OS DFRWS EU 2015 Mattia Epifani, Marco Scarito, Francesco Picasso
A Complete Formalized Knowledge Representation Model for Advanced Digital Forensics Timeline Analysis DFRWS USA 2014 Yoan Chabot, Aurelie Bertaux, Christophe Nicolle, Tahar Kechadi
A Forensically Robust Method For Acquisition Of iCloud Data DFRWS USA 2014 Kurt Oestreicher
Cooperative Mode - Comparative Storage Metadata Verification Applied To The Xbox 360 DFRWS USA 2014 Alex Nelson, Ph.D., Erik Steggall, Darrell Long
Design Tradeoffs for Developing Fragmented Video Carving Tools DFRWS USA 2014 Eoghan Casey, Ph.D., Rikkert Zoun
Developing a New Digital Forensics Curriculum DFRWS USA 2014 Anthony Lang, Masooda Bashir, Roy Campbell, Lizanne Destefano
Digital Investigations for IPv6-Based Wireless Sensor Networks DFRWS USA 2014 Vijay Kumar, George Oikonomou, Theo Tryfonas, Dan Page, Iain Phillips
Enabling Digital Forensics Practices in Libraries, Archives and Museums - The BitCurator Experience DFRWS USA 2014 Christopher Lee, Kam Woods
Extracting Hidden Messages in Steganographic Images DFRWS USA 2014 Tu-Thach Quach
Image-Based Kernel Fingerprinting DFRWS USA 2014 Vassil Roussev, Ph.D., Irfan Ahmed, Thomas Sires
In Lieu of Swap - Analyzing Compressed RAM in Mac OS X and Linux DFRWS USA 2014 Golden Richard III, Ph.D., Andrew Case
Information Assurance In A Distributed Forensic Cluster DFRWS USA 2014 Nick Pringle, Mikhaila Burgess
Media Forensics Analysis In Digital Times DFRWS USA 2014 Catalin Grigoras
Memory Forensics with Hyper-V Virtual Machines DFRWS USA 2014 Wyatt Roersma
Multidimensional Investigation of Source Port 0 Probing DFRWS USA 2014 Elias Bou-Harb, Nour-Eddine Lakhdari, Hamad Binsalleeh, Mourad Debbabi
Preliminary Forensic Analysis Of The Xbox One DFRWS USA 2014 Jason Moore, Ibrahim Baggili, Andrew Marrington, Armindo Rodrigues
Ranking Algorithms For Digital Forensic String Search Hits DFRWS USA 2014 Nicole Beebe, Ph.D., Lishu Liu
Some Practical Thoughts Concerning Active Disk Antiforensics DFRWS USA 2014 Travis Goodspeed
Testing the Forensic Soundness of Forensic Examination Environments on Bootable Media DFRWS USA 2014 Ahmed Fathy Abdel Latif Mohamed, Andrew Marrington, Farkhund Iqbal, Ibrahim Baggili
The Application Of Reverse Engineering Techniques Against The Arduino Microcontroller To Acquire Uploaded Applications DFRWS USA 2014 Steve Watson
The National Software Reference Library DFRWS USA 2014 Douglas White
The Regional Computer Forensics Lab System DFRWS USA 2014 Sean O'Brien
These Logs Were Made for Talking DFRWS USA 2014 Matt Bromiley
VMI-PL - A Monitoring Language for Virtual Platforms Using Virtual Machine Introspection DFRWS USA 2014 Florian Westphal, Stefan Axelsson, Christian Neuhaus, Andreas Polze
Automated Evaluation Of Approximate Matching Algorithms On Real Data DFRWS EU 2014 Frank Breitinger, Vassil Roussev, Ph.D.
BitTorrent Sync - First Impressions and Digital Forensic Implications DFRWS EU 2014 Jason Farina, Mark Scanlon, Ph.D., Tahar Kechadi
Digital Forensics as a Service - a Game Changer DFRWS EU 2014 Ruud van Baar, Harm van Beek, Erwin van Eijk
Fast Indexing Strategies for Robust Image Hashes DFRWS EU 2014 Christian Winter, Martin Steinebach, York Yannikos
Forensic Analysis of Video File Formats DFRWS EU 2014 Thomas Gloe, André Fischer, Matthias Kirchner
Information Assurance In A Distributed Forensic Cluster DFRWS EU 2014 Nicholas Pringle, Mikhaila Burgess
Key-Hiding On The ARM Platform DFRWS EU 2014 Alexander Nilsson, Marcus Andersson, Stefan Axelsson
OBA2 - An Onion Approach to Binary Code Authorship Attribution DFRWS EU 2014 Saed Alrabaee, Noman Saleem, Stere Preda, Lingyo Wang, Mourad Debbabi
On The Database Lookup Problem Of Approximate Matching DFRWS EU 2014 Frank Breitinger, Harald Baier, Douglas White
OpenLV - Empowering Investigators and First-Responders in the Digital Forensics Process DFRWS EU 2014 Brian Kaplan, Matthew Geiger
Out Of Sight, But Not Out Of Mind - Traces Of Nearby Devices' Wireless Transmissions In Volatile Memory DFRWS EU 2014 Wicher Minnaard
Practical Use of Approximate Hash Based Matching in Digital Investigations DFRWS EU 2014 Petter Christian Bjelland, André Årnes, Katrin Franke