Paper | Presentation Conference Downloads Author
Digital forensic analysis of encrypted database files in instant messaging applications on Windows operating systems DFRWS EU 2019 Jusop Choi, Jaegwan Yu, Sangwon Hyun, Hyoungshick Kim
Comprehending the IoT Cyber Threat Landscape: A Data Dimensionality Reduction Technique to Infer and Characterize Internet-scale IoT Probing Campaigns DFRWS EU 2019 Morteza Safaei, Elias Bou-Harb (National Cyber Forensics and Training Alliance / Concordia University ), Kavita Varma, Nataliia Neshenko, Dimitris Pados, Kim-Kwang Raymond Choo
WhatsApp Forensics: Advanced Methods of Extraction and Decryption DFRWS EU 2019 Tanya Pankova
Using the Object ID index as an investigative approach for NTFS file systems DFRWS EU 2019 Rune Nordvik, Fergus Toolan (Norwegian Police University College), Stefan Axelsson (Norwegian University of Science and Technology)
Towards Exact and Inexact Approximate Matching of Executable Binaries DFRWS EU 2019 Lorenz Liebler, Harald Baier (University of Applied Sciences, Darmstadt)
The rise of evil HID devices DFRWS EU 2019 Franck Bitsch, Arthur Villeneuve
The iPhone Health App from a forensic perspective: can steps and distances registered during walking and running be used as digital evidence? DFRWS EU 2019 Jan Peter van Zandwijk, Abdul Boztas
SyncTriage: Using synchronisation artefacts to optimize acquisition order DFRWS EU 2019 Christopher Hargreaves, Angus Marshall
Probabilistic Reasoning In Digital Forensics DFRWS EU 2019 Pavel Gladyshev, Ph.D. (University College Dublin), Babak Habibnia (University College Dublin)
Overview of Digital Forensics at KRIPOS from Head of the Digital Forensic Section DFRWS EU 2019 Steffen Thorkildsen
Malware Reverse Engineering Workshop DFRWS EU 2019 Geir Olav Dyrkolbotn (NTNU), Sergii Banin
MalDy: Portable, Data-Driven Malware Detection using Language Processing and Machine Learning Techniques on Behavioral Analyses Reports DFRWS EU 2019 ElMouatez Billah Karbab (Concordia University), Mourad Debbabi (Concordia University)
IoT Forensic Challenges and Opportunities for Digital Traces DFRWS EU 2019 Francesco Servida, Eoghan Casey, Ph.D. (University of Lausanne)
Improving file-level fuzzy hashes for malware variant classification DFRWS EU 2019 Ian Shiel, Stephen O'Shaughnessy
Forensic Source Identification using JPEG Image Headers: The Case of Smartphones DFRWS EU 2019 Patrick Mullan, Christian Riess, Felix Freiling (Friedrich-Alexander-University)
Forensic Acquisition of Modern Evidence DFRWS EU 2019 Bradley Schatz, Ph.D. (Schatz Forensic)
Exchange of cyber-investigation information between organizations and across borders using CASE (with Demo) DFRWS EU 2019 Vik Harichandran, Mattia Epifani (ITTIG - CNR), Nikolaos Matskanis, Deborah Nichols
Digital traces: a model for influencing parameters DFRWS EU 2019 Elénore Ryser (University of Lausanne), David-Olivier Jaquet-Chiffelle (University of Lausanne)
Deleted File Fragment Dating by Analysis of Allocated Neighbors DFRWS EU 2019 Ahmed Bahjat and Jim Jones
COST CA17124 Talk, Digital Investigation Journal Update and Lightning Talks DFRWS EU 2019
Clearly Conveying the Science behind Automated Correlation Systems DFRWS EU 2019 Timothy Bollé (University of Lausanne), Eoghan Casey, Ph.D. (University of Lausanne)
Chrome Nuts and Bolts: ChromeOS /Chromebook Forensics DFRWS EU 2019 Jessica Hyde (George Mason University / Magnet Forensics ), Jad Saliba
Characteristics and Detectability of Windows Auto-Start Extensibility Points in Memory Forensics DFRWS EU 2019 Daniel Uroz, Ricardo Rodriguez
Apple watch forensics: is it ever possible, and what is the profit? DFRWS EU 2019 Mattia Epifani (ITTIG - CNR), Vladimir Katalov (ElcomSoft)
Advancing the Exchange of Cyber-Investigation Information between organizations and across borders using CASE DFRWS EU 2019 Eoghan Casey, Ph.D. (University of Lausanne), Fabrizio Turchi, Nikolaos Matskanis
A Road Map for Digital Forensic Research DFRWS USA 2001
The Mobile Forensic Platform DFRWS USA 2002 Frank Adelstein, Ph.D. (ATC-NY)
First Responders Evidence Disk DFRWS USA 2002 Jesse Kornblum (AFOSI)
Analyzing the Difficulties in Backtracking the Onion Router’s Traffic DFRWS USA 2002 Dario Forte (Guardia di finanza Milano)
A Lessons Learned Repository for Computer Forensics DFRWS USA 2002 Warren Harrison (Portland State University), George Heuston (Hillsboro Police Department), Mark Morrissey (Portland State University), David Aucsmith (Intel Corporation), Sarah Mocas (Portland State University), and Steve Russelle (Portland Police Bureau)
The International Journal of Digital Evidence DFRWS USA 2002 Gary Gordon and John Leeson
Testing Disk Imaging Tools DFRWS USA 2002 James Lyle (NIST)
Steganalysis with a Computational Immune System DFRWS USA 2002 Jacob Jackson, Gregg Gunsch, Roger Claypoole, and Gary Lamont (Air Force Institute of Technology)
Language and Gender Author Cohort Analysis of E-mail for Computer Forensics DFRWS USA 2002 Olivier de Vel, Malcolm Corney, Alison Anderson, and George Mohay (Queensland University of Technology)
Defining Digital Forensic Examination and Analysis Tools DFRWS USA 2002 Brian Carrier, Ph.D. (@stake)
Confronting Encryption in Computer Investigations DFRWS USA 2002 Eoghan Casey, Ph.D. (Yale University)
Can Digital Evidence Endure the Test of Time DFRWS USA 2002 Michael Duren and Chet Hosmer (WetStone Technologies, Inc)
Automatic Reassembly of Document Fragments via Data Compression DFRWS USA 2002 Kulesh Shanmugasundaram (Polytechnic University)
Audit Data Reduction Using Neural Networks and Support Vector Machines DFRWS USA 2002 Srinivas Mukkamala and Andrew Sung (New Mexico Institute of Mining and Technology)
Putting the Horse in Front of the Cart DFRWS USA 2003 Peter Stephenson
ForNet – A Distributed Network Forensics System DFRWS USA 2003 Kulesh Shanmugasundaram
Forensic Network Analysis Tools – Strengths, Weaknesses, and Future Needs DFRWS USA 2003 Eoghan Casey, Ph.D. (University of Lausanne)
File Classification Using Sub-Sequence Kernels DFRWS USA 2003
Discovering Covert Digital Evidence DFRWS USA 2003 Chet Hosmer and Christopher Hyde
Detecting Covert Communications on the Internet – Some Challenges and Solutions DFRWS USA 2003 R. Chandramouli
Cross-Validation of Filesystem Layers for Computer Forensics DFRWS USA 2003 Joe Sremack
Building Theoretical Underpinnings for Digital Forensics Research DFRWS USA 2003 Sarah Mocas
An Improved Raw Quick Pairs Blind Steganalysis Method DFRWS USA 2003 Benjamin Rodriquez
A Functional Reference Model of Passive Network Origin Identification DFRWS USA 2003 Thomas Daniels
Secure Digital Camera DFRWS USA 2004 Paul Blythe (SUNY Binghamton) and Jessica Fridrich (SUNY Binghamton)