| Paper | Presentation | Conference | Downloads | Author |
|---|---|---|---|
| Surveying The User Space Through User Allocations | DFRWS USA 2012 | Andrew White (Dell Secureworks), Bradley Schatz, Ph.D. (Schatz Forensic), Ernest Foo | |
| Finding and Identifying Text in 900+ Languages | DFRWS USA 2012 | Ralf Brown (CMU) | |
| Content Triage with Similarity Digests – The M57 Case Study | DFRWS USA 2012 | Vassil Roussev, Ph.D. (University of New Orleans), Candice Quates | |
| Bin-Carver – Automatic Recovery of Binary Executable Files | DFRWS USA 2012 | Scott Hand, Zhiqiang Lin (The Ohio State University), Guofei Gu, Bhavani Thuraisingham | |
| An Analysis of Ext4 for Digital Forensics | DFRWS USA 2012 | Kevin Fairbanks | |
| Acquiring Forensic Evidence from Infrastructure-as-a-Service Cloud Computing | DFRWS USA 2012 | Josiah Dykstra, Ph.D. (National Security Agency), Alan Sherman | |
| A General Strategy for Differential Forensic Analysis | DFRWS USA 2012 | Simson Garfinkel, Ph.D. (U.S. Census Bureau), Alex Nelson, Ph.D. (NIST), Joel Young | |
| Modern Ships Voyage Data Recorders – A Forensics Perspective on the Costa Concordia Shipwreck | DFRWS USA 2013 | Mario Piccinelli and Paolo Gubian | |
| Language Translation for File Paths | DFRWS USA 2013 | Neil Rowe (Naval Postgraduate School), Riqui Schwamm, and Simson Garfinkel, Ph.D. (Naval Postgraduate School) | |
| Improved Recovery and Reconstruction of DEFLATEd Files | DFRWS USA 2013 | Ralf Brown (CMU) | |
| Design and Implementation of FROST – Digital Forensic Tools for the OpenStack Cloud Computing Platform | DFRWS USA 2013 | Josiah Dykstra, Ph.D. (National Security Agency) and Alan Sherman | |
| Anti-Forensic Resilient Memory Acquisition | DFRWS USA 2013 | Johannes Stüttgen (University of Erlangen-Nuremberg) and Michael Cohen (Google) | |
| An Evaluation Platform for Forensic Memory Acquisition Software | DFRWS USA 2013 | Stefan Voemel and Johannes Stuettgen | |
| Unicode Search of Dirty Data, Or How I Learned to Stop Worrying and Love Unicode Technical Standard 18 | DFRWS USA 2013 | Jon Stewart, Joel Uckelman | |
| Integrity Verification of User Space Code | DFRWS USA 2013 | Andrew White (Dell Secureworks), Bradley Schatz, Ph.D. (Schatz Forensic), Ernest Foo | |
| FRASH – A Framework To Test Algorithms Of Similarity Hashing | DFRWS USA 2013 | Frank Breitinger (University of New Haven), Georgios Stivaktakis, Harald Baier (University of Applied Sciences, Darmstadt) | |
| File Fragment Encoding Classification – An Empirical Approach | DFRWS USA 2013 | Vassil Roussev, Ph.D. (University of New Orleans), Candice Quates | |
| Automated Identification of Installed Malicious Android Applications | DFRWS USA 2013 | Mark Guido (The MITRE Corporation), Justin Grover (The MITRE Corporation), Jared Ondricek, Dave Wilburn, Drew Hunt, Thanh Nguyen | |
| Android Forensics – Automated Data Collection And Reporting From A Mobile Device | DFRWS USA 2013 | Justin Grover (The MITRE Corporation) | |
| A Study of User Data Integrity During Acquisition of Android Devices | DFRWS USA 2013 | Namheun Son, Yunho Lee, Dohyun Kim, Joshua James (Digital Forensic Investigation Research Laboratory, Hallym University), Sangjin Lee, Kyungho Lee | |
| Ranking Algorithms For Digital Forensic String Search Hits | DFRWS USA 2014 | Nicole Beebe, Ph.D. (UTSA) and Lishu Liu | |
| Multidimensional Investigation of Source Port 0 Probing | DFRWS USA 2014 | Elias Bou-Harb (National Cyber Forensics and Training Alliance / Concordia University ), Nour-Eddine Lakhdari, Hamad Binsalleeh, and Mourad Debbabi (Concordia University) | |
| VMI-PL – A Monitoring Language for Virtual Platforms Using Virtual Machine Introspection | DFRWS USA 2014 | Florian Westphal, Stefan Axelsson (Norwegian University of Science and Technology), Christian Neuhaus, Andreas Polze | |
| These Logs Were Made for Talking | DFRWS USA 2014 | Matt Bromiley | |
| The Regional Computer Forensics Lab System | DFRWS USA 2014 | Sean O'Brien | |
| The National Software Reference Library | DFRWS USA 2014 | Douglas White (NIST) | |
| The Application Of Reverse Engineering Techniques Against The Arduino Microcontroller To Acquire Uploaded Applications | DFRWS USA 2014 | Steve Watson (VTO Labs) | |
| Testing the Forensic Soundness of Forensic Examination Environments on Bootable Media | DFRWS USA 2014 | Ahmed Fathy Abdel Latif Mohamed, Andrew Marrington (Zayed University), Farkhund Iqbal, Ibrahim Baggili (University of New Haven) | |
| Some Practical Thoughts Concerning Active Disk Antiforensics | DFRWS USA 2014 | Travis Goodspeed | |
| Preliminary Forensic Analysis Of The Xbox One | DFRWS USA 2014 | Jason Moore, Ibrahim Baggili (University of New Haven), Andrew Marrington (Zayed University), Armindo Rodrigues | |
| Memory Forensics with Hyper-V Virtual Machines | DFRWS USA 2014 | Wyatt Roersma | |
| Media Forensics Analysis In Digital Times | DFRWS USA 2014 | Catalin Grigoras | |
| Information Assurance In A Distributed Forensic Cluster | DFRWS USA 2014 | Nick Pringle, Mikhaila Burgess | |
| In Lieu of Swap – Analyzing Compressed RAM in Mac OS X and Linux | DFRWS USA 2014 | Golden Richard III, Ph.D. (Louisiana State University), Andrew Case (Volexity) | |
| Image-Based Kernel Fingerprinting | DFRWS USA 2014 | Vassil Roussev, Ph.D. (University of New Orleans), Irfan Ahmed (University of New Orleans), Thomas Sires | |
| Extracting Hidden Messages in Steganographic Images | DFRWS USA 2014 | Tu-Thach Quach (Sandia National Laboratories) | |
| Enabling Digital Forensics Practices in Libraries, Archives and Museums – The BitCurator Experience | DFRWS USA 2014 | Christopher Lee (UNC), Kam Woods | |
| Digital Investigations for IPv6-Based Wireless Sensor Networks | DFRWS USA 2014 | Vijay Kumar, George Oikonomou, Theo Tryfonas, Dan Page, Iain Phillips | |
| Developing a New Digital Forensics Curriculum | DFRWS USA 2014 | Anthony Lang, Masooda Bashir (Illinois), Roy Campbell, Lizanne Destefano | |
| Design Tradeoffs for Developing Fragmented Video Carving Tools | DFRWS USA 2014 | Eoghan Casey, Ph.D. (University of Lausanne), Rikkert Zoun | |
| Cooperative Mode – Comparative Storage Metadata Verification Applied To The Xbox 360 | DFRWS USA 2014 | Alex Nelson, Ph.D. (NIST), Erik Steggall, Darrell Long | |
| A Forensically Robust Method For Acquisition Of iCloud Data | DFRWS USA 2014 | Kurt Oestreicher | |
| A Complete Formalized Knowledge Representation Model for Advanced Digital Forensics Timeline Analysis | DFRWS USA 2014 | Yoan Chabot, Aurelie Bertaux, Christophe Nicolle, Tahar Kechadi | |
| Wirespeed: Extending The AFF4 Container Format For Scalable Acquisition And Live Analysis | DFRWS USA 2015 | Bradley Schatz, Ph.D. (Schatz Forensic) | |
| The Impact of GPU-Assisted Malware on Memory Forensics: A Case Study | DFRWS USA 2015 | Davide Balzarotti (Eurecom), Roberto Di Pietro (Bell Labs), and Antonio Villani (University of Roma Tre) | |
| Rapid Forensic Imaging of Large Disks with Sifting Collectors | DFRWS USA 2015 | Jonathan Grier (Grier Forensics) and Golden Richard III, Ph.D. (University of New Orleans) | |
| Privacy-Preserving Email Forensics | DFRWS USA 2015 | Frederik Armknecht (University of Mannheim) and Andreas Dewald (Friedrich-Alexander-Universität Erlangen-Nürnberg) | |
| New Acquisition Method Based On Firmware Update Protocols For Android Smartphones | DFRWS USA 2015 | Seung Jei Yang (The Affiliated Institute of ETRI), Jung Ho Choi (The Affiliated Institute of ETRI), Ki Bom Kim (The Affiliated Institute of ETRI), and Tae Joo Chang (The Affiliated Institute of ETRI) | |
| Network And Device Forensic Analysis Of Android Social-Messaging Applications | DFRWS USA 2015 | Daniel Walnycky (University of New Haven), Ibrahim Baggili (University of New Haven), Andrew Marrington (Zayed University), Frank Breitinger (University of New Haven), and Jason Moore | |
| LINCS: Towards Building a Trustworthy Litigation Hold Enabled Cloud Storage System | DFRWS USA 2015 | Shams Zawoad (University of Alabama at Birmingham), Ragib Hasan (University of Alabama at Birmingham), and John Grimess (University of Alabama at Birmingham) |