| Paper | Presentation | Conference | Downloads | Author |
|---|---|---|---|
| Memory Forensics with Hyper-V Virtual Machines | DFRWS USA 2014 | Wyatt Roersma | |
| Media Forensics Analysis In Digital Times | DFRWS USA 2014 | Catalin Grigoras | |
| Information Assurance In A Distributed Forensic Cluster | DFRWS USA 2014 | Nick Pringle, Mikhaila Burgess | |
| In Lieu of Swap – Analyzing Compressed RAM in Mac OS X and Linux | DFRWS USA 2014 | Golden Richard III, Ph.D. (Louisiana State University), Andrew Case (Volexity) | |
| Image-Based Kernel Fingerprinting | DFRWS USA 2014 | Vassil Roussev, Ph.D. (University of New Orleans), Irfan Ahmed (University of New Orleans), Thomas Sires | |
| Extracting Hidden Messages in Steganographic Images | DFRWS USA 2014 | Tu-Thach Quach (Sandia National Laboratories) | |
| Enabling Digital Forensics Practices in Libraries, Archives and Museums – The BitCurator Experience | DFRWS USA 2014 | Christopher Lee (UNC), Kam Woods | |
| Digital Investigations for IPv6-Based Wireless Sensor Networks | DFRWS USA 2014 | Vijay Kumar, George Oikonomou, Theo Tryfonas, Dan Page, Iain Phillips | |
| Developing a New Digital Forensics Curriculum | DFRWS USA 2014 | Anthony Lang, Masooda Bashir (Illinois), Roy Campbell, Lizanne Destefano | |
| Design Tradeoffs for Developing Fragmented Video Carving Tools | DFRWS USA 2014 | Eoghan Casey, Ph.D. (University of Lausanne), Rikkert Zoun | |
| Cooperative Mode – Comparative Storage Metadata Verification Applied To The Xbox 360 | DFRWS USA 2014 | Alex Nelson, Ph.D. (NIST), Erik Steggall, Darrell Long | |
| A Forensically Robust Method For Acquisition Of iCloud Data | DFRWS USA 2014 | Kurt Oestreicher | |
| A Complete Formalized Knowledge Representation Model for Advanced Digital Forensics Timeline Analysis | DFRWS USA 2014 | Yoan Chabot, Aurelie Bertaux, Christophe Nicolle, Tahar Kechadi | |
| Wirespeed: Extending The AFF4 Container Format For Scalable Acquisition And Live Analysis | DFRWS USA 2015 | Bradley Schatz, Ph.D. (Schatz Forensic) | |
| The Impact of GPU-Assisted Malware on Memory Forensics: A Case Study | DFRWS USA 2015 | Davide Balzarotti (Eurecom), Roberto Di Pietro (Bell Labs), and Antonio Villani (University of Roma Tre) | |
| Rapid Forensic Imaging of Large Disks with Sifting Collectors | DFRWS USA 2015 | Jonathan Grier (Grier Forensics) and Golden Richard III, Ph.D. (University of New Orleans) | |
| Privacy-Preserving Email Forensics | DFRWS USA 2015 | Frederik Armknecht (University of Mannheim) and Andreas Dewald (Friedrich-Alexander-Universität Erlangen-Nürnberg) | |
| New Acquisition Method Based On Firmware Update Protocols For Android Smartphones | DFRWS USA 2015 | Seung Jei Yang (The Affiliated Institute of ETRI), Jung Ho Choi (The Affiliated Institute of ETRI), Ki Bom Kim (The Affiliated Institute of ETRI), and Tae Joo Chang (The Affiliated Institute of ETRI) | |
| Network And Device Forensic Analysis Of Android Social-Messaging Applications | DFRWS USA 2015 | Daniel Walnycky (University of New Haven), Ibrahim Baggili (University of New Haven), Andrew Marrington (Zayed University), Frank Breitinger (University of New Haven), and Jason Moore | |
| LINCS: Towards Building a Trustworthy Litigation Hold Enabled Cloud Storage System | DFRWS USA 2015 | Shams Zawoad (University of Alabama at Birmingham), Ragib Hasan (University of Alabama at Birmingham), and John Grimess (University of Alabama at Birmingham) | |
| Hash-Based Carving: Searching Media For Complete Files And File Fragments With Sector Hashing And hashdb | DFRWS USA 2015 | Simson Garfinkel, Ph.D. (NIST) and Michael McCarrin (NPS) | |
| Graph-Theoretic Characterization of Cyber-threat Infrastructures | DFRWS USA 2015 | Amine Boukhtouta (Concordia University), Djedjiga Mouheb (Concordia University), Mourad Debbabi (Concordia University), Omar Alfandi (Zayed University), Farkhund Iqbal (Zayed University), and May El Barachi (Zayed University) | |
| E-mail Authorship Attribution Using Customized Associative Classification | DFRWS USA 2015 | Michael Schmid (Concordia Institute for Information Systems Engineering), Farkhund Iqbal (College of Technological Innovation, Zayed University), and Benjamin Fung (School of Information Studies, McGill University) | |
| Detecting Very Large Sets Of Referenced Files At 40:100 Gbe, Especially Mp4 Files | DFRWS USA 2015 | Adrien Larbanet, Jonas Lerebours, and Jean Pierre David | |
| Database Forensic Analysis Through Internal Structure Carving | DFRWS USA 2015 | James Wagner (DePaul University), Alexander Rasin (DePaul University), and Jonathan Grier (Grier Forensics) | |
| BinComp: A Stratified Approach to Compiler Provenance Attribution | DFRWS USA 2015 | Saed Alrabaee (Concordia University), Paria Shirani, Mourad Debbabi (Concordia University), Ashkan Rahimian, and Lingyu Wang (Concordia University) | |
| Automatic Classification of Object Code Using Machine Learning | DFRWS USA 2015 | John Clemens (UMBC and JHU/APL) | |
| Archival Science, Digital Forensics, and New Media Art | DFRWS USA 2015 | Dianne Dietrich (Cornell University) and Frank Adelstein (Cayuga Networks) | |
| Advancing Mac OS X Rootkit Detection | DFRWS USA 2015 | Andrew Case (Volatility Foundation) and Golden Richard III, Ph.D. (UNO) | |
| Video Authentication Using File Structure and Metadata | DFRWS USA 2015 | Jake Hall | |
| The Chain Of Custody: A Big Misconception | DFRWS USA 2015 | Tobias Eggendorfer (Hochschule Ravensburg-Weingarten University of Applied Sciences) | |
| Inferring Past Activity from Partial Digital Artifacts | DFRWS USA 2015 | James Jones (George Mason University), Tahir Khan (GMU), Kathryn Laskey (GMU), Alexander Nelson, Ph.D. (NIST), Mary Laamanen (NIST), Douglas White (NIST) | |
| Finding your naughty BITS | DFRWS USA 2015 | Matthew Geiger (Dell SecureWorks) | |
| Federated Testing: Shared Test Materials from the CFTT Program at NIST | DFRWS USA 2015 | Ben Livelsberger, James Lyle | |
| Robust Bootstrapping Memory Analysis against Anti-forensics | DFRWS USA 2016 | Kyoungho Lee (Chonnam National University), Hyunuk Hwang (The Affiliated Institute of ETRI), Kibom Kim (The Affiliated Institute of ETRI), and Bongnam Noh (Chonnam National University) | |
| Rapid differential forensic imaging of mobile devices | DFRWS USA 2016 | Mark Guido (The MITRE Corporation), Justin Grover (The MITRE Corporation), and Jonathan Buttner (The MITRE Corporation) | |
| PeekaTorrent: Leveraging P2P Hash Values for Digital Forensics | DFRWS USA 2016 | Sebastian Neuner (SBA Research), Martin Schmiedecker (SBA Research), and Edgar Weippl (SBA Research) | |
| Fingerprinting Android Packaging: Generating DNAs for Malware Detection | DFRWS USA 2016 | ElMouatez Billah Karbab (Concordia University), Mourad Debbabi (Concordia University), and Djedjiga Mouheb (University of Sharjah) | |
| Digital Forensics as a Service: an update | DFRWS USA 2016 | Harm van Beek (Netherlands Forensic Institute) | |
| Database Image Content Explorer: Carving Data That Does Not Officially Exist | DFRWS USA 2016 | James Wagner (DePaul University), Alexander Rasin (DePaul University), and Jonathan Grier (Grier Forensics) | |
| BinGold: Towards Robust Binary Analysis by Extracting the Semantics of Binary Code as Semantic Flow Graphs (SFGs) | DFRWS USA 2016 | Saed Alrabaee (Concordia University), Lingyu Wang (Concordia University), and Mourad Debbabi (Concordia University) | |
| Anti-forensics: Furthering digital forensic science through a new extended, granular taxonomy | DFRWS USA 2016 | Kevin Conlan (University of New Haven), Ibrahim Baggili (University of New Haven), and Frank Breitinger (University of New Haven) | |
| Time is on my side: Steganography in filesystem metadata | DFRWS USA 2016 | Sebastian Neuner (SBA Research), Artemios Voyiatzis (SBA Research), Martin Schmiedecker (SBA Research), Stefan Brunthaler (SBA Research), Stefan Katzenbeisser (Technische Universitat), Edgar Weippl (SBA Research) | |
| Recovery of Heavily Fragmented JPEG Files | DFRWS USA 2016 | Yanbin Tang (University of Hong Kong), Junbin Fang (Jinan University), K.P. Chow (University of Hong Kong), Siu Ming (University of Hong Kong), Jun Xu (Harbin Institute of Technology), Bo Feng (Stony Brook University), Qiong Li (Harbin Institute of Technology), Qi Han (Harbin Institute of Technology) | |
| Recovery method of deleted records and tables from ESE Database | DFRWS USA 2016 | Kim Jeonghyeon (Korea University), Park Aran (Korea University), Lee Sangjin (Korea University) | |
| Rapid, Agentless, and Scalable Forensics and Incident Response Using WARDEN | DFRWS USA 2016 | Adam Meily (Assured Information Security), Sean LaPlante (Assured Information Security), Richard Gloo (Assured Information Security) | |
| Practical Analyzing the Relation of Wallet Addresses in Bitcoin | DFRWS USA 2016 | Hiroki Kuzuno and Christian Karam | |
| InVEST: Intelligent Visual Email Search and Triage | DFRWS USA 2016 | Jay Koven (NYU Tandon School of Engineering), Enrico Bertini (NYU Tandon School of Engineering), Luke Dubois (NYU Tandon School of Engineering), Nasir Memon (NYU Tandon School of Engineering) | |
| IED Forensics: Hunting the IED Engineer | DFRWS USA 2016 | Larry Leibrock | |
| Forensic investigations in SDN networks | DFRWS USA 2016 | Izzat Alsmadi (University of New Haven), Samer Khamaiseh (Boise State University) |