The people listed below made DFRWS 2003 a great success by sharing their knowledge, ideas and time. To learn more about the 2003 Workshop's program and proceedings, visit the Agenda section of our archived site. To download all available papers, presentations and exhibits from DFRWS 2003, visit the Presentations section. For event photos from the Workshop, visit the Photo Gallery.
Peter is a writer, consultant, researcher and lecturer in information protection and forensics on large-scale computer networks. He has spoken extensively on digital forensics and security, and has written or contributed to 14 books and several hundred articles in major national and international trade publications. He has lectured and delivered consulting engagements for the past 17 years in eleven countries plus the United States. Peter began his information security career as a U. S. Navy cryptography technician in 1965, and has worked with computer and network communications and security since the early 1970s.
Stephenson was the director of technology for the global security practice of Netigy Corporation and was the Managing Partner for the Intrusion Management & Forensics Group, LLC, a specialized security technology consulting firm, for 15 years, prior to joining QinetiQ Trusted Information Management as U.S. director of technology. While at QinetiQ, he was promoted to director of research and, recently to chief technology officer for U.S. operations. He is currently Executive Director of the newly formed International Institute for Digital Forensic Studies.
Peter holds a BSEE and currently is a Ph.D. candidate at Oxford-Brookes University in Oxford, UK where his research involves structured investigation of information security incidents in complex computing environments. Peter is also an adjunct professor in the Master of Science in Information Assurance program at Norwich University.
Troy is unique in the maturing world of digital forensic science. He is a practicing attorney who is also adept at the technology that pervades our growing field. Troy is a frequent contributor to on-line list servers such as CFID (Computer Forensics Investigators Digest) which serves researcher and practitioner alike. He is also a contributing author to Eoghan Casey's new book as well as other publications including a concentration in digital forensics applied to the MS Windows operating systems and its myriad variants. He received his law degree at University of California at Berkley and continues to help bridge the gap between the law and technology in our young discipline.
Eoghan is Technical Director of Knowledge Solutions, a partnership of practicing forensic professionals who have made a commitment to providing quality training, information resources, and case consultations. He investigates network intrusions, intellectual property theft, and other computer-related crimes, and has extensive experience analyzing digital evidence. He has assisted law enforcement in a wide range of criminal investigations including homicide, child exploitation, cyberstalking, and larceny. Eoghan also has extensive information security experience.
As an Information Security Officer at Yale University and in subsequent consulting work, he has performed vulnerability assessments, deployed and maintained intrusion detection systems, firewalls and public key infrastructures, and assisted in the development of policies, procedures, and educational programs. Eoghan teaches information security and forensic workshops, is the author of Digital Evidence and Computer Crime, and is the editor of the Handbook of Computer Crime Investigation. He recently finished the 2nd edition of Digital Evidence and Computer Crime and is currently working on a book called "Investigating Computer-Assisted Child Exploitation" with Monique Mattei Ferraro from the Connecticut State Computer Crimes and Electronic Evidence Unit.
Dr. R. Chandramouli is as Assistant Professor in the Department of ECE, Stevens Institute of Technology. His research interests include stenography, digital forensics, wireless networking and security. His research in these areas is funded by the NSF, AFRL, and NJCST among others. He is a recipient of the NSF CAREER and IEEE Richard E. Merwin awards.
Tom is an assistant professor in the Department of Electrical and Computer Engineering at Iowa State University. He is an active member of the Iowa State University Information Assurance Center. Tom received his doctorate in Computer Science under the advisement of Eugene H. Spafford at Purdue University's Center for Education and Research in Information Assurance and Security in 2003. His primary research interests are network forensics, support structure for intrusion detection, and vulnerability analysis. Tom's hobbies include homebrewing beer, woodworking, and shooting professional grade fireworks.
Olivier de Vel obtained a M.Sc.(Hons) from the University of Waikato (New Zealand) in 1974 and a Docteur de 3ieme Cycle from the Institute National Polytechnique of Grenoble (France) in 1978. Prior to his current position as Principal Research Scientist and Head of Computer Forensics at the Defense Science and Technology Organization, he was Associate Professor in the Department of Computer Science at James Cook University, Australia. He has worked in various governmental and educational institutes and in industry. His current research interests include computer forensics, information security, and machine learning.
Chet Hosmer is a co-founder, and the President and CEO of WetStone Technologies, Inc. He has over 25 years of experience in developing high technology software and hardware products, and during the last 15 years, has focused on research and development of information security technologies. His specialty areas include: secure time, intrusion detection and response, and cyber forensics. Chet is a co-chair of the Technology Working Group, one of the seven working groups of the National Institute of Justice’s Electronic Crime and Terrorism Partnership Initiative. He is also the Director of the Computer Forensics Research and Development Center of Utica College. Chet is a member of the IEEE and the ACM, and holds a B.S. Degree in Computer Science from Syracuse University.
Sarah is an Assistant Professor of Computer Science at Portland State University. She received her Ph.D. and M.S. degrees in Computer Science from Northeastern University and has a B.S. in Computer Science from Tufts University. Dr. Mocas's research interests include computational complexity theory; the formal verification of cryptographic protocols and digital forensics. Dr. Mocas is a Police Reserve Specialist with the Hillsboro Police Department, Hillsboro Oregon where she oversees the training program for technical reservists specializing in digital forensics.
Kulesh is a graduate student in computer science at Polytechnic University, New York. His interests are in the areas of operating systems, computer security, and digital forensics; Kulesh is currently building a prototype of a distributed system to support network forensics on wide area networks. He is also investigating various synopsis techniques to create space-efficient summaries of network traffic in networking components for forensic purposes.
Joe is a computer science Ph.D. student at North Carolina State University. His research focuses on filesystem forensics and methods for validating such evidence. He is currently developing a semi-automated forensics toolkit for validating Linux filesystem data. Among his "real world" experience, Joe has over a year of system administration and penetration testing under his belt.
Benjamin is pursuing his master of science degree in Electrical Engineering at the University of Texas at San Antonio (UTSA). Mr. Rodriquez completed a majority of his undergraduate degree at Colorado State University where his focus was digital signal processing. He completed his Bachelor of Science degree in Electrical Engineering at UTSA. Mr. Rodriquez is a research assistant to Dr Sos Agaian in the UTSA Non-Linear Signal Processing Laboratory. His contributions to the research has been in implementing and validating several advanced transform algorithms developed by Dr Agaian which are used in blind stenographic image analysis.
Dr. Agaian is Full Professor, College of Engineering, University of Texas at San Antonio and an Adjunct Professor in the Dept. of Electrical Engineering, Tufts University, Medford, Massachusetts. He received the M.S. degree (1968) in mathematics and mechanics from Yerevan State University, Armenia, the Ph.D. degree (1975) in mathematics and physics from the Steklov Institute of Mathematics of the Academy of Sciences of the USSR, and the Ph.D. degree (1979) in computer science and Doctor of Engineering Sciences (1985)from the Computer Center Academy of Sciences of the USSR. Dr. Agaian was the Senior Scientist at the AWARE, INC (1996-1997, Bedford, MA). In addition, he has served as a conferences Chair, a member of the program committee, and as the Session Organizing Chair for more than 30 national and international conferences.
Agaian is the author of more than 225 scientific papers, three books, and has been awarded 12 patents. Dr Agaian is an associate editor of the Journal of Real-Time Imaging, the Journal of Electronic Imaging, and an editorial board member of the journal Pattern Recognition and Image Analysis. Dr Agaian has a well established research background in the broad area of signal/image processing, transmission, and information security. His current research is in the area of quantum signal processing, computation, and communication.