Paper | Presentation Conference Downloads Author
BinGold: Towards Robust Binary Analysis by Extracting the Semantics of Binary Code as Semantic Flow Graphs (SFGs) DFRWS USA 2016 Saed Alrabaee, Lingyu Wang, Mourad Debbabi
Coding Digital Forensics Tools in Go Workshop (part 1) DFRWS USA 2016 Lodovico Marziale, Joe Sylve, Ph.D.
Coding Digital Forensics Tools in Go Workshop (part 2) DFRWS USA 2016 Lodovico Marziale, Joe Sylve, Ph.D.
CuFA: a more formal definition for digital forensic artifacts DFRWS USA 2016 Vikram Harichandran, Daniel Walnycky, Ibrahim Baggili, Frank Breitinger
Data Sets Available from the National Software Reference Library DFRWS USA 2016 Douglas White
Database Image Content Explorer: Carving Data That Does Not Officially Exist DFRWS USA 2016 James Wagner, Alexander Rasin, Jonathan Grier
dbling: Identifying Extensions Installed on Encrypted Web Thin Clients DFRWS USA 2016 Mike Mabey, Adam Doupe, Ziming Zhao, Gail-Joon Ahn
Deleting collected digital evidence by exploiting a widely adopted hardware write blocker DFRWS USA 2016 Christopher Meffert, Ibrahim Baggili, Frank Breitinger
Detecting Objective-C Malware Through Memory Forensics DFRWS USA 2016 Andrew Case, Golden Richard III, Ph.D.
Digital Forensics as a Service: an update DFRWS USA 2016 Harm van Beek
Fingerprinting Android Packaging: Generating DNAs for Malware Detection DFRWS USA 2016 ElMouatez Billah Karbab, Mourad Debbabi, Djedjiga Mouheb
Forensic investigations in SDN networks DFRWS USA 2016 Izzat Alsmadi, Samer Khamaiseh
Hands-On With Open Source Similarity Digests DFRWS USA 2016 Jon Oliver
IED Forensics: Hunting the IED Engineer DFRWS USA 2016 Larry Leibrock
InVEST: Intelligent Visual Email Search and Triage DFRWS USA 2016 Jay Koven, Enrico Bertini, Luke Dubois, Nasir Memon
PeekaTorrent: Leveraging P2P Hash Values for Digital Forensics DFRWS USA 2016 Sebastian Neuner, Martin Schmiedecker, Edgar Weippl
Practical Analyzing the Relation of Wallet Addresses in Bitcoin DFRWS USA 2016 Hiroki Kuzuno, Christian Karam
Rapid differential forensic imaging of mobile devices DFRWS USA 2016 Mark Guido, Justin Grover, Jonathan Buttner
Rapid, Agentless, and Scalable Forensics and Incident Response Using WARDEN DFRWS USA 2016 Adam Meily, Sean LaPlante, Richard Gloo
Recovery method of deleted records and tables from ESE Database DFRWS USA 2016 Kim Jeonghyeon, Park Aran, Lee Sangjin
Recovery of Heavily Fragmented JPEG Files DFRWS USA 2016 Yanbin Tang, Junbin Fang, K.P. Chow, Siu Ming, Jun Xu, Bo Feng, Qiong Li, Qi Han
Robust Bootstrapping Memory Analysis against Anti-forensics DFRWS USA 2016 Kyoungho Lee, Hyunuk Hwang, Kibom Kim, Bongnam Noh
Table Topping for Incident and Data Breach Response DFRWS USA 2016 Brian Roux
Time is on my side: Steganography in filesystem metadata DFRWS USA 2016 Sebastian Neuner, Artemios Voyiatzis, Martin Schmiedecker, Stefan Brunthaler, Stefan Katzenbeisser, Edgar Weippl
Using GRR and Rekall for Scalable Memory Analysis (part 1) DFRWS USA 2016 Michael Cohen
Using GRR and Rekall for Scalable Memory Analysis (part 2) DFRWS USA 2016 Michael Cohen
A Method and a Case Study for the Selection of the Best Available Tool for Mobile Device Forensics Using Decision Analysis DFRWS EU 2016 Shahzad Saleem, Oliver Popov, Ibrahim Baggili
A Scalable Authorship Verification Method for Different Languages, Genres and Topics DFRWS EU 2016 Oren Halvani, Christian Winter, Anika Pflug
Automatic Profile Generation For Live Linux Memory Analysis DFRWS EU 2016 Michael Cohen, Arkadiusz Socala
Conclusions Scales or Likelihood Ratios in Digital Forensic Science DFRWS EU 2016 Eoghan Casey - Moderator, Zeo Geradts, Alex Biedermann, Franco Taroni
Digital Evidence, 'Absence' of Data and Ambiguous Patterns of Reasoning DFRWS EU 2016 Alex Biedermann, Joëlle Vuille
Discovering Windows Phone 8 Artifacts and Secrets DFRWS EU 2016 Mattia Epifani, Francesco Picasso, Marco Scarito
Evaluating Atomicity and Integrity of Correct Memory Acquisition Methods DFRWS EU 2016 Michael Gruhn, Felix Freiling
Evidence Exchange between Courts in Europe: A standard proposal to be discussed DFRWS EU 2016 Mariangela Biasiotti, Mattia Epifani, Fabrizio Turchi, J. Deprez, N. Matskanis
Facilitating Forensic Examinations of Multi-User Computer Environments through Session-to-Session Analysis of Internet History DFRWS EU 2016 David Gresty, Diane Gan, George Loukas, Constantinos Ierotheou
Forensic Analysis of Cloud-Native Artifacts DFRWS EU 2016 Vassil Roussev, Ph.D., Shane McCulley
Forensic Investigation of Cyberstalking Cases using Behavioural Evidence Analysis DFRWS EU 2016 Noora Al Mutawa, Joanne Bryce, Virginia Franqueira, Andrew Marrington
Fun with the Beast: Traffic Mining (TM) using Brain and Tranalyzer. Part 1: Fundamentals of Traffic Mining DFRWS EU 2016 Stefan Burschka
Fun with the Beast: Traffic Mining (TM) using Brain and Tranalyzer. Part 2: Using Tranalyzer DFRWS EU 2016 Stefan Burschka
Generic RAID Reassembly using Block-Level Entropy DFRWS EU 2016 Christian Zoubek, Sabine Seufert, Andreas Dewald
Internet Forums: A Source of Intelligence to Monitor the Online Diffusion of Doping Products DFRWS EU 2016 Thomas Pineau, Adrien Schopfer, Lionel Grossrieder, Pierre Esseiva, Quentin Rossy
Lest We Forget: Cold-Boot Attacks on Scrambled DDR3 Memory DFRWS EU 2016 Johannes Bauer, Michael Gruhn, Felix Freiling
Life on Clouds, A Forensics Overview DFRWS EU 2016 Marco Scarito, Mattia Epifani, Francesco Picasso
Microsoft Exchange Forensics: Looking Beyond User Data DFRWS EU 2016 Owen O'Connor
Plaso Parser Workshop DFRWS EU 2016 Daniel White
Pool Tag: Quick Scanning for Windows Memory Analysis DFRWS EU 2016 Joe Sylve, Ph.D., Vico Marziale, Ph.D., Golden Richard III, Ph.D.
Sponsored Tutorial: Analysis of Deleted Data DFRWS EU 2016 Roman Locher
Sponsored Tutorial: Windows Event Log Analysis - Gathering great information the easy way! DFRWS EU 2016 Roman Locher
Study and Analysis of Orweb Anonymizer on Android Devices DFRWS EU 2016 Claudia Meda, Mattia Epifani
Studying the Structure and Organisation of Illicit Drug Trafficking on Darknet Markets Through the Analysis of Digital, Chemical and Physical Traces DFRWS EU 2016 Damien Rhumorbarbe, Ludovic Staehli, Julian Broséus, Quentin Rossy, Pierre Esseiva
The Digital Evidence Dashboard Project DFRWS EU 2016 Hans Henseler, Ph.D., Adrie Stander
Tiered Forensic Methodology Model for Digital Field Triage by Non-Digital Evidence Specialists DFRWS EU 2016 Ben Hitchcock, Nhien An Le Khac, Mark Scanlon, Ph.D.
TLSkex: Harnessing Virtual Machine Introspection for Decrypting TLS Communication DFRWS EU 2016 Benjamin Taubmann, Christoph Freidrich, Dominik Dusold, Hans Reiser
Virtual Currencies DFRWS EU 2016 André Fischer, Jakob Hasse, Thomas Gloe
2016 DFRWS Challenge DFRWS USA 2015 Michael McCarrin, Brian Greunke, Robert Beverly, Ph.D.
Advancing Mac OS X Rootkit Detection DFRWS USA 2015 Andrew Case, Golden Richard III, Ph.D.
Archival Science, Digital Forensics, and New Media Art DFRWS USA 2015 Dianne Dietrich, Frank Adelstein, Ph.D.
Automatic Classification of Object Code Using Machine Learning DFRWS USA 2015 John Clemens
BinComp: A Stratified Approach to Compiler Provenance Attribution DFRWS USA 2015 Saed Alrabaee, Paria Shirani, Mourad Debbabi, Ashkan Rahimian, Lingyu Wang
Bitcurator: Redacting and providing access to data from disk images DFRWS USA 2015 Christopher Lee, Kam Woods
Creating Forensics Tools in Go DFRWS USA 2015 Vico Marziale, Ph.D., Joe Sylve, Ph.D.
Database Forensic Analysis Through Internal Structure Carving DFRWS USA 2015 James Wagner, Alexander Rasin, Jonathan Grier
Detecting Very Large Sets Of Referenced Files At 40:100 Gbe, Especially Mp4 Files DFRWS USA 2015 Adrien Larbanet, Jonas Lerebours, Jean Pierre David
E-mail Authorship Attribution Using Customized Associative Classification DFRWS USA 2015 Michael Schmid, Farkhund Iqbal, Benjamin Fung
Federated Testing: Shared Test Materials from the CFTT Program at NIST DFRWS USA 2015 Ben Livelsberger, James Lyle
Finding your naughty BITS DFRWS USA 2015 Matthew Geiger
Graph-Theoretic Characterization of Cyber-threat Infrastructures DFRWS USA 2015 Amine Boukhtouta, Djedjiga Mouheb, Mourad Debbabi, Omar Alfandi, Farkhund Iqbal, May El Barachi
GRR Rapid Response, Part 1 DFRWS USA 2015 Greg Castle
GRR Rapid Response, Part 2 DFRWS USA 2015 Greg Castle
Hash-Based Carving: Searching Media For Complete Files And File Fragments With Sector Hashing And hashdb DFRWS USA 2015 Simson Garfinkel, Ph.D., Michael McCarrin
Inferring Past Activity from Partial Digital Artifacts DFRWS USA 2015 James Jones, Tahir Khan, Kathryn Laskey, Alexander Nelson, Ph.D., Mary Laamanen, Douglas White
LINCS: Towards Building a Trustworthy Litigation Hold Enabled Cloud Storage System DFRWS USA 2015 Shams Zawoad, Ragib Hasan, John Grimes
Network And Device Forensic Analysis Of Android Social-Messaging Applications DFRWS USA 2015 Daniel Walnycky, Ibrahim Baggili, Andrew Marrington, Frank Breitinger, Jason Moore
New Acquisition Method Based On Firmware Update Protocols For Android Smartphones DFRWS USA 2015 Seung Jei Yang, Jung Ho Choi, Ki Bom Kim, Tae Joo Chang
Privacy-Preserving Email Forensics DFRWS USA 2015 Frederik Armknecht, Andreas Dewald, Michael Gruhn
Python scripting in Autopsy DFRWS USA 2015 Brian Carrier (Honorary Board Member) , Ph.D.
Rapid Forensic Imaging of Large Disks with Sifting Collectors DFRWS USA 2015 Jonathan Grier, Golden Richard III, Ph.D.
Reverse Engineering with Rekall DFRWS USA 2015 Michael Cohen
The Chain Of Custody: A Big Misconception DFRWS USA 2015 Tobias Eggendorfer
The Impact of GPU-Assisted Malware on Memory Forensics: A Case Study DFRWS USA 2015 Davide Balzarotti, Roberto Di Pietro, Antonio Villani
Vehicle forensics DFRWS USA 2015 Ben Lemere
Video Authentication Using File Structure and Metadata DFRWS USA 2015 Jake Hall
What keeps me up at night? - “Unsolved” problems in Incident Response DFRWS USA 2015
Wirespeed: Extending The AFF4 Container Format For Scalable Acquisition And Live Analysis DFRWS USA 2015 Bradley Schatz, Ph.D.
A Scalable File Based Data Store For Forensic Analysis DFRWS EU 2015 Flavio Cruz, Andreas Moser, Michael Cohen
A Theoretic Framework For Evaluating Similarity Digesting Tools DFRWS EU 2015 Liwei Ren
Acquisition and Analysis of Compromised Firmware Using Memory Forensics DFRWS EU 2015 Johannes Stüttgen, Stefan Voemel, Michael Denzel
Characterization Of The Windows Kernel Version Variability For Accurate Memory Analysis DFRWS EU 2015 Michael Cohen
Designing Robustness and Resilience in Digital Investigation Laboratories DFRWS EU 2015 Philipp Amann, Joshua James
Digital Forensics - Behind the Scenes DFRWS EU 2015 David-Olivier Jaquet-Chiffelle
Fast and Generic Malware Triage Using openioc_scan Volatility Plugin DFRWS EU 2015 Takahiro Haruyama
Fast Contraband Detection In Large Capacity Disk Drives DFRWS EU 2015 Phil Penrose, William Buchanan, Richard Macfarlane
Forensic Analysis of a Sony PlayStation 4 - A First Look DFRWS EU 2015 Allen Davies, Huw Read, Konstantinos Xynos, Iain Sutherland
How I Forced An Android Vulnerability Into Bypassing Mdm Restrictions + Diy - Android Malware Analysis DFRWS EU 2015 Zubair Ashraf
How To Search Extracted Data DFRWS EU 2015 Javier Collado
Hviz HTTP(S) Traffic Aggregation and Visualization for Network Forensics DFRWS EU 2015 David Gugelmann, Fabian Gasser, Bernhard Ager, Vincent Lenders
Investigating Evidence of Mobile Phone Usage by Drivers in Road Traffic Accidents DFRWS EU 2015 Graeme Horsman, Lynne Conniss
Leveraging CybOX to Standardize Representation and Exchange of Digital Forensic Information DFRWS EU 2015 Eoghan Casey, Ph.D., Greg Back, Sean Barnum
On Criteria for Evaluating Similarity Digest Schemes DFRWS EU 2015 Jonathan Oliver
SIGMA - A Semantic Integrated Graph Matching Approach For Identifying Reused Functions In Binary Code DFRWS EU 2015 Saed Alrabaee, Paria Shirani, Lingyu Wang, Mourad Debbabi