Main Hall | Workshop Track 1 | Workshop Track 2 | |
---|---|---|---|
2015-08-09T11:00:00-05:00 11:00 to 13:00
|
Registration Opens |
|
|
2015-08-09T13:00:00-05:00 13:00 to 15:00
|
|
GRR Rapid Response, Part 1 Workshop Greg Castle
|
Creating Forensics Tools in Go Workshop Vico Marziale, Ph.D. (BlackBag Technologies)
Joe Sylve, Ph.D. (BlackBag Technologies)
|
2015-08-09T15:00:00-05:00 15:00 to 17:00
|
|
GRR Rapid Response, Part 2 Workshop Greg Castle
|
Vehicle forensics Workshop Ben Lemere
|
2015-08-09T17:30:00-05:00 |
Registration Closes |
|
|
2015-08-09T18:00:00-05:00 |
Dinner On Your Own |
|
|
Main Hall | Workshop Track 1 | Workshop Track 2 | |
---|---|---|---|
2015-08-10T08:00:00-05:00 |
Registration/Breakfast |
|
|
2015-08-10T09:00:00-05:00 |
Opening Remarks |
|
|
2015-08-10T09:15:00-05:00 |
Keynote Address |
|
|
2015-08-10T10:15:00-05:00 |
Break |
|
|
2015-08-10T12:00:00-05:00 |
Lunch on your own |
|
|
2015-08-10T14:00:00-05:00 |
Session 2: Acquisition and E-DiscoveryChair: Wietse Venema, Ph.D. (Google)
Rapid Forensic Imaging of Large Disks with Sifting Collectors Paper Jonathan Grier (Grier Forensics)
Golden Richard III, Ph.D. (Louisiana State University)
Wirespeed: Extending The AFF4 Container Format For Scalable Acquisition And Live Analysis Paper Bradley Schatz, Ph.D. (Schatz Forensic)
LINCS: Towards Building a Trustworthy Litigation Hold Enabled Cloud Storage System Paper Shams Zawoad
Ragib Hasan
John Grimes
|
|
|
2015-08-10T15:30:00-05:00 |
Break |
|
|
2015-08-10T16:00:00-05:00 |
Presentations IChair: Elizabeth Schweinsberg (Facebook)
Inferring Past Activity from Partial Digital Artifacts Presentation James Jones
Tahir Khan
Kathryn Laskey
Alexander Nelson, Ph.D.
Mary Laamanen
Douglas White (NIST)
Finding your naughty BITS Presentation Matthew Geiger (Qintel)
|
|
|
2015-08-10T17:00:00-05:00 |
One-Minute TeasersFor Tool Demos and Poster Session |
|
|
2015-08-10T17:15:00-05:00 |
2016 DFRWS Challenge Presentation Michael McCarrin
Brian Greunke
Robert Beverly, Ph.D. (Naval Postgraduate School)
|
|
|
2015-08-10T17:30:00-05:00 |
Welcome ReceptionPoster and Demo Session |
|
|
Main Hall | Workshop Track 1 | Workshop Track 2 | |
---|---|---|---|
2015-08-11T08:00:00-05:00 |
Registration/Breakfast |
|
|
2015-08-11T09:00:00-05:00 |
Opening Remarks |
|
|
2015-08-11T09:05:00-05:00 |
Keynote Address |
|
|
2015-08-11T10:00:00-05:00 |
Break |
|
|
2015-08-11T10:25:00-05:00 |
Session 3: Android & Network ForensicsChair: Frank Adelstein, Ph.D. (NFA Digital)
New Acquisition Method Based On Firmware Update Protocols For Android Smartphones Paper Seung Jei Yang
Jung Ho Choi
Ki Bom Kim
Tae Joo Chang
Network And Device Forensic Analysis Of Android Social-Messaging Applications Paper Daniel Walnycky (University of New Haven)
Ibrahim Baggili (University of New Haven)
Andrew Marrington (Zayed University)
Frank Breitinger (University of New Haven)
Jason Moore
Detecting Very Large Sets Of Referenced Files At 40:100 Gbe, Especially Mp4 Files Paper Adrien Larbanet
Jonas Lerebours
Jean Pierre David
|
|
|
2015-08-11T11:55:00-05:00 |
Lunch on your own |
|
|
2015-08-11T13:25:00-05:00 |
|
|
|
2015-08-11T14:15:00-05:00 |
Session 4: Computational ForensicsChair: Josiah Dykstra, Ph.D. (National Security Agency)
Hash-Based Carving: Searching Media For Complete Files And File Fragments With Sector Hashing And hashdb Paper Simson Garfinkel, Ph.D. (U.S. Census Bureau)
Michael McCarrin
Database Forensic Analysis Through Internal Structure Carving Paper James Wagner (DePaul University)
Alexander Rasin (DePaul University)
Jonathan Grier (Grier Forensics)
E-mail Authorship Attribution Using Customized Associative Classification Paper Michael Schmid
Farkhund Iqbal
Benjamin Fung
|
|
|
2015-08-11T15:45:00-05:00 |
Break |
|
|
2015-08-11T16:10:00-05:00 |
Presentations IIChair: Alex Nelson, Ph.D. (NIST)
Federated Testing: Shared Test Materials from the CFTT Program at NIST Presentation Ben Livelsberger
James Lyle
The Chain Of Custody: A Big Misconception Presentation Tobias Eggendorfer
Video Authentication Using File Structure and Metadata Presentation Jake Hall
|
|
|
2015-08-11T17:05:00-05:00 |
Break |
|
|
2015-08-11T18:00:00-05:00 |
Dinner RodeoTHE DFRWS 2015 Agenda below summarizes the program of discussion and research. This years conference is held in cooperation with the Association for Computing Machinery (ACM) and its Special Interest Group on Security, Audit and Control (SIGSAC). . |
|
|
Main Hall | Workshop Track 1 | Workshop Track 2 | |
---|---|---|---|
2015-08-12T08:00:00-05:00 |
Registration/Breakfast |
|
|
2015-08-12T09:00:00-05:00 |
Session 5: Archival and Reverse EngineeringChair: Golden Richard III, Ph.D. (Louisiana State University)
Privacy-Preserving Email Forensics Paper Frederik Armknecht
Andreas Dewald
Michael Gruhn (Friedrich-Alexander-Universität Erlangen-Nürnberg)
Archival Science, Digital Forensics, and New Media Art Presentation Dianne Dietrich
Frank Adelstein, Ph.D. (NFA Digital)
BinComp: A Stratified Approach to Compiler Provenance Attribution Paper Saed Alrabaee (Concordia University)
Paria Shirani
Mourad Debbabi (Concordia University)
Ashkan Rahimian
Lingyu Wang (Concordia University)
Automatic Classification of Object Code Using Machine Learning Paper John Clemens
|
|
|
2015-08-12T11:00:00-05:00 |
Works in Progress |
|
|
2015-08-12T11:30:00-05:00 |
Lunch on your own |
|
|
2015-08-12T13:00:00-05:00 13:00 to 17:00
|
Reverse Engineering with Rekall Workshop Michael Cohen (Google)
|
Bitcurator: Redacting and providing access to data from disk images Workshop Christopher Lee (UNC)
Kam Woods
|
Python scripting in Autopsy Workshop Brian Carrier (Honorary Board Member) , Ph.D. (Basis Technology)
|