Please note: All times below are in Central Daylight Time.
For clarity, the current time in Chicago, IL is:
Please find our tentative program items below. Schedules are still work in progress.
Papers
Nine papers have been accepted. There are seven further papers under shepherding.
Accepted papers
- Leveraging Memory Forensics to Investigate and Detect Illegal 3D Printing Activities
Hala Ali, Andrew Case and Irfan Ahmed - Digital Forensics via Chip-Transplantation in Samsung Smartphones
Sunbum Song, Gibum Kim, Hongseok Yang, Eunji Lee and Sangeun Lee - Bytewise Approximate Matching: Evaluating Common Scenarios for Executable Files
Carlo Jakobs, Axel Mahr, Martin Lambertz, Mariia Rybalka and Daniel Plohmann - Detecting Hidden Kernel Modules in Memory Snapshots
Roland Nagy - An Extensible and Scalable System for Hash Lookup and Approximate Similarity Search with Similarity Digest Algorithms
Daniel Huici, Ricardo J. Rodríguez and Eduardo Mena - Your Forensic AI-Asisstant, SERENA: Systematic Extraction and Reconstruction for ENhanced A2P Forensics
Jieon Kim, Byeongchan Jeong, Jungheum Park, Seungeun Park and Sangjin Lee - Out of Control: Igniting SCADA Investigations with an HMI Forensics Framework and the Ignition Forensics Artifact Carving Tool (IFACT)
Lasean Salmon and Ibrahim Baggili
Workshops
Adapting to evolving threats and strengthening security with Purple Teams
by Natalia Ciapponi and Maristela Ames
Abstract:
In a world of ever-evolving threats, organizations must think smarter, act faster, and collaborate better to stay ahead. This workshop dives into the power of purple teaming as a transformative approach to bolster security across diverse defense systems. Together, we’ll explore how offensive and defensive teams can unite to test real-world scenarios, uncover blind spots, and fine-tune detection and response mechanisms. Using actionable insights, practical frameworks, and real-world case studies, attendees will leave equipped to bridge the gap between theory and execution. Discover how purple teams can not only adapt to the latest threats but also anticipate them, ensuring you are always one step ahead of the adversary.
Biographies:
From Narrow AI to Generative AI: Integrating AI in Your Daily DFIR Life
by Jess Garcia
Abstract:
Join us for an immersive 4-hour workshop designed to elevate your DFIR skills through the power of AI. This hands-on session will explore the integration of custom Machine Learning models and Generative AI technologies into DFIR workflows, offering practical insights and applications. The workshop is divided into two sessions, each focusing on cutting-edge AI technologies and their practical applications in the field of DFIR.
Part 1: Custom Machine Learning Models for DFIR
- Overview: The initial part of the workshop will focus on utilizing lightweight Machine Learning models to address specific tasks related to threat detection and incident response. In many cases, smaller custom models can outperform larger models, including those with trillions of parameters like ChatGPT. They require less computational power, are faster to train and deploy, and can be fine-tuned to capture the nuances of particular problems more effectively than large, general-purpose models.
- Key Topics:
- – Introduction to ML models relevant for Threat Detection & Response.
- – Gain hands-on experience with machine learning models, including Long Short-Term Memory (LSTM) networks and Transformers.
- – Guidance for building and configure ML models for Threat Detection & Response.
- – Solving complex DFIR tasks like Lateral Movement detection, UEBA (User and Entity Behavior Analysis), and anomaly detection.
- – Practical Exercises: Step-by-step guide to create and deploy custom ML models to perform complex DFIR analysis in real-world scenarios.
- Resources: Jupyter Notebooks, Data Science libraries for DFIR (Pandas, ds4n6_lib, Keras, Tensorflow, …)
Part 2: Generative AI Technologies for DFIR
- Overview: This part of the workshop will delve into the application of Generative AI models like Large Language Models (LLMs) to solve many of the most challenging tasks that we face in our investigations today. After covering the most important concepts, tools & resources you need to know related to Generative AI for DFIR, we will apply this promising technology to analyze artifacts with a DFIR-Copilot, correlate CTI sources, automate Threat Hunting tasks, and guide forensic investigations with AI- Agents.
- Key Topics:
- – Understanding the basics of Generative AI and its relevance in DFIR.
- – Explore the role of Generative AI in DFIR and why it is a game-changing technology.
- – Practical applications of LLMs for Threat Detection & Response.
- – Enhancing and automating DFIR workflows with AI-Agents.
- – Solving everyday DFIR challenges using Generative AI.
- – Practical Exercises: Gain hands-on experience solving common investigative tasks with Large Language Models. Create custom GPTs and Copilots to analyze forensic artifacts, and configure AI-Agents to tackle the most complex DFIR challenges we face today.
- Resources: Jupyter Notebooks, ChatGPT API, LLM frameworks (LangChain, LlamaIndex, LangGraph, …)
Who Should Attend:
- – DFIR Professionals
- – Cybersecurity Analysts
- – Incident Response Teams
- – Anyone interested in leveraging AI for digital forensics and incident response
Why Attend:
- – Gain practical knowledge of integrating AI into DFIR tasks
- – Learn to utilize both classical and Generative AI models
- – Enhance your ability to automate and improve DFIR workflows
Biography:
![]() Jess Garcia is the Founder of the global Cybersecurity/DFIR firm One eSecurity and a Senior Instructor with the SANS Institute. During his 25+ years in the field, Jess has led a myriad of complex multinational investigations for Fortune 500 companies and global organizations. As a founder of One eSecurity, Jess has led his company to become a world-wide service provider for large global customers, providing highly specialized services & technology in the Detection & Response areas. As a SANS Instructor, Jess stands as one of the most prolific and veteran ones, having taught 10+ different highly technical Cybersecurity/DFIR courses in hundreds of conferences world-wide over the last 22+ years. Jess has also been a pioneer in the area of AI for Detection & Response. With the mission of bringing Data Science/AI to the DFIR field, Jess launched in 2020 the DS4N6 initiative (www.ds4n6.io), under which he is leading the development of multiple open source tools, standards and analysis platforms for DS/AI+DFIR interoperability. After the advent of Generative AI / LLM Platforms, Jess and his team at One eSecurity are pioneering the field again by defining how organizations should transform their Detection & Response teams and processes, via the introduction of AI in every aspect of the Detection & Response life cycle (CTI, Threat Hunting, Forensic Investigations, etc.). Jess is a globally recognized cybersecurity expert, regularly speaking at the top Cybersecurity conferences all around the world. |
Kubernetes Security: Hands-On Attack and Defense
by Lenin Alevski
Abstract:
Kubernetes is the de facto operating system of the cloud, and more and more organizations are running their workloads on Kubernetes. While Kubernetes offers many benefits, new users may introduce security risks like cluster misconfiguration, leaked credentials, crypto-jacking, container escapes, and vulnerable clusters.
This workshop will teach you the fundamentals of Kubernetes security, from protecting your cluster to securing your workloads. You’ll learn about RBAC, OPA, Security Contexts, Network Policies, and other security features. You’ll also learn how to exploit workloads running on a Kubernetes environment using Living Off the Land (LotL) techniques like exploiting Insecure APIs, Secrets Theft, Container Escape and Pod Privilege Escalation, similar to the ones used by real-world threat actors.
This workshop is designed for both beginners and advanced students. By the end of the workshop, you’ll have a deep understanding of Kubernetes security and the skills to protect your clusters and workloads
Outline:
- – Kubernetes Security talk: ~40 mins
- – Q/A for intro talk, 10 mins
- – Break: 10 mins
- – Hands-On Attack and Defense workshop: 3 hrs
- – Abusing docker for privilege escalation
- – Container escape
- – Create New Kubernetes Cluster Using Kind
- – Explore Kubectl Command
- – Explore k9s To Manage Your Cluster
- – Deploy Kubernetes Workload
- – Get a Shell to a Running Container
- – ConfigMaps & Secrets
- – Namespaces
- – Pod Security Context
- – Kubernetes certificate authority
- – Pod resource limits
- – Scratch Containers
- – Service Account Token
- – Network Security Policies With Calico
- – kube-bench: CIS Kubernetes Benchmark
- – kube-hunter: Hunt for security weaknesses in Kubernetes clusters
- – kube-linter: Check Kubernetes YAML files and Helm charts
- – terrascan: Static code analyzer for Infrastructure as Code
- – kubeaudit: Audit your Kubernetes clusters against common security controls
- – Challenge 1: NFT Museum
- – Challenge 2: Network debugging console
This workshop is based on my open-source labs published at https://github.com/Alevsk/dvka/blob/master/workshop/README.md
Required Materials:
- – Laptop with at least 8gb of Ram (16gb is recommended)
- – Laptop with at least 40gb of free space (For downloading and running the workshop VM)
- – Internet connection, mostly to pull docker images and the required tools (kind, kubectl, kustomize, etc).
- – Any Linux distribution (ie: Kali or Ubuntu) or Mac OSX operating systems, or a virtual machine running them.
Biography:
![]() Lenin Alevski is a Full Stack Engineer and security-focused generalist with a deep passion for Information Security. He currently works as a Security Engineer at Google, where he focuses on building and securing distributed systems, with expertise in application and cloud security. Outside of work, Lenin enjoys playing CTFs, contributing to open-source projects, and sharing insights on security and privacy through his blog at https://www.alevsk.com. |
Modern Memory Forensics with Volatility 3
by Andrew Case and Hala Ali
Abstract:
Memory forensics—the analysis of volatile memory (RAM)—is an extremely powerful technique for detecting and triaging modern malware. Memory forensics is often a critical component of modern incident response due to the frequent use of memory-only payloads and rootkits that bypass EDRs, hide from live analysis tools, and often leave no file system artifacts. In this workshop, a mix of lectures and hands-on labs provides students with memory forensics knowledge and experience that can be utilized during real-world incident response. A few of the topics that will be covered during this workshop include detection and triage of credential dumping, lateral movement, and memory-only malware loading. By having documentation of these techniques in the slides and gaining hands-on experience analyzing them during the labs, attendees will leave with knowledge that is immediately applicable in real investigations. This workshop is focused on Volatility 3, which is now the standard and supported version of Volatility since its replacing Volatility 2 in April 2025.
Objectives:
– The importance of memory forensics
– Applying memory forensics in modern investigations
– Detailed instructions and examples of using Volatility 3
– Hands-on experience performing memory forensics
Provided to students:
The students will be provided with a virtual machine, memory samples, a PDF of the slides, and a lab guide that documents the exercises.









