Please note: All times below are in Australian Eastern Standard Time, where the current time is:
Day 1 - Wednesday, September 28, 2022
Time | Event | |
---|---|---|
11:00 - 12:00 | Workshop Session I - Part I | |
Room 1: Sydney Declaration: the path ahead for digital forensic science | Claude Roux, et al | |
Room 2: Velociraptor | Mike Cohen | |
12:00 - 13:00 | Workshop Session I - Part II | |
Room 1: Sydney Declaration: the path ahead for digital forensic science | Claude Roux, et al | |
Room 2: Velociraptor | Mike Cohen | |
13:00 - 14:00 | Lunch Break | |
14:00 - 15:30 | Workshop Session II - Part I | |
Room 1: How to provide Digital Forensics as a Service | Harm van Beek | |
Room 2: Velociraptor | Mike Cohen | |
15:30 - 15:45 | Break | |
15:45 - 17:15 | Workshop Session II - Part II | |
Room 1: How to provide Digital Forensics as a Service | Harm van Beek | |
Room 2: Velociraptor | Mike Cohen |
Day 2 - Thursday, September 29, 2022
Time | Event |
---|---|
10:00 | Opening – Welcome Remarks |
10:30 | Keynote Harm Van Beek (Netherlands Forensic Institute) | Lessons learned from implementing digital forensic as a service |
11:30 | Break |
12:00 | Session 1 - Cybercrime |
Foundations of Cybercriminalistics: From General Process Models to Case-Specific Concretizations in Cybercrime Investigations Jan Gruber, Lena Voigt, Zinaida Benenson and Felix Freiling |
|
Revisiting the dataset Gap Problem - On Availability, Assessment, and Perspective of Mobile Forensic Corpora Patrik Gonçalves, Klara Dolos, Michelle Stebner, Andreas Attenberger and Harald Baier |
|
13:00 | Lunch Break |
14:00 | Session 2 - IoT Forensics |
Digital Forensic Analysis of Mobile Automotive Maintenance Applications Faisal Sumaila and Hayretdin Bahsi |
|
ProvNet-IoT: Provenance based Network Layer Forensics in Internet of Things Lakshminarayana Sadineni, Emmanuel S. Pilli and Ramesh Babu Battula |
|
15:00 | Break |
15:30 | Session 3 - Cloud Forensics |
CATCH: Cloud Data Acquisition through Comprehensive and Hybrid Approaches Jihyeok Yang, Jieon Kim, Jewan Bang, Sangjin Lee and Jungheum Park |
|
A forensic analysis of rclone and rclone’s prospects for digital forensic investigations of cloud storage Frank Breitinger, Xiaolu Zhang and Darren Quick |
|
16:30 | Presentation Session 1 |
Ransomware Incident Investigation and Cryptocurrency Tracing with OSINT Anthony Lai, Kelvin Wong, Alan Po Lun Ho and Ping Fan Ke |
|
SnapScraper - Automated Open Source Content Scraping for Snapchat InvestigationsRichard Matthews, Tait Moseley, Sanjana Tanuku, Siyu Wang Tanuku, Liyu Xu and Matthew Sorell | |
Classification and Identification of Darknet Traffic Based on Residual Neural Network Xinhao Zhang, Yuzhe Wang, Yonghao Yu, Xin Yu and Ying Yang |
|
17:30 | Social Agenda begins |
Day 3 - Friday, September 30, 2022
Time | Event |
---|---|
10:00 | Keynote Yuval Yarom (University of Adelaide) | Side Channels and the Art of Recovering Secrets from your Microarchitecture |
11:00 | Break |
11:30 | Session 4 - Deep Learning |
Neural AutoForensics: Comparing Neural Sample Search and Neural Architecture Search for Malware Detection and Forensics Mohit Sewak, Sanjay K. Sahay and Hemant Rathore |
|
GreenForensics: Deep Hybrid Edge-Cloud Detection and Forensics System for Battery-Performance-Balance Conscious Devices Mohit Sewak, Sanjay K. Sahay and Hemant Rathore |
|
Using Deep Learning To Detect Social Media ‘Trolls’ Áine Macdermott, Michal Motylinski, Farkhund Iqbal, Kellyann Stamp, Mohammed Hussain and Andrew Marrington |
|
13:00 | Lunch Break |
14:00 | Session 5 - Social Media Forensics |
Retrieving deleted records from Telegram Alexandros Vasilaras, Donatos Dosis, Michael Kotsis and Panagiotis Rizomiliotis |
|
Forensic investigation of Google Meet for memory and browser artifacts Farkhund Iqbal, Zainab Khalid, Andrew Marrington, Babar Shah and Patrick C.K. Hung |
|
15:00 | Break |
15:30 | Session 6 - Investigation |
Sensitivity analysis for a Bitcoin simulation model Yanan Gong, Kam-Pui Chow, Siu-Ming Yiu and Hing-Fung Ting |
|
DiagAnalyzer : User Behavior Analysis and Visualization Using Windows Diagnostics Logs Sungha Park and Sangjin Lee |
|
16:30 | Presentation Session 2 |
Dealing with pseudo-science – Introducing the Forensic Acceptance and Readiness Scale. Richard Matthews and Matthew Sorell |
|
Collecting Forensic Evidence from SaaS Applications – A Study of Microsoft 365 Forensics Frankie Li, Lester Ip, Anson Lam and Siu Ming Yiu |
|
17:00 | Social Agenda begins |