Paper | Presentation Conference Downloads Author
TLSkex: Harnessing Virtual Machine Introspection for Decrypting TLS Communication DFRWS EU 2016 Benjamin Taubmann, Christoph Freidrich, Dominik Dusold, Hans Reiser
Virtual Currencies DFRWS EU 2016 André Fischer, Jakob Hasse, Thomas Gloe
2016 DFRWS Challenge DFRWS USA 2015 Michael McCarrin, Brian Greunke, Robert Beverly, Ph.D.
Advancing Mac OS X Rootkit Detection DFRWS USA 2015 Andrew Case, Golden Richard III, Ph.D.
Archival Science, Digital Forensics, and New Media Art DFRWS USA 2015 Dianne Dietrich, Frank Adelstein, Ph.D.
Automatic Classification of Object Code Using Machine Learning DFRWS USA 2015 John Clemens
BinComp: A Stratified Approach to Compiler Provenance Attribution DFRWS USA 2015 Saed Alrabaee, Paria Shirani, Mourad Debbabi, Ashkan Rahimian, Lingyu Wang
Bitcurator: Redacting and providing access to data from disk images DFRWS USA 2015 Christopher Lee, Kam Woods
Creating Forensics Tools in Go DFRWS USA 2015 Vico Marziale, Ph.D., Joe Sylve, Ph.D.
Database Forensic Analysis Through Internal Structure Carving DFRWS USA 2015 James Wagner, Alexander Rasin, Jonathan Grier
Detecting Very Large Sets Of Referenced Files At 40:100 Gbe, Especially Mp4 Files DFRWS USA 2015 Adrien Larbanet, Jonas Lerebours, Jean Pierre David
E-mail Authorship Attribution Using Customized Associative Classification DFRWS USA 2015 Michael Schmid, Farkhund Iqbal, Benjamin Fung
Federated Testing: Shared Test Materials from the CFTT Program at NIST DFRWS USA 2015 Ben Livelsberger, James Lyle
Finding your naughty BITS DFRWS USA 2015 Matthew Geiger
Graph-Theoretic Characterization of Cyber-threat Infrastructures DFRWS USA 2015 Amine Boukhtouta, Djedjiga Mouheb, Mourad Debbabi, Omar Alfandi, Farkhund Iqbal, May El Barachi
GRR Rapid Response, Part 1 DFRWS USA 2015 Greg Castle
GRR Rapid Response, Part 2 DFRWS USA 2015 Greg Castle
Hash-Based Carving: Searching Media For Complete Files And File Fragments With Sector Hashing And hashdb DFRWS USA 2015 Simson Garfinkel, Ph.D., Michael McCarrin
Inferring Past Activity from Partial Digital Artifacts DFRWS USA 2015 James Jones, Tahir Khan, Kathryn Laskey, Alexander Nelson, Ph.D., Mary Laamanen, Douglas White
LINCS: Towards Building a Trustworthy Litigation Hold Enabled Cloud Storage System DFRWS USA 2015 Shams Zawoad, Ragib Hasan, John Grimes
Network And Device Forensic Analysis Of Android Social-Messaging Applications DFRWS USA 2015 Daniel Walnycky, Ibrahim Baggili, Andrew Marrington, Frank Breitinger, Jason Moore
New Acquisition Method Based On Firmware Update Protocols For Android Smartphones DFRWS USA 2015 Seung Jei Yang, Jung Ho Choi, Ki Bom Kim, Tae Joo Chang
Privacy-Preserving Email Forensics DFRWS USA 2015 Frederik Armknecht, Andreas Dewald, Michael Gruhn
Python scripting in Autopsy DFRWS USA 2015 Brian Carrier (Honorary Board Member) , Ph.D.
Rapid Forensic Imaging of Large Disks with Sifting Collectors DFRWS USA 2015 Jonathan Grier, Golden Richard III, Ph.D.
Reverse Engineering with Rekall DFRWS USA 2015 Michael Cohen
The Chain Of Custody: A Big Misconception DFRWS USA 2015 Tobias Eggendorfer
The Impact of GPU-Assisted Malware on Memory Forensics: A Case Study DFRWS USA 2015 Davide Balzarotti, Roberto Di Pietro, Antonio Villani
Vehicle forensics DFRWS USA 2015 Ben Lemere
Video Authentication Using File Structure and Metadata DFRWS USA 2015 Jake Hall
What keeps me up at night? - “Unsolved” problems in Incident Response DFRWS USA 2015
Wirespeed: Extending The AFF4 Container Format For Scalable Acquisition And Live Analysis DFRWS USA 2015 Bradley Schatz, Ph.D.
A Scalable File Based Data Store For Forensic Analysis DFRWS EU 2015 Flavio Cruz, Andreas Moser, Michael Cohen
A Theoretic Framework For Evaluating Similarity Digesting Tools DFRWS EU 2015 Liwei Ren
Acquisition and Analysis of Compromised Firmware Using Memory Forensics DFRWS EU 2015 Johannes Stüttgen, Stefan Voemel, Michael Denzel
Characterization Of The Windows Kernel Version Variability For Accurate Memory Analysis DFRWS EU 2015 Michael Cohen
Designing Robustness and Resilience in Digital Investigation Laboratories DFRWS EU 2015 Philipp Amann, Joshua James
Digital Forensics - Behind the Scenes DFRWS EU 2015 David-Olivier Jaquet-Chiffelle
Fast and Generic Malware Triage Using openioc_scan Volatility Plugin DFRWS EU 2015 Takahiro Haruyama
Fast Contraband Detection In Large Capacity Disk Drives DFRWS EU 2015 Phil Penrose, William Buchanan, Richard Macfarlane
Forensic Analysis of a Sony PlayStation 4 - A First Look DFRWS EU 2015 Allen Davies, Huw Read, Konstantinos Xynos, Iain Sutherland
How I Forced An Android Vulnerability Into Bypassing Mdm Restrictions + Diy - Android Malware Analysis DFRWS EU 2015 Zubair Ashraf
How To Search Extracted Data DFRWS EU 2015 Javier Collado
Hviz HTTP(S) Traffic Aggregation and Visualization for Network Forensics DFRWS EU 2015 David Gugelmann, Fabian Gasser, Bernhard Ager, Vincent Lenders
Investigating Evidence of Mobile Phone Usage by Drivers in Road Traffic Accidents DFRWS EU 2015 Graeme Horsman, Lynne Conniss
Leveraging CybOX to Standardize Representation and Exchange of Digital Forensic Information DFRWS EU 2015 Eoghan Casey, Ph.D., Greg Back, Sean Barnum
On Criteria for Evaluating Similarity Digest Schemes DFRWS EU 2015 Jonathan Oliver
SIGMA - A Semantic Integrated Graph Matching Approach For Identifying Reused Functions In Binary Code DFRWS EU 2015 Saed Alrabaee, Paria Shirani, Lingyu Wang, Mourad Debbabi
Smart TV Forensics - Digital Traces On Televisions DFRWS EU 2015 Abdul Boztas, Remko Riethoven, Mark Roeloffs
Spam Campaign Detection, Analysis, and Investigation DFRWS EU 2015 Son Dinh, Taher Azeb, Francis Fortin, Djedjiga Mouheb, Mourad Debbabi
The Evidence Project - Bridging The Gap In The Exchange Of Digital Evidence Across Europe DFRWS EU 2015 Fabrizio Turchi
Tor Forensics on Windows OS DFRWS EU 2015 Mattia Epifani, Marco Scarito, Francesco Picasso
A Complete Formalized Knowledge Representation Model for Advanced Digital Forensics Timeline Analysis DFRWS USA 2014 Yoan Chabot, Aurelie Bertaux, Christophe Nicolle, Tahar Kechadi
A Forensically Robust Method For Acquisition Of iCloud Data DFRWS USA 2014 Kurt Oestreicher
Cooperative Mode - Comparative Storage Metadata Verification Applied To The Xbox 360 DFRWS USA 2014 Alex Nelson, Ph.D., Erik Steggall, Darrell Long
Design Tradeoffs for Developing Fragmented Video Carving Tools DFRWS USA 2014 Eoghan Casey, Ph.D., Rikkert Zoun
Developing a New Digital Forensics Curriculum DFRWS USA 2014 Anthony Lang, Masooda Bashir, Roy Campbell, Lizanne Destefano
Digital Investigations for IPv6-Based Wireless Sensor Networks DFRWS USA 2014 Vijay Kumar, George Oikonomou, Theo Tryfonas, Dan Page, Iain Phillips
Enabling Digital Forensics Practices in Libraries, Archives and Museums - The BitCurator Experience DFRWS USA 2014 Christopher Lee, Kam Woods
Extracting Hidden Messages in Steganographic Images DFRWS USA 2014 Tu-Thach Quach
Image-Based Kernel Fingerprinting DFRWS USA 2014 Vassil Roussev, Ph.D., Irfan Ahmed, Thomas Sires
In Lieu of Swap - Analyzing Compressed RAM in Mac OS X and Linux DFRWS USA 2014 Golden Richard III, Ph.D., Andrew Case
Information Assurance In A Distributed Forensic Cluster DFRWS USA 2014 Nick Pringle, Mikhaila Burgess
Media Forensics Analysis In Digital Times DFRWS USA 2014 Catalin Grigoras
Memory Forensics with Hyper-V Virtual Machines DFRWS USA 2014 Wyatt Roersma
Multidimensional Investigation of Source Port 0 Probing DFRWS USA 2014 Elias Bou-Harb, Nour-Eddine Lakhdari, Hamad Binsalleeh, Mourad Debbabi
Preliminary Forensic Analysis Of The Xbox One DFRWS USA 2014 Jason Moore, Ibrahim Baggili, Andrew Marrington, Armindo Rodrigues
Ranking Algorithms For Digital Forensic String Search Hits DFRWS USA 2014 Nicole Beebe, Ph.D., Lishu Liu
Some Practical Thoughts Concerning Active Disk Antiforensics DFRWS USA 2014 Travis Goodspeed
Testing the Forensic Soundness of Forensic Examination Environments on Bootable Media DFRWS USA 2014 Ahmed Fathy Abdel Latif Mohamed, Andrew Marrington, Farkhund Iqbal, Ibrahim Baggili
The Application Of Reverse Engineering Techniques Against The Arduino Microcontroller To Acquire Uploaded Applications DFRWS USA 2014 Steve Watson
The National Software Reference Library DFRWS USA 2014 Douglas White
The Regional Computer Forensics Lab System DFRWS USA 2014 Sean O'Brien
These Logs Were Made for Talking DFRWS USA 2014 Matt Bromiley
VMI-PL - A Monitoring Language for Virtual Platforms Using Virtual Machine Introspection DFRWS USA 2014 Florian Westphal, Stefan Axelsson, Christian Neuhaus, Andreas Polze
Automated Evaluation Of Approximate Matching Algorithms On Real Data DFRWS EU 2014 Frank Breitinger, Vassil Roussev, Ph.D.
BitTorrent Sync - First Impressions and Digital Forensic Implications DFRWS EU 2014 Jason Farina, Mark Scanlon, Ph.D., Tahar Kechadi
Digital Forensics as a Service - a Game Changer DFRWS EU 2014 Ruud van Baar, Harm van Beek, Erwin van Eijk
Fast Indexing Strategies for Robust Image Hashes DFRWS EU 2014 Christian Winter, Martin Steinebach, York Yannikos
Forensic Analysis of Video File Formats DFRWS EU 2014 Thomas Gloe, André Fischer, Matthias Kirchner
Information Assurance In A Distributed Forensic Cluster DFRWS EU 2014 Nicholas Pringle, Mikhaila Burgess
Key-Hiding On The ARM Platform DFRWS EU 2014 Alexander Nilsson, Marcus Andersson, Stefan Axelsson
OBA2 - An Onion Approach to Binary Code Authorship Attribution DFRWS EU 2014 Saed Alrabaee, Noman Saleem, Stere Preda, Lingyo Wang, Mourad Debbabi
On The Database Lookup Problem Of Approximate Matching DFRWS EU 2014 Frank Breitinger, Harald Baier, Douglas White
OpenLV - Empowering Investigators and First-Responders in the Digital Forensics Process DFRWS EU 2014 Brian Kaplan, Matthew Geiger
Out Of Sight, But Not Out Of Mind - Traces Of Nearby Devices' Wireless Transmissions In Volatile Memory DFRWS EU 2014 Wicher Minnaard
Practical Use of Approximate Hash Based Matching in Digital Investigations DFRWS EU 2014 Petter Christian Bjelland, André Årnes, Katrin Franke
Robust Linux Memory Acquisition with Minimal Target Impact DFRWS EU 2014 Johannes Stuettgen, Michael Cohen
Windows Surface RT Tablet Forensics DFRWS EU 2014 Asif Iqbal, Hanan Alobaidli, Andrew Marrington, Andy Jones
A Study of User Data Integrity During Acquisition of Android Devices DFRWS USA 2013 Namheun Son, Yunho Lee, Dohyun Kim, Joshua James, Sangjin Lee, Kyungho Lee
An Evaluation Platform for Forensic Memory Acquisition Software DFRWS USA 2013 Stefan Voemel, Johannes Stuettgen
Android Forensics - Automated Data Collection And Reporting From A Mobile Device DFRWS USA 2013 Justin Grover
Anti-Forensic Resilient Memory Acquisition DFRWS USA 2013 Johannes Stüttgen, Michael Cohen
Automated Identification of Installed Malicious Android Applications DFRWS USA 2013 Mark Guido, Justin Grover, Jared Ondricek, Dave Wilburn, Drew Hunt, Thanh Nguyen
Design and Implementation of FROST - Digital Forensic Tools for the OpenStack Cloud Computing Platform DFRWS USA 2013 Josiah Dykstra, Ph.D., Alan Sherman
File Fragment Encoding Classification - An Empirical Approach DFRWS USA 2013 Vassil Roussev, Ph.D., Candice Quates
FRASH - A Framework To Test Algorithms Of Similarity Hashing DFRWS USA 2013 Frank Breitinger, Georgios Stivaktakis, Harald Baier
Improved Recovery and Reconstruction of DEFLATEd Files DFRWS USA 2013 Ralf Brown
Integrity Verification of User Space Code DFRWS USA 2013 Andrew White, Bradley Schatz, Ph.D., Ernest Foo
Language Translation for File Paths DFRWS USA 2013 Neil Rowe, Riqui Schwamm, Simson Garfinkel, Ph.D.