The DFRWS-APAC 2022 Conference will be held Wednesday, September 28 through Friday, September 30. The DFRWS APAC program committee are currently planning the conference as a hybrid event, with it possible for attendees and presenters to attend either virtually via Zoom or physically in Adelaide, Australia (pandemic permitting).
Conference Location:
The conference will be held at the University of Adelaide and will be live streamed for online attendees.
We will be meeting at the Horace Lamb Lecture Theatre located in the Horace Lamb Building, Level 1,
North Campus, University of Adelaide, SA 5000
September 28, 2022 to September 30, 2022
*Please note that on Sat 1 October, we will be hosting an excursion to the wineries of the Adelaide Hills. Attendance is optional and will incur a separate charge, payable at the conference.
Coronavirus Information
This will be the first DFRWS APAC event which includes an in-person attendance option (our inaugural conference was virtual due to the COVID pandemic).
For the in-person attendees, we will be following the guidelines from the Australian Government and the South Australian Government, and the University of Adelaide regarding coronavirus precautions.
In addition, attendees and presenters may choose to attend virtually, so no one should be excluded if they prefer not to attend an in-person event at this time. If you are a presenter and you want to present virtually please contact the TPC chairs. If you are an attendee and you prefer to attend virtually, please select one of the virtual tickets in the registration section.
Travel Advice
Please review the Australian Government site and the South Australian Government site for the most up-to-date Covid guidelines on travel to Australia. In addition, please consider the travel guidelines of your country as well. If you need to check if you need a visa to enter Australia, please see this site for more details.
Accommodation
Learning from previous years, we are unable to commit to block booking accommodation, given uncertain physical attendance numbers and ever-changing situations. As a result, you are encouraged to book your own accommodation. Many accommodation options are available within walking distance of the venue (the University of Adelaide which is in the vicinity of the corner of North Terrace and Frome Rd.). Some suggestions are listed below as a starting point; far more options exist and are accessible via online maps and travel booking sites.
Ibis Adelaide : Distance to Venue 900m
Crown Plaza Adelaide : Distance to venue 350 m
Hotel Grand Chancellor : Distance to venue 350 m
Majestic Roof Garden : Distance to Venue 450m
Pullman Adelaide : Distance to venue 350 m
DFRWS APAC Online Store
Keynotes
Lessons learned from implementing digital forensic as a service
Harm Van Beek | Senior Digital Forensic Scientist, Netherlands Forensic InstituteBio
Harm van Beek is an experienced senior digital forensic scientist at the Netherlands Forensic Institute (NFI). His work consists of performing examinations in criminal cases, and conducting scientific research in the digital forensic field. Harm is one of the founders of the forensic investigation, innovation and knowledge sharing platform Hansken. He was technical director of CASE, the international standard for sharing cyber-investigation traces.
Harm obtained his PhD in formal methods (mathematics and computer science) at the Eindhoven University of Technology. Before joining the NFI in 2009, he was cofounder and CTO of ISAAC (becoming iO), a company dedicated to digital strategy, design, development and integration.
Abstract
Since 2010, The Netherlands Forensic Institute offers the digital forensics as a service (DFaaS) platform Hansken to law-enforcement agencies. Nowadays, these agencies as well as academic institutes cooperate in the Hansken community, joining forces to improve the platform and share knowledge. Implementing DFaaS overhauls the process of handling digital evidence, amongst others by directly delivering the digital evidence to case investigators. They can search, filter and report the evidence according to their needs. The investigative results, of course, must be admissible in court. Therefore, Hansken includes precautions to ensure forensic integrity and implements multiple legal functions. Access is provided to defense lawyers to review investigative results and possibly identify exculpatory evidence. Building and servicing such a platform and supporting on-premise implementations comes with many challenges. This puts high demands on both the platform design and implementation as well as the investigative process. In this talk, Harm explains the challenges and key lessons learned from providing this service for over a decade.
Side Channels and the Art of Recovering Secrets from your Microarchitecture
Yuval Yarom | Associate Professor, the University of AdelaideBio
Yuval Yarom is an Associate Professor at the School of Computer Science at the University of Adelaide. He earned his Ph.D. in Computer Science from the University of Adelaide in 2014, and an M.Sc. in Computer Science and a B.Sc. in Mathematics and Computer Science from the Hebrew University of Jerusalem in 1993 and 1990, respectively. In between he has been the Vice President of Research in Memco Software and a co-founder and Chief Technology Officer of Girafa.com.
Yuval's research explores the security of the interface between the software and the hardware. In particular, He is interested in the discrepancy between the way that programmers think about software execution and the concrete execution in modern processors. He works on identifying micro-architectural vulnerabilities, and on exploitation and mitigation techniques.
Abstract
Modern computer systems often run multiple programs that do not trust each other. Research over the last two decades has highlighted the risk that sharing resources poses to the security of systems. Specifically, microarchitectural side-channel attacks allow malicious programs to steal secrets of co-resident programs. This talk presents an overview of such side channels and how they operate. It first presents traditional cache attacks and how they exploit the cache state as a communication channel for leaking information. It then continues to the more recently discovered transient-execution attacks, which exploit processor behaviour to bypass security checks.
Participation
DFRWS invites contributions in the categories listed below.
FULL RESEARCH PAPERS undergo double-blinded peer review, and the proceedings are published by Elsevier as a special issue of the Journal of Forensic Science International: Digital Investigation. We ask to submit articles according to the submission instructions.
PRESENTATIONS / DEMOS require a brief proposal (~500 words, informal), not a paper. These proposals undergo a light review process to select presentations of maximal interest to DFRWS attendees, and to filter out sales pitches. Accepted proposals will be given a presentation slot (~15min) during the conference. Note that the presentation/demo will not be part of the published proceedings. There will be (at least) one session where participants can directly watch demos and talk to the people running them.
POSTERS allow for the presentation of current research efforts and the discussion of preliminary results with the Digital Forensics Community. Consequently, posters can include early results, brief demonstration of a prototype or can outline research ideas. Posters will be available on the website and authors have the opportunity to present during breaks to receive feedback from the community. Note, posters will not be part of the published proceedings.
WORKSHOPS / TUTORIALS can be 2 to 4 hours (please indicate) and ideally include hands-on participation by attendees, allowing for an in-depth, detailed exploration of tools and techniques of interest to DFRWS attendees. Workshops can cover state-of-the-art research projects, useful tips and techniques for standard tools, or most anything that DFRWS attendees would consider beneficial. While commercial tools can be used, these workshops or tutorials should NOT be thinly-veiled commercial advertisements.
DFRWS will provide one free conference registration for each workshop accepted.
PANEL PROPOSALS should be one to three pages and clearly describe the topic, its relevance, and a list of potential panelists including their biographies (short). Panels will be evaluated based on the topic relevance and diversity of the panelists.
Submission Information
We ask you to submit all contributions via EasyChair (select the appropriate track during submission). Please make sure to follow the submission guidelines on the website (https://dfrws.org/apac-2022-submission-guidelines). Organizers may reject work that does not follow the listed criteria.
Easychair: https://easychair.org/conferences/?conf=dfrwsapac2022
Topics of Interest
DFRWS welcomes new perspectives that push the envelope of what is currently possible in digital forensic. Potential topics to be addressed by submissions include, but are not limited to:
- Machine learning and data mining for digital evidence extraction/query
- Malware and targeted attacks (analysis and attribution)
- Forensics analysis and visualization of Big Data
- Non-traditional forensic scenarios / contexts
- Network and distributed system forensics
- Mobile and embedded device forensics
- Forensic analysis of cloud and virtualized environments
- Vehicle forensics (e.g., drones, cars)
- Forensic analysis of new devices (e.g., wearables)
- Forensic analysis of SCADA and ICS (industrial control systems), smart power grids
- Covert channels (e.g., TOR, VPN)
- Implanted medical devices forensics
- Smart buildings investigations and forensics
- Virtual currency investigations and forensics
- Digital forensic preparedness / readiness
- Digital investigation case management
- Digital evidence sharing and exchange
- Digital forensic triage / survey
- Digital forensic tool validation
- Event reconstruction methods and tools
- Digital evidence and the law
- Case studies and trend reports
- Anti-forensics and anti-anti-forensics
Deadlines
Date | Event |
---|---|
February 28, 2022 | Call for papers announced |
May 16, 2022 | Submission deadline for papers |
June 27, 2022 | Author notification for full papers |
July 19, 2022 | Submission deadline for presentations, posters and workshops |
July 22, 2022 | Notifications for presentations, posters and workshops |
Committees
Organizing Committee
Conference Chair
Bradley Schatz (Schatz Forensic)
Conference Vice Chair
Matthew Sorell (University of Adelaide)
Production
Daryl Pfeif (Digital Forensic Solutions)
Secretary
Frank Adelstein (NFA Digital)
Workshops
Manoranjan Mohanty (University of Technology Sydney)
TPC Chair
KP Chow (University of Hong Kong)
TPC Vice Chair
Andrew Marrington (Zayed University)
Keynotes
Bradley Schatz (Schatz Forensic)
Technical Platform
Richard Matthews (University of Adelaide)
Proceedings
Jungheum Park (Korea University)
Prerecords
Asanka Sayakkara (University of Colombo)
Forensic Rodeo
Luke Jennings and Matthew Sorell
Presentations
Yogesh Khatri (CyberCX)
Social Media
Inderbeer Singh
Academic Outreach
Emmanuel Pilli (Malaviya National Institute of Technology Jaipur)
Web
Yogesh Khatri (CyberCX)
Registration
Sponsors
Sponsors help DFRWS to produce quality events and foster community. Click a logo to learn more about the sponsor.
Information about sponsorship opportunities is available at: http://www.dfrws.org/sponsorship-opportunities
University of Adelaide
This year's conference is held in cooperation with the University of Adelaide.
The University of Adelaide is held in high regard globally. Our degrees in the discipline are ranked Ranked 16th in the world for Electrical and Electronic Engineering (US News Global University Ranking, 2022). The School of Electrical and Electronic Engineering’s undergraduate, postgraduate and research degrees equip students with the high-level knowledge and skills to have a positive impact society-wide.
Learn MoreCDFS
CBIT Digital Forensic Services (CDFS) is Australia’s premier and most trusted supplier of digital forensic tools, training and certification.
CDFS is a well-regarded authority on the subject of Digital Forensics, with an established track record providing end-to-end solutions including procurement, implementation, consulting, expert witness testimony, as well as designing and delivering training nationally and on an international scale.
Our team of specialists provide innovated solutions to clients across numerous sectors throughout Asia Pacific, as well as Law Enforcement and Government panels across Australia. We strive to deliver education and service at a level that far surpasses what has traditionally been available in the industry.
Learn MoreDeSales University
At DeSales you will learn the basics of criminological theory and practice while concentrating your studies in the field of digital forensics. As a graduate of this program, you'll gain the knowledge and skills necessary to make an immediate contribution to your field.
Learn MoreAPNIC
APNIC (Asia Pacific Network Information Centre) is an open, member-based, not-for-profit organization, whose primary role is to distribute and manage Internet number resources (IP addresses and AS numbers) in the Asia Pacific region’s 56 economies. These number resources are the building blocks for the Internet to operate and grow.
As part of this service, APNIC is responsible for maintaining the public APNIC Whois Database and managing reverse DNS zone delegations.
APNIC also provides forums for Internet policy development, that are bottom-up and open to everyone.
Furthermore, APNIC helps build essential technical skills across the region, supports Internet infrastructure development, produces insightful research, and is an active participant in the multistakeholder model of Internet cooperation and governance.
APNIC performs these activities as part of its commitment to a global, open, stable and secure Internet that serves the entire Asia Pacific region.
Learn MoreMagnet Forensics
Magnet Forensics develops digital investigation software that acquires, analyzes, reports on, and manages evidence from computers, mobile devices, IoT devices and the Cloud. Magnet Forensics also creates lab management solutions to automate and orchestrate intake of evidence and foster agency collaboration. Magnet Forensics products are used by over 4,000 public and private sector organizations in over 90 countries and have been helping investigators fight crime, protect assets and guard national security since 2011.
Learn More