Wednesday, May 7, 2014 | ||
---|---|---|
8:00 | Registration / Breakfast | |
9:00 | Opening Remarks - Eoghan Casey | |
9:10 | Keynote Address Peter Zinn (Senior Cybercrime Advisor for the Dutch National High Tech Crime Unit) Police, cyber and forensics | |
10:10 | Break | |
10:30 | SESSION 1: General data analytics Chair: Hans Henseler | |
"Robust Linux Memory Acquisition with Minimal Target Impact" Johannes Stuettgen and Michael Cohen -- Best Paper | ||
"Practical Use of Approximate Hash Based Matching in Digital Investigations" Petter Christian Bjelland, André Årnes and Katrin Franke | ||
"Fast Indexing Strategies for Robust Image Hashes" Christian Winter and York Yannikos | ||
12:00 | Lunch on your own | |
14:00 | SESSION 2: Processes and Services Chair: Zeno Geradts | |
"Automated evaluation of approximate matching algorithms on real data" Frank Breitinger and Vassil Roussev | ||
"Information Assurance in a distributed forensic cluster" Nicholas Pringle and Mikhaila Burgess | ||
"OpenLV: Empowering Investigators and First-Responders in the Digital Forensics Process" Timothy Vidas, Brian Kaplan and Matthew Geiger | ||
"Digital Forensics as a Service: a Game Changer" Ruud van Baar, Harm van Beek and Erwin van Eijk | ||
16:00 | Break (Coffee and Tea) | |
16:30 | Panel Discussion Title: Reducing Backlogs in Digital Forensics Labs Moderator: Hans Henseler Adrie Stander, University of Cape Town Ruud van Baar, NFI Nina van der Knaap, Leiden University Eoghan Casey, MITRE | |
17:30 | Five-Minute Teasersfor Tool Demos and poster session | |
18:00 | Welcome reception/drinks at the conference venue, including poster and demo session | |
Thursday, May 8, 2014 | ||
8:20 | Administrative Remarks | |
8:30 | Keynote Address Christiaan Alberdingk Thijm (Dutch lawyer from bureau Brandeis, experiences include the Kazaa case and other complex digital cases) The importance of fact-finding in technology cases | |
9:30 | Invited Speaker Mikael Lindström (European Cyber Crime Center, EC3) Title: EC3 - European Cyber Crime Centre - fighting crime from the international perspective | |
10:10 | Break (Coffee and Tea) | |
10:30 | SESSION 3: Technology-specifc analysis Chair: Pavel Gladyshev | |
"Key-hiding on the ARM platform" Alexander Nilsson, Marcus Andersson and Stefan Axelsson | ||
"Forensic Analysis of Video File Formats" Thomas Gloe, André Fischer and Matthias Kirchner | ||
"BitTorrent Sync: First Impressions and Digital Forensic Implications" Jason Farina, Mark Scanlon and Tahar Kechadi | ||
"Windows Surface RT Tablet Forensics" Asif Iqbal, Hanan Alobaidli, Andrew Marrington and Andy Jones | ||
12:30 | Lunch on your own | |
14:30 | SESSION 4: Memory analysis Chair: Tim Vidas | |
"OBA2: An Onion Approach to Binary Code Authorship Attribution" Saed Alrabaee, Mourad Debbabi and Lingyu Wang | ||
"Out of sight, but not out of mind:Traces of nearby devices' wireless transmissions in volatile memory" Wicher Minnaard | ||
"On the database lookup problem of approximate matching" Frank Breitinger, Harald Baier and Douglas White | ||
16:00 | Break (Coffee and Tea) | |
16:30 | Short Presentations & Works in Progress (Lightning Talks, 5 minutes each) | |
17:00 | Panel Discussion Title: Preservation of Provenance in the Cloud Moderator: Luciana Duranti | |
18:00 | Banquet and Forensic Rodeo | |
Friday, May 9, 2014 | ||
Workshop Track 1 | Workshop Track 2 | |
8:00 | GRR Incident Response Framework Michael Cohen & Andreas Moser | Video File Recovery using Defraser Zoun |
9:45 | Break | |
10:00 | GRR Incident Response Framework (continued) | Real Network Forensics KungFu Kelvin Wong, Alan Ho, & Anthony Lai |
11:30 | Lunch on your own | |
12:30 | Memory forensic analysis workshop Michael Cohen & Johannes Stuettgen | OpenStack Cloud Forensics Lee Tobin, Paulo Roberto Nunes de Souza, Afrah Almansoori, Pavel Gladyshev, & Babak Habibnia |