Monday, 23 March 2015 - Pre-Conference Workshops Hilton Double Tree Burlington Hotel, Upper Leeson Street, Dublin 4 | ||
---|---|---|
8:00 | Registration opens (Business centre of the Burlington Hotel) | |
Workshop Track 1 (Herbert Ballroom) | Workshop Track 2 (Meeting Room 1&2) | |
8:30 | Digital Forensics Framework - Part I Frederic Baguelin & Solal Jacob (ArxSys) | Common Criteria for Digital Forensics Experts Hans Henseler & Sophie Loenhout |
12:15 | Lunch (Sussex 2) | |
13:00 | GRR Incident Response Framework Andreas Moser (Google) | Digital Memory Forensics interactive Workshop Johannes Stüttgen and Michael Cohen (Google) |
16:45 | Viking Splash Tour of Dublin City: Pick-up / Drop-off at the entrance to the Hotel. | |
18:30 | Welcome Reception (Ballroom Reception Area) | |
Tuesday, 24 March 2015 - Main Conference UCD Science Hub, University College Dublin, Belfield, Dublin 4 | ||
9:30 | Opening Remarks / Orientation | |
9:35 | Keynote Address Mr. Troels Oerting, Group CISO of Barclays Bank Plc, Former Head of European Cyber Crime Centre (EC3) at Europol | |
10:05 | Keynote Address Mr. Chris Ashton, Director of Spectrum Engineering at Inmarsat The Search for MH370: Lessons from Inmarsat's Flightpath Reconstruction Analysis | |
10:35 | SESSION 1: Network Forensics Chair: Michael Cohen | |
Hviz: HTTP(S) Traffic Aggregation and Visualization for Network Forensics *BEST PAPER* David Gugelmann, Fabian Gasser, Bernhard Ager and Vincent Lenders | ||
Spam Campaign Detection, Analysis, and Investigation Son Dinh, Taher Azeb, Francis Fortin, Djedjiga Mouheb and Mourad Debbabi | ||
11:30 | Break (Coffee and Tea) | |
12:00 | SESSION 2: Disk and Mobile Forensics Chair: Owen Brady | |
Fast contraband detection in large capacity disk drives Phil Penrose, William Buchanan and Richard Macfarlane | ||
Investigating Evidence of Mobile Phone Usage by Drivers in Road Traffic Accidents Graeme Horsman and Lynne Conniss | ||
13:00 | Lunch in PI Restaurant | |
14:10 | SESSION 3: Short Presentations 1 Chair: Mark Scanlon | |
Tor Forensics on Windows OS Mattia Epifani, Marco Scarito and Francesco Picasso | ||
Fast and Generic Malware Triage Using openioc_scan Volatility Plugin Takahiro Haruyama | ||
How I forced an Android Vulnerability into bypassing MDM restrictions + DIY - Android Malware analysis Zubair Ashraf. | ||
15:10 | Poster Session (Tea and Coffee) in the atrium beside Moore Auditorium | |
15:50 | SESSION 4: Memory and Malware Analysis Chair: Solal Jacob | |
Characterization of the Windows Kernel version variability for accurate Memory analysis Michael Cohen | ||
Acquisition and Analysis of Compromised Firmware Using Memory Forensics Johannes Stüttgen, Stefan Voemel and Michael Denzel | ||
SIGMA: A Semantic Integrated Graph Matching Approach for identifying reused functions in binary code Saed Alrabaee, Paria Shirani, Lingyu Wang and Mourad Debbabi | ||
17:30 | Hired bus trip from UCD back to DoubleTree Burlington Hotel for attendees staying at DoubleTree | |
19:00 | Dinner on your own. | |
20:00 | DFRWS Meetup at The Dakota Bar (30 min walk / 5 min taxi from hotel) | |
Wednesday, 25 March 2015 - Main Conference University College Dublin, O'Brien's Centre for Science | ||
8:30 | Registration starts at the concourse of Moore Auditorium (E0.08, UCD Science Hub) | |
8:30 | Hired bus trip from DoubleTree Burlington Hotel to UCD Science Hub for attendees staying at DoubleTree | |
9:30 | Opening Remarks / Orientation | |
9:35 | Keynote Speech David-Olivier Jaquet-Chiffelle (University of Lausanne) Title: Digital Forensics - Behind the Scenes(pres) | |
10:15 | SESSION 5: Investigating New Hardware Chair: Olga Angelopoulou | |
Smart TV Forensics: Digital Traces on televisions Abdul Boztas, Remko Riethoven and Mark Roeloffs | ||
Forensic Analysis of a Sony PlayStation 4: A First Look Allen Davies, Huw Read, Konstantinos Xynos and Iain Sutherland. | ||
11:15 | Break (Coffee and Tea) | |
11:45 | Panel Discussion Title: Forensic Tool Validation Moderator: Pavel Gladyshev Eoghan Casey (MITRE) Mikael Lindström (Europol EC3) Hans Henseler (Tracks Inspector) David-Olivier Jaquet-Chiffelle (Univ. Lausanne) | |
12:45 | Lunch in PI Restaurant | |
13:45 | SESSION 6: Handling Digital Evidence Chair: David-Olivier Jaquet-Chiffelle | |
A scalable file based data store for forensic analysis Flavio Cruz, Andreas Moser and Michael Cohen | ||
Leveraging CybOX to Standardize Representation and Exchange of Digital Forensic Information Eoghan Casey, Greg Back, and Sean Barnum | ||
Designing Robustness and Resilience in Digital Investigation Laboratories Philipp Amann and Joshua James. | ||
15:15 | Lightning Talks | |
15:30 | Break (Coffee and Tea in Demo and Poster Session Area) | |
16:00 | SESSION 7: Short Presentations 2 Chair: Hans Henseler | |
The EVIDENCE Project: Bridging the Gap in the Exchange of Digital Evidence across Europe Maria Angela Biasiotti and Fabrizio Turchi | ||
How to search extracted data Javier Collado | ||
A theoretic framework for evaluating similarity digesting tools Liwei Ren | ||
On Criteria for Evaluating Similarity Digest Schemes Jonathan Oliver. | ||
17:30 | Hired bus trip from UCD back to DoubleTree Burlington Hotel for attendees staying at DoubleTree | |
18:30 | Start of social program, including main banquet, forensic rodeo, and other activities(DoubleTree Burlington Hotel - Sussex Restaurant) Best Paper Award | |
Thursday 26 March 2015 -E-DAIS Workshop First European Workshop on Data Analytics for Information Security and Forensics (E-DAIS) | ||
9:00 | Registration opens (Business centre of the Burlington Hotel) | |
10:00 | Keynote Speech: Mr. Jean-Dominique Nollet, Head of Unit, Forensics, Research, Development, European Cybercrime Centre.Research challenges for large scale forensics & data analytics in cybercrime investigations | |
10:30 | Panel Discussion: Technical Problems of Big Data Analysis for Information Security and forensics | |
11:15 | Break (Coffee and Tea) | |
11:30 | Panel Discussion: Societal / Privacy Problems of Big Data Analysis for Information Security and forensics | |
12:15 | Lunch (Sussex Restaurant) | |
13:00 | Breakout Groups | |
interoperability standards visual analytic techniques for information security and forensics text translation and mining for information security and forensics; legal aspects of cross-jurisdictional data collection and analysis socio-technical approaches to strengthening human rights protection and public oversight over investigative big data analytics | ||
15:00 | Short presentation of discussion outcomes by each group | |
16:00 | Future actions & concluding remarks |