Paper | PresentationConferenceDownloadsAuthor
An Overall Assessment Of Mobile Internal Acquisition ToolDFRWS USA 2008 Alessandro Distefano (University of Rome), Gianluigi Me (University of Rome)
Detecting File Fragmentation Point Using Sequential Hypothesis TestingDFRWS USA 2008 AnanAnandabrata Pal (Polytechnic University, Brooklyn), Husrev T. Sencar (Polytechnic University, Brooklyn), Nasir Memon (Polytechnic University, Brooklyn)
Forensic Analysis of the Windows Registry in MemoryDFRWS USA 2008 Brendan Dolan-Gavitt (MITRE Corporation)
Forensic Memory Analysis – Files Mapped In MemoryDFRWS USA 2008 R.B. van Baar (Netherlands Forensic Institute), W. Alink (Netherlands Forensic Institute), A.R. van Ballegooij (Netherlands Forensic Institute)
Limewire ExaminationsDFRWS USA 2008 Joseph Lewthwaite (Defense Cyber Crime Institute, USA), Victoria Smith (Department of Defense, USA)
Recovering Deleted Data From the Windows RegistryDFRWS USA 2008 Timothy D. Morgan (VSR Investigations)
Using JPEG Quantization Tables to Identify Imagery Processed by SoftwareDFRWS USA 2008 Jesse Kornblum (Defense Cyber Crime Institute, USA)
A Framework for Attack Patterns Discovery in Honeynet DataDFRWS USA 2008 Olivier Thonnard (Royal Military Academy, Belgium), Marc Dacier (Institut Eurecom)
A Novel Approach of Mining Write-Prints for Authorship Attribution in E-mail ForensicsDFRWS USA 2008 Farkhund Iqbal (Concordia University), Rachid Hadjidj (Concordia University), Benjamin C.M. Fung (Concordia University), Mourad Debbabi (Concordia University)
Automated Computer Forensics Training in a Virtualized EnvironmentDFRWS USA 2008 Stephen Brueckner (ATC-NY), David Guaspari (ATC-NY), Frank Adelstein (ATC-NY), Joseph Weeks (Air Force Research Laboratory, USA)
FACE – Automated Digital Evidence Discovery and CorrelationDFRWS USA 2008 Andrew Case (University of New Orleans), Andrew Cristina (University of New Orleans), Lodovico Marziale (University of New Orleans), Golden Richard III, Ph.D. (University of New Orleans), and Vassil Roussev, Ph.D. (University of New Orleans)
High Speed Search Using Tarari Content Processor in Digital ForensicsDFRWS USA 2008 Jooyoung Lee (Electronics and Telecommunications Research Institute, Korea), Sungkyong Un (Electronics and Telecommunications Research Institute, Korea), Dowon Hong (Electronics and Telecommunications Research Institute, Korea)
MEGA – A Tool for Mac OS X Operating System and Application ForensicsDFRWS USA 2008 Rob Joyce (ATC-NY), Judson Powers (ATC-NY), Frank Adelstein, Ph.D. (ATC-NY)
Predicting the Types of File FragmentsDFRWS USA 2008 William C. Calhoun (Bloomsburg University of Pennsylvania), Drue Coles (Bloomsburg University of Pennsylvania)
PyFlag – An Advanced Network Forensic FrameworkDFRWS USA 2008 Michael Cohen (Australian Federal Police)
The Impact Of Microsoft Windows Pool Allocation Strategies On Memory ForensicsDFRWS USA 2008 Andreas Schuster (Deutsche Telekom AG)
Using the HFS+ Journal For Deleted File RecoveryDFRWS USA 2008 Aaron Burghardt (Booz Allen Hamilton), Adam J. Feldman (Booz Allen Hamilton)