Paper | Presentation | Conference | Downloads | Author |
---|
Selective Deletion of Non-Relevant Data | DFRWS EU 2017 |
| Christian Zoubek, Konstantin Sack |
EviPlant: An Efficient Digital Forensic Challenge Creation, Manipulation and Distribution Solution | DFRWS EU 2017 |
| Mark Scanlon, Ph.D. (University College Dublin), Xiaoyu Du, and David Lillis (University College Dublin) |
Network Forensic Investigation in OpenFlow Networks with ForCon | DFRWS EU 2017 |
| Daniel Spiekermann, Jorg Keller, Tobias Eggendorfer |
A Scalable Authorship Verification Method for Different Languages, Genres and Topics | DFRWS EU 2016 |
| Oren Halvani, Christian Winter, Anika Pflug |
Automatic Profile Generation For Live Linux Memory Analysis | DFRWS EU 2016 |
| Michael Cohen (Google), Arkadiusz Socala |
Conclusions Scales or Likelihood Ratios in Digital Forensic Science | DFRWS EU 2016 | | Eoghan Casey - Moderator, Zeo Geradts, Alex Biedermann, Franco Taroni |
Digital Evidence, ‘Absence’ of Data and Ambiguous Patterns of Reasoning | DFRWS EU 2016 |
| Alex Biedermann, Joëlle Vuille |
Discovering Windows Phone 8 Artifacts and Secrets | DFRWS EU 2016 |
| Mattia Epifani (ITTIG - CNR), Francesco Picasso (Reality Net), Marco Scarito |
Facilitating Forensic Examinations of Multi-User Computer Environments through Session-to-Session Analysis of Internet History | DFRWS EU 2016 |
| David Gresty, Diane Gan, George Loukas, Constantinos Ierotheou |
Forensic Analysis of Cloud-Native Artifacts | DFRWS EU 2016 |
| Vassil Roussev, Ph.D. (University of New Orleans), Shane McCulley |
Forensic Investigation of Cyberstalking Cases using Behavioural Evidence Analysis | DFRWS EU 2016 |
| Noora Al Mutawa, Joanne Bryce, Virginia Franqueira, Andrew Marrington (Zayed University) |
Generic RAID Reassembly using Block-Level Entropy | DFRWS EU 2016 |
| Christian Zoubek, Sabine Seufert, Andreas Dewald |
Internet Forums: A Source of Intelligence to Monitor the Online Diffusion of Doping Products | DFRWS EU 2016 |
| Thomas Pineau, Adrien Schopfer, Lionel Grossrieder, Pierre Esseiva, Quentin Rossy |
Lest We Forget: Cold-Boot Attacks on Scrambled DDR3 Memory | DFRWS EU 2016 |
| Johannes Bauer, Michael Gruhn (Friedrich-Alexander-Universität Erlangen-Nürnberg), Felix Freiling (Friedrich-Alexander-University) |
Life on Clouds, A Forensics Overview | DFRWS EU 2016 |
| Marco Scarito, Mattia Epifani (ITTIG - CNR), Francesco Picasso (Reality Net) |
Study and Analysis of Orweb Anonymizer on Android Devices | DFRWS EU 2016 |
| Claudia Meda (REALITY NET System Solutions Snc), Mattia Epifani (ITTIG - CNR) |
Studying the Structure and Organisation of Illicit Drug Trafficking on Darknet Markets Through the Analysis of Digital, Chemical and Physical Traces | DFRWS EU 2016 |
| Damien Rhumorbarbe, Ludovic Staehli, Julian Broseus, Quentin Rossy, Pierre Esseiva |
The Digital Evidence Dashboard Project | DFRWS EU 2016 |
| Hans Henseler, Ph.D. (University of Applied Sciences Leiden), Adrie Stander (University of Cape Town) |
Tiered Forensic Methodology Model for Digital Field Triage by Non-Digital Evidence Specialists | DFRWS EU 2016 |
| Ben Hitchcock, Nhien An Le Khac (University College Dublin), Mark Scanlon, Ph.D. (University College Dublin) |
TLSkex: Harnessing Virtual Machine Introspection for Decrypting TLS Communication | DFRWS EU 2016 |
| Benjamin Taubmann, Christoph Freidrich, Dominik Dusold, Hans Reiser |
Evaluating Atomicity and Integrity of Correct Memory Acquisition Methods | DFRWS EU 2016 |
| Michael Gruhn (Friedrich-Alexander-Universität Erlangen-Nürnberg) and Felix Freiling (Friedrich-Alexander-University) |
A Method and a Case Study for the Selection of the Best Available Tool for Mobile Device Forensics Using Decision Analysis | DFRWS EU 2016 |
| Shahzad Saleem, Oliver Popov (Stockholm University), and Ibrahim Baggili (University of New Haven) |
Microsoft Exchange Forensics: Looking Beyond User Data | DFRWS EU 2016 | | Owen O'Connor |
Pool Tag: Quick Scanning for Windows Memory Analysis | DFRWS EU 2016 |
| Joe Sylve, Ph.D. (BlackBag Technologies), Vico Marziale, Ph.D. (BlackBag Technologies), and Golden Richard III, Ph.D. (Louisiana State University) |
Virtual Currencies | DFRWS EU 2016 | | André Fischer, Jakob Hasse, and Thomas Gloe (dence) |
A Theoretic Framework For Evaluating Similarity Digesting Tools | DFRWS EU 2015 |
| Liwei Ren (TrendMicro) |
Digital Forensics – Behind the Scenes | DFRWS EU 2015 |
| David-Olivier Jaquet-Chiffelle (University of Lausanne) |
Fast and Generic Malware Triage Using openioc_scan Volatility Plugin | DFRWS EU 2015 |
| Takahiro Haruyama (Internet Initiative Japan Inc.) |
How I Forced An Android Vulnerability Into Bypassing Mdm Restrictions + Diy – Android Malware Analysis | DFRWS EU 2015 |
| Zubair Ashraf (IBM) |
How To Search Extracted Data | DFRWS EU 2015 |
| Javier Collado (NowSecure, Inc) |