Paper | Presentation |
Conference |
Downloads |
Author |
Availability of Datasets for Digital Forensics – and What is Missing |
DFRWS USA 2017 |
|
Cinthya Grajeda Mendez, Frank Breitinger (University of New Haven), Ibrahim Baggili (University of New Haven) |
Browser Artifacts of Google Drive and Gmail |
DFRWS USA 2017 |
|
Elizabeth Schweinsberg (Facebook) |
Carving Database Storage to Detect and Trace Security Breaches |
DFRWS USA 2017 |
|
James Wagner (DePaul University), Alexander Rasin (DePaul University), Boris Glavic, Karen Heart, Jacob Furst, Lucas Bressan, Jonathan Grier (Grier Forensics) |
Deleted File Persistence on Digital Media |
DFRWS USA 2017 |
|
Jim Jones, Tahir Khan |
DROP (DRone Open source Parser) Your Drone – Forensic Analysis of the DJI Phantom III |
DFRWS USA 2017 |
|
Devon Clark, Christopher Meffert (University of New Haven), Ibrahim Baggili (University of New Haven), Frank Breitinger (University of New Haven) |
Finding Digital Evidence in Mobile Devices |
DFRWS USA 2017 |
|
Hans Henseler, Ph.D. (University of Applied Sciences Leiden), Vince Noort |
Gaslight: A Comprehensive Fuzzing Architecture for Memory Forensics Frameworks |
DFRWS USA 2017 |
|
Andrew Case (Volexity), Arghya Das, Seung-Jong Park, Ram Ramanujam, Golden Richard III, Ph.D. (Louisiana State University) |
Insights Gained From Constructing a Large Scale Dynamic Analysis Platform |
DFRWS USA 2017 |
|
Cody Miller, Dae Glendowne, Henry Cook, Demarcus Thomas, Patrick Pape, Chris Lanclos |
Leveraging the SRTP protocol for Over-The-Network Memory Acquisition of a GE Fanuc Series 90-30 |
DFRWS USA 2017 |
|
Denton George, Filip Karpisek, Frank Breitinger (University of New Haven), Ibrahim Baggili (University of New Haven) |
Linux Memory Forensics: Dissecting the User Space Process Heap |
DFRWS USA 2017 |
|
Frank Block, Andreas Dewald |
Memory Based Dynamic Malware Analysis |
DFRWS USA 2017 |
|
Endre Bangerter (Bern University of Applied Sciences), Jonas Wagner |
Pull It Together: Enabling Interoperability of Digital Forensic Systems Using a Standard Representation and Supporting API |
DFRWS USA 2017 |
|
Sean Barnum, Ryan Griffith (DC3) |
SCADA Network Forensics of the PCCC Protocol |
DFRWS USA 2017 |
|
Saranyan Senthivel, Irfan Ahmed (University of New Orleans), Vassil Roussev, Ph.D. (University of New Orleans) |
Time-of-Recording Estimation for Audio Recordings |
DFRWS USA 2017 |
|
Lilei Zheng, Ying Zhang, Chien Eao Lee, Vrizlynn Thing |
SCARF: A Container-Based Approach to Cloud-Scale Digital Forensic Processing |
DFRWS USA 2017 |
|
Christopher Stelly (University of New Orleans), Vassil Roussev, Ph.D. (University of New Orleans) |
Virtualization-Based Security: A Forensics Perspective |
DFRWS USA 2017 |
|
Jason Hale |
Use of Generalized Hough Transform on Interpretation of Memory Dumps |
DFRWS USA 2017 |
|
Paulo Roberto Nunes de Souza (University College Dublin), Pavel Gladyshev, Ph.D. (University College Dublin) |
Digital Forensic Approaches for Amazon Alexa Ecosystem |
DFRWS USA 2017 |
|
Hyunji Chung, Jungheum Park, and Sangjin Lee |
Extending The Sleuth Kit and its Underlying Model for Pooled Storage File System Forensic Analysis |
DFRWS USA 2017 |
|
Jan-Niclas Hilgert, Martin Lambertz, Daniel Plohmann |
A practical approach to analyze smartphone backup data as a digital evidence |
DFRWS USA 2016 |
|
Jaehyeok Han, Sangjin Lee |
Data Sets Available from the National Software Reference Library |
DFRWS USA 2016 |
|
Douglas White (NIST) |
dbling: Identifying Extensions Installed on Encrypted Web Thin Clients |
DFRWS USA 2016 |
|
Mike Mabey (Arizona State University), Adam Doupe (Arizona State University), Ziming Zhao (Arizona State University), Gail-Joon Ahn (Arizona State University) |
Deleting collected digital evidence by exploiting a widely adopted hardware write blocker |
DFRWS USA 2016 |
|
Christopher Meffert (University of New Haven), Ibrahim Baggili (University of New Haven), Frank Breitinger (University of New Haven) |
Detecting Objective-C Malware Through Memory Forensics |
DFRWS USA 2016 |
|
Andrew Case (Volexity) and Golden Richard III, Ph.D. (Louisiana State University) |
Forensic investigations in SDN networks |
DFRWS USA 2016 |
|
Izzat Alsmadi (University of New Haven), Samer Khamaiseh (Boise State University) |
IED Forensics: Hunting the IED Engineer |
DFRWS USA 2016 |
|
Larry Leibrock |
InVEST: Intelligent Visual Email Search and Triage |
DFRWS USA 2016 |
|
Jay Koven (NYU Tandon School of Engineering), Enrico Bertini (NYU Tandon School of Engineering), Luke Dubois (NYU Tandon School of Engineering), Nasir Memon (NYU Tandon School of Engineering) |
Practical Analyzing the Relation of Wallet Addresses in Bitcoin |
DFRWS USA 2016 |
|
Hiroki Kuzuno and Christian Karam |
Rapid, Agentless, and Scalable Forensics and Incident Response Using WARDEN |
DFRWS USA 2016 |
|
Adam Meily (Assured Information Security), Sean LaPlante (Assured Information Security), Richard Gloo (Assured Information Security) |
Recovery method of deleted records and tables from ESE Database |
DFRWS USA 2016 |
|
Kim Jeonghyeon (Korea University), Park Aran (Korea University), Lee Sangjin (Korea University) |