Paper | PresentationConferenceDownloadsAuthor
Time is on my side: Steganography in filesystem metadataDFRWS USA 2016 Sebastian Neuner (SBA Research), Artemios Voyiatzis (SBA Research), Martin Schmiedecker (SBA Research), Stefan Brunthaler (SBA Research), Stefan Katzenbeisser (Technische Universitat), Edgar Weippl (SBA Research)
Anti-forensics: Furthering digital forensic science through a new extended, granular taxonomyDFRWS USA 2016 Kevin Conlan (University of New Haven), Ibrahim Baggili (University of New Haven), and Frank Breitinger (University of New Haven)
BinGold: Towards Robust Binary Analysis by Extracting the Semantics of Binary Code as Semantic Flow Graphs (SFGs)DFRWS USA 2016 Saed Alrabaee (Concordia University), Lingyu Wang (Concordia University), and Mourad Debbabi (Concordia University)
Database Image Content Explorer: Carving Data That Does Not Officially ExistDFRWS USA 2016 James Wagner (DePaul University), Alexander Rasin (DePaul University), and Jonathan Grier (Grier Forensics)
Digital Forensics as a Service: an updateDFRWS USA 2016 Harm van Beek (Netherlands Forensic Institute)
Fingerprinting Android Packaging: Generating DNAs for Malware DetectionDFRWS USA 2016 ElMouatez Billah Karbab (Concordia University), Mourad Debbabi (Concordia University), and Djedjiga Mouheb (University of Sharjah)
PeekaTorrent: Leveraging P2P Hash Values for Digital ForensicsDFRWS USA 2016 Sebastian Neuner (SBA Research), Martin Schmiedecker (SBA Research), and Edgar Weippl (SBA Research)
Rapid differential forensic imaging of mobile devicesDFRWS USA 2016 Mark Guido (The MITRE Corporation), Justin Grover (The MITRE Corporation), and Jonathan Buttner (The MITRE Corporation)
Robust Bootstrapping Memory Analysis against Anti-forensicsDFRWS USA 2016 Kyoungho Lee (Chonnam National University), Hyunuk Hwang (The Affiliated Institute of ETRI), Kibom Kim (The Affiliated Institute of ETRI), and Bongnam Noh (Chonnam National University)
Federated Testing: Shared Test Materials from the CFTT Program at NISTDFRWS USA 2015 Ben Livelsberger, James Lyle
Finding your naughty BITSDFRWS USA 2015 Matthew Geiger (Dell SecureWorks)
Inferring Past Activity from Partial Digital ArtifactsDFRWS USA 2015 James Jones (George Mason University), Tahir Khan (GMU), Kathryn Laskey (GMU), Alexander Nelson, Ph.D. (NIST), Mary Laamanen (NIST), Douglas White (NIST)
The Chain Of Custody: A Big MisconceptionDFRWS USA 2015 Tobias Eggendorfer (Hochschule Ravensburg-Weingarten University of Applied Sciences)
Video Authentication Using File Structure and MetadataDFRWS USA 2015 Jake Hall
Advancing Mac OS X Rootkit DetectionDFRWS USA 2015 Andrew Case (Volatility Foundation) and Golden Richard III, Ph.D. (UNO)
Archival Science, Digital Forensics, and New Media ArtDFRWS USA 2015 Dianne Dietrich (Cornell University) and Frank Adelstein (Cayuga Networks)
Automatic Classification of Object Code Using Machine LearningDFRWS USA 2015 John Clemens (UMBC and JHU/APL)
BinComp: A Stratified Approach to Compiler Provenance AttributionDFRWS USA 2015 Saed Alrabaee (Concordia University), Paria Shirani, Mourad Debbabi (Concordia University), Ashkan Rahimian, and Lingyu Wang (Concordia University)
Database Forensic Analysis Through Internal Structure CarvingDFRWS USA 2015 James Wagner (DePaul University), Alexander Rasin (DePaul University), and Jonathan Grier (Grier Forensics)
Detecting Very Large Sets Of Referenced Files At 40:100 Gbe, Especially Mp4 FilesDFRWS USA 2015 Adrien Larbanet, Jonas Lerebours, and Jean Pierre David
E-mail Authorship Attribution Using Customized Associative ClassificationDFRWS USA 2015 Michael Schmid (Concordia Institute for Information Systems Engineering), Farkhund Iqbal (College of Technological Innovation, Zayed University), and Benjamin Fung (School of Information Studies, McGill University)
Graph-Theoretic Characterization of Cyber-threat InfrastructuresDFRWS USA 2015 Amine Boukhtouta (Concordia University), Djedjiga Mouheb (Concordia University), Mourad Debbabi (Concordia University), Omar Alfandi (Zayed University), Farkhund Iqbal (Zayed University), and May El Barachi (Zayed University)
Hash-Based Carving: Searching Media For Complete Files And File Fragments With Sector Hashing And hashdbDFRWS USA 2015 Simson Garfinkel, Ph.D. (NIST) and Michael McCarrin (NPS)
LINCS: Towards Building a Trustworthy Litigation Hold Enabled Cloud Storage SystemDFRWS USA 2015 Shams Zawoad (University of Alabama at Birmingham), Ragib Hasan (University of Alabama at Birmingham), and John Grimess (University of Alabama at Birmingham)
Network And Device Forensic Analysis Of Android Social-Messaging ApplicationsDFRWS USA 2015 Daniel Walnycky (University of New Haven), Ibrahim Baggili (University of New Haven), Andrew Marrington (Zayed University), Frank Breitinger (University of New Haven), and Jason Moore
New Acquisition Method Based On Firmware Update Protocols For Android SmartphonesDFRWS USA 2015 Seung Jei Yang (The Affiliated Institute of ETRI), Jung Ho Choi (The Affiliated Institute of ETRI), Ki Bom Kim (The Affiliated Institute of ETRI), and Tae Joo Chang (The Affiliated Institute of ETRI)
Privacy-Preserving Email ForensicsDFRWS USA 2015 Frederik Armknecht (University of Mannheim) and Andreas Dewald (Friedrich-Alexander-Universität Erlangen-Nürnberg)
Rapid Forensic Imaging of Large Disks with Sifting CollectorsDFRWS USA 2015 Jonathan Grier (Grier Forensics) and Golden Richard III, Ph.D. (University of New Orleans)
The Impact of GPU-Assisted Malware on Memory Forensics: A Case StudyDFRWS USA 2015 Davide Balzarotti (Eurecom), Roberto Di Pietro (Bell Labs), and Antonio Villani (University of Roma Tre)
Wirespeed: Extending The AFF4 Container Format For Scalable Acquisition And Live AnalysisDFRWS USA 2015 Bradley Schatz, Ph.D. (Schatz Forensic)