Paper | Presentation | Conference | Downloads | Author |
---|
Lessons Learned from the Construction of a Korean Software Reference Data Set for Digital Forensics | DFRWS USA 2009 |
| Sangseo Park, Cheolwon Lee, Sungjai Baek |
Teleporter – An Analytically and Forensically Sound Duplicate Transfer System | DFRWS USA 2009 |
| Kathryn Watkins, Mike McWhorter, Jeff Long, William Hill |
The Persistence of Memory – Forensic Identification and Extraction of Cryptographic Keys | DFRWS USA 2009 |
| Carsten Maartmann-Moe, André Årnes (Norwegian University of Technology and Science), Steffen Thorkildsen |
A Novel Time-Memory Trade-Off Method for Password Recovery | DFRWS USA 2009 |
| Hwei-Ming Ying |
A Second Generation Computer Forensic Analysis System | DFRWS USA 2009 |
| Daniel Ayers |
Digital Forensic Implications of ZFS | DFRWS USA 2009 |
| Nicole Beebe, Ph.D. (UTSA), Sonia Mandes, and Dane Stuckey |
Extraction of Forensically Sensitive Information from Windows Physical Memory | DFRWS USA 2009 |
| Seyed Mahmood Hejazi, Chamseddine Talhi, and Mourad Debbabi (Concordia University) |
Using ShellBag Information to Reconstruct User Activities | DFRWS USA 2009 |
| Yuandong Zhu, Pavel Gladyshev, Ph.D. (University College Dublin), and Joshua James (University College Dublin) |
Validation And Verification Of Computer Forensic Software Tools-Searching Function | DFRWS USA 2009 |
| Yinghua Guo, Jill Slay (La Trobe University), and Jason Beckett |
An Overall Assessment Of Mobile Internal Acquisition Tool | DFRWS USA 2008 |
| Alessandro Distefano (University of Rome), Gianluigi Me (University of Rome) |
Detecting File Fragmentation Point Using Sequential Hypothesis Testing | DFRWS USA 2008 |
| AnanAnandabrata Pal (Polytechnic University, Brooklyn), Husrev T. Sencar (Polytechnic University, Brooklyn), Nasir Memon (Polytechnic University, Brooklyn) |
Forensic Analysis of the Windows Registry in Memory | DFRWS USA 2008 |
| Brendan Dolan-Gavitt (MITRE Corporation) |
Forensic Memory Analysis – Files Mapped In Memory | DFRWS USA 2008 |
| R.B. van Baar (Netherlands Forensic Institute), W. Alink (Netherlands Forensic Institute), A.R. van Ballegooij (Netherlands Forensic Institute) |
Limewire Examinations | DFRWS USA 2008 |
| Joseph Lewthwaite (Defense Cyber Crime Institute, USA), Victoria Smith (Department of Defense, USA) |
Recovering Deleted Data From the Windows Registry | DFRWS USA 2008 |
| Timothy D. Morgan (VSR Investigations) |
Using JPEG Quantization Tables to Identify Imagery Processed by Software | DFRWS USA 2008 |
| Jesse Kornblum (Defense Cyber Crime Institute, USA) |
A Framework for Attack Patterns Discovery in Honeynet Data | DFRWS USA 2008 |
| Olivier Thonnard (Royal Military Academy, Belgium), Marc Dacier (Institut Eurecom) |
A Novel Approach of Mining Write-Prints for Authorship Attribution in E-mail Forensics | DFRWS USA 2008 |
| Farkhund Iqbal (Concordia University), Rachid Hadjidj (Concordia University), Benjamin C.M. Fung (Concordia University), Mourad Debbabi (Concordia University) |
Automated Computer Forensics Training in a Virtualized Environment | DFRWS USA 2008 |
| Stephen Brueckner (ATC-NY), David Guaspari (ATC-NY), Frank Adelstein (ATC-NY), Joseph Weeks (Air Force Research Laboratory, USA) |
FACE – Automated Digital Evidence Discovery and Correlation | DFRWS USA 2008 |
| Andrew Case (University of New Orleans), Andrew Cristina (University of New Orleans), Lodovico Marziale (University of New Orleans), Golden Richard III, Ph.D. (University of New Orleans), and Vassil Roussev, Ph.D. (University of New Orleans) |
High Speed Search Using Tarari Content Processor in Digital Forensics | DFRWS USA 2008 |
| Jooyoung Lee (Electronics and Telecommunications Research Institute, Korea), Sungkyong Un (Electronics and Telecommunications Research Institute, Korea), Dowon Hong (Electronics and Telecommunications Research Institute, Korea) |
MEGA – A Tool for Mac OS X Operating System and Application Forensics | DFRWS USA 2008 |
| Rob Joyce (ATC-NY), Judson Powers (ATC-NY), Frank Adelstein, Ph.D. (ATC-NY) |
Predicting the Types of File Fragments | DFRWS USA 2008 |
| William C. Calhoun (Bloomsburg University of Pennsylvania), Drue Coles (Bloomsburg University of Pennsylvania) |
PyFlag – An Advanced Network Forensic Framework | DFRWS USA 2008 |
| Michael Cohen (Australian Federal Police) |
The Impact Of Microsoft Windows Pool Allocation Strategies On Memory Forensics | DFRWS USA 2008 |
| Andreas Schuster (Deutsche Telekom AG) |
Using the HFS+ Journal For Deleted File Recovery | DFRWS USA 2008 |
| Aaron Burghardt (Booz Allen Hamilton), Adam J. Feldman (Booz Allen Hamilton) |
10 Good Reasons Why You Should Shift Focus to Small Scale Digital Device Forensics | DFRWS USA 2007 |
| Ronald van der Knijff (Netherlands Forensic Institute) |
An Efficient Technique for Enhancing Forensic Capabilities of Ext2 File System | DFRWS USA 2007 |
| Mridul Sankar Barik (Jadavpur University), Gaurav Gupta (KPMG), Shubhro Sinha (Bengal Engineering and Science University), Alok Mishra (Bengal Engineering and Science University), Chandan Mazumdara (Jadavpur University) |
Analyzing Multiple Logs for Forensic Evidence | DFRWS USA 2007 |
| Ali Reza Arasteh (Concordia University), Mourad Debbabi (Concordia University), Assaad Sakha (Concordia University), Mohamed Saleh (Concordia University) |
Automated Windows Event Log Forensics | DFRWS USA 2007 |
| Rich Murphey (Applied Cognitive Solutions) |