Paper | PresentationConferenceDownloadsAuthor
Lessons Learned from the Construction of a Korean Software Reference Data Set for Digital ForensicsDFRWS USA 2009 Sangseo Park, Cheolwon Lee, Sungjai Baek
Teleporter – An Analytically and Forensically Sound Duplicate Transfer SystemDFRWS USA 2009 Kathryn Watkins, Mike McWhorter, Jeff Long, William Hill
The Persistence of Memory – Forensic Identification and Extraction of Cryptographic KeysDFRWS USA 2009 Carsten Maartmann-Moe, Andr√© √Örnes (Norwegian University of Technology and Science), Steffen Thorkildsen
A Novel Time-Memory Trade-Off Method for Password RecoveryDFRWS USA 2009 Hwei-Ming Ying
A Second Generation Computer Forensic Analysis SystemDFRWS USA 2009 Daniel Ayers
Digital Forensic Implications of ZFSDFRWS USA 2009 Nicole Beebe, Ph.D. (UTSA), Sonia Mandes, and Dane Stuckey
Extraction of Forensically Sensitive Information from Windows Physical MemoryDFRWS USA 2009 Seyed Mahmood Hejazi, Chamseddine Talhi, and Mourad Debbabi (Concordia University)
Using ShellBag Information to Reconstruct User ActivitiesDFRWS USA 2009 Yuandong Zhu, Pavel Gladyshev, Ph.D. (University College Dublin), and Joshua James (University College Dublin)
Validation And Verification Of Computer Forensic Software Tools-Searching FunctionDFRWS USA 2009 Yinghua Guo, Jill Slay (La Trobe University), and Jason Beckett
An Overall Assessment Of Mobile Internal Acquisition ToolDFRWS USA 2008 Alessandro Distefano (University of Rome), Gianluigi Me (University of Rome)
Detecting File Fragmentation Point Using Sequential Hypothesis TestingDFRWS USA 2008 AnanAnandabrata Pal (Polytechnic University, Brooklyn), Husrev T. Sencar (Polytechnic University, Brooklyn), Nasir Memon (Polytechnic University, Brooklyn)
Forensic Analysis of the Windows Registry in MemoryDFRWS USA 2008 Brendan Dolan-Gavitt (MITRE Corporation)
Forensic Memory Analysis – Files Mapped In MemoryDFRWS USA 2008 R.B. van Baar (Netherlands Forensic Institute), W. Alink (Netherlands Forensic Institute), A.R. van Ballegooij (Netherlands Forensic Institute)
Limewire ExaminationsDFRWS USA 2008 Joseph Lewthwaite (Defense Cyber Crime Institute, USA), Victoria Smith (Department of Defense, USA)
Recovering Deleted Data From the Windows RegistryDFRWS USA 2008 Timothy D. Morgan (VSR Investigations)
Using JPEG Quantization Tables to Identify Imagery Processed by SoftwareDFRWS USA 2008 Jesse Kornblum (Defense Cyber Crime Institute, USA)
A Framework for Attack Patterns Discovery in Honeynet DataDFRWS USA 2008 Olivier Thonnard (Royal Military Academy, Belgium), Marc Dacier (Institut Eurecom)
A Novel Approach of Mining Write-Prints for Authorship Attribution in E-mail ForensicsDFRWS USA 2008 Farkhund Iqbal (Concordia University), Rachid Hadjidj (Concordia University), Benjamin C.M. Fung (Concordia University), Mourad Debbabi (Concordia University)
Automated Computer Forensics Training in a Virtualized EnvironmentDFRWS USA 2008 Stephen Brueckner (ATC-NY), David Guaspari (ATC-NY), Frank Adelstein (ATC-NY), Joseph Weeks (Air Force Research Laboratory, USA)
FACE – Automated Digital Evidence Discovery and CorrelationDFRWS USA 2008 Andrew Case (University of New Orleans), Andrew Cristina (University of New Orleans), Lodovico Marziale (University of New Orleans), Golden Richard III, Ph.D. (University of New Orleans), and Vassil Roussev, Ph.D. (University of New Orleans)
High Speed Search Using Tarari Content Processor in Digital ForensicsDFRWS USA 2008 Jooyoung Lee (Electronics and Telecommunications Research Institute, Korea), Sungkyong Un (Electronics and Telecommunications Research Institute, Korea), Dowon Hong (Electronics and Telecommunications Research Institute, Korea)
MEGA – A Tool for Mac OS X Operating System and Application ForensicsDFRWS USA 2008 Rob Joyce (ATC-NY), Judson Powers (ATC-NY), Frank Adelstein, Ph.D. (ATC-NY)
Predicting the Types of File FragmentsDFRWS USA 2008 William C. Calhoun (Bloomsburg University of Pennsylvania), Drue Coles (Bloomsburg University of Pennsylvania)
PyFlag – An Advanced Network Forensic FrameworkDFRWS USA 2008 Michael Cohen (Australian Federal Police)
The Impact Of Microsoft Windows Pool Allocation Strategies On Memory ForensicsDFRWS USA 2008 Andreas Schuster (Deutsche Telekom AG)
Using the HFS+ Journal For Deleted File RecoveryDFRWS USA 2008 Aaron Burghardt (Booz Allen Hamilton), Adam J. Feldman (Booz Allen Hamilton)
10 Good Reasons Why You Should Shift Focus to Small Scale Digital Device ForensicsDFRWS USA 2007 Ronald van der Knijff (Netherlands Forensic Institute)
An Efficient Technique for Enhancing Forensic Capabilities of Ext2 File SystemDFRWS USA 2007 Mridul Sankar Barik (Jadavpur University), Gaurav Gupta (KPMG), Shubhro Sinha (Bengal Engineering and Science University), Alok Mishra (Bengal Engineering and Science University), Chandan Mazumdara (Jadavpur University)
Analyzing Multiple Logs for Forensic EvidenceDFRWS USA 2007 Ali Reza Arasteh (Concordia University), Mourad Debbabi (Concordia University), Assaad Sakha (Concordia University), Mohamed Saleh (Concordia University)
Automated Windows Event Log ForensicsDFRWS USA 2007 Rich Murphey (Applied Cognitive Solutions)