| Paper | Presentation | Conference | Downloads | Author |
|---|---|---|---|
| SIGMA – A Semantic Integrated Graph Matching Approach For Identifying Reused Functions In Binary Code | DFRWS EU 2015 | Saed Alrabaee (Concordia University), Paria Shirani, Lingyu Wang (Concordia University), and Mourad Debbabi (Concordia University) | |
| Leveraging CybOX to Standardize Representation and Exchange of Digital Forensic Information | DFRWS EU 2015 | Eoghan Casey, Ph.D. (The MITRE Corporation), Greg Back (The MITRE Corporation), and Sean Barnum (The MITRE Corporation) | |
| Investigating Evidence of Mobile Phone Usage by Drivers in Road Traffic Accidents | DFRWS EU 2015 | Graeme Horsman and Lynne Conniss (Northumbria University) | |
| Hviz HTTP(S) Traffic Aggregation and Visualization for Network Forensics | DFRWS EU 2015 | David Gugelmann (ETH Zurich), Fabian Gasser (ETH Zurich), Bernhard Ager (ETH Zurich), and Vincent Lenders (Armasuisse) | |
| Forensic Analysis of a Sony PlayStation 4 – A First Look | DFRWS EU 2015 | Allen Davies (Sytech Digital Forensics), Huw Read (University of South Wales and Noroff University College), Konstantinos Xynos (University of South Wales), and Iain Sutherland (Noroff University College) | |
| Fast Contraband Detection In Large Capacity Disk Drives | DFRWS EU 2015 | Phil Penrose, William Buchanan, and Richard Macfarlane (Edinburgh Napier University) | |
| Designing Robustness and Resilience in Digital Investigation Laboratories | DFRWS EU 2015 | Philipp Amann (European Cybercrime Centre) and Joshua James (Digital Forensic Investigation Research Laboratory) | |
| Characterization Of The Windows Kernel Version Variability For Accurate Memory Analysis | DFRWS EU 2015 | Michael Cohen (Google) | |
| Acquisition and Analysis of Compromised Firmware Using Memory Forensics | DFRWS EU 2015 | Johannes Stüttgen, Stefan Voemel, and Michael Denzel (Friedrich-Alexander-Universität Erlangen-Nürnberg) | |
| A Scalable File Based Data Store For Forensic Analysis | DFRWS EU 2015 | Flavio Cruz (Carnegie Mellon University), Andreas Moser (Google), and Michael Cohen (Google) | |
| Tor Forensics on Windows OS | DFRWS EU 2015 | Mattia Epifani (ITTIG - CNR), Marco Scarito, Francesco Picasso (Reality Net) | |
| The Evidence Project – Bridging The Gap In The Exchange Of Digital Evidence Across Europe | DFRWS EU 2015 | Fabrizio Turchi (Italian National Research Council), Maria Angela Biasiotti, and Mattia Epifani | |
| On Criteria for Evaluating Similarity Digest Schemes | DFRWS EU 2015 | Jonathan Oliver (TrendMicro) | |
| How To Search Extracted Data | DFRWS EU 2015 | Javier Collado (NowSecure, Inc) | |
| How I Forced An Android Vulnerability Into Bypassing Mdm Restrictions + Diy – Android Malware Analysis | DFRWS EU 2015 | Zubair Ashraf (IBM) | |
| Fast and Generic Malware Triage Using openioc_scan Volatility Plugin | DFRWS EU 2015 | Takahiro Haruyama (Internet Initiative Japan Inc.) | |
| Digital Forensics – Behind the Scenes | DFRWS EU 2015 | David-Olivier Jaquet-Chiffelle (University of Lausanne) | |
| A Theoretic Framework For Evaluating Similarity Digesting Tools | DFRWS EU 2015 | Liwei Ren (TrendMicro) | |
| Virtual Currencies | DFRWS EU 2016 | André Fischer, Jakob Hasse, and Thomas Gloe (dence) | |
| Pool Tag: Quick Scanning for Windows Memory Analysis | DFRWS EU 2016 | Joe Sylve, Ph.D. (BlackBag Technologies), Vico Marziale, Ph.D. (BlackBag Technologies), and Golden Richard III, Ph.D. (Louisiana State University) | |
| Microsoft Exchange Forensics: Looking Beyond User Data | DFRWS EU 2016 | Owen O'Connor | |
| A Method and a Case Study for the Selection of the Best Available Tool for Mobile Device Forensics Using Decision Analysis | DFRWS EU 2016 | Shahzad Saleem, Oliver Popov (Stockholm University), and Ibrahim Baggili (University of New Haven) | |
| Evaluating Atomicity and Integrity of Correct Memory Acquisition Methods | DFRWS EU 2016 | Michael Gruhn (Friedrich-Alexander-Universität Erlangen-Nürnberg) and Felix Freiling (Friedrich-Alexander-University) | |
| TLSkex: Harnessing Virtual Machine Introspection for Decrypting TLS Communication | DFRWS EU 2016 | Benjamin Taubmann, Christoph Freidrich, Dominik Dusold, Hans Reiser | |
| Tiered Forensic Methodology Model for Digital Field Triage by Non-Digital Evidence Specialists | DFRWS EU 2016 | Ben Hitchcock, Nhien An Le Khac (University College Dublin), Mark Scanlon, Ph.D. (University College Dublin) | |
| The Digital Evidence Dashboard Project | DFRWS EU 2016 | Hans Henseler, Ph.D. (University of Applied Sciences Leiden), Adrie Stander (University of Cape Town) | |
| Studying the Structure and Organisation of Illicit Drug Trafficking on Darknet Markets Through the Analysis of Digital, Chemical and Physical Traces | DFRWS EU 2016 | Damien Rhumorbarbe, Ludovic Staehli, Julian Broseus, Quentin Rossy, Pierre Esseiva | |
| Study and Analysis of Orweb Anonymizer on Android Devices | DFRWS EU 2016 | Claudia Meda (REALITY NET System Solutions Snc), Mattia Epifani (ITTIG - CNR) | |
| Life on Clouds, A Forensics Overview | DFRWS EU 2016 | Marco Scarito, Mattia Epifani (ITTIG - CNR), Francesco Picasso (Reality Net) | |
| Lest We Forget: Cold-Boot Attacks on Scrambled DDR3 Memory | DFRWS EU 2016 | Johannes Bauer, Michael Gruhn (Friedrich-Alexander-Universität Erlangen-Nürnberg), Felix Freiling (Friedrich-Alexander-University) | |
| Internet Forums: A Source of Intelligence to Monitor the Online Diffusion of Doping Products | DFRWS EU 2016 | Thomas Pineau, Adrien Schopfer, Lionel Grossrieder, Pierre Esseiva, Quentin Rossy | |
| Generic RAID Reassembly using Block-Level Entropy | DFRWS EU 2016 | Christian Zoubek, Sabine Seufert, Andreas Dewald | |
| Forensic Investigation of Cyberstalking Cases using Behavioural Evidence Analysis | DFRWS EU 2016 | Noora Al Mutawa, Joanne Bryce, Virginia Franqueira, Andrew Marrington (Zayed University) | |
| Forensic Analysis of Cloud-Native Artifacts | DFRWS EU 2016 | Vassil Roussev, Ph.D. (University of New Orleans), Shane McCulley | |
| Facilitating Forensic Examinations of Multi-User Computer Environments through Session-to-Session Analysis of Internet History | DFRWS EU 2016 | David Gresty, Diane Gan, George Loukas, Constantinos Ierotheou | |
| Discovering Windows Phone 8 Artifacts and Secrets | DFRWS EU 2016 | Mattia Epifani (ITTIG - CNR), Francesco Picasso (Reality Net), Marco Scarito | |
| Digital Evidence, ‘Absence’ of Data and Ambiguous Patterns of Reasoning | DFRWS EU 2016 | Alex Biedermann, Jo√´lle Vuille | |
| Conclusions Scales or Likelihood Ratios in Digital Forensic Science | DFRWS EU 2016 | Eoghan Casey - Moderator, Zeo Geradts, Alex Biedermann, Franco Taroni | |
| Automatic Profile Generation For Live Linux Memory Analysis | DFRWS EU 2016 | Michael Cohen (Google), Arkadiusz Socala | |
| A Scalable Authorship Verification Method for Different Languages, Genres and Topics | DFRWS EU 2016 | Oren Halvani, Christian Winter, Anika Pflug | |
| Network Forensic Investigation in OpenFlow Networks with ForCon | DFRWS EU 2017 | Daniel Spiekermann, Jorg Keller, Tobias Eggendorfer | |
| EviPlant: An Efficient Digital Forensic Challenge Creation, Manipulation and Distribution Solution | DFRWS EU 2017 | Mark Scanlon, Ph.D. (University College Dublin), Xiaoyu Du, and David Lillis (University College Dublin) | |
| Selective Deletion of Non-Relevant Data | DFRWS EU 2017 | Christian Zoubek, Konstantin Sack | |
| Picking Up the Trash: Exploiting Generational GC for Memory Analysis | DFRWS EU 2017 | Adam Pridgen, Simson Garfinkel, Ph.D. (U.S. Census Bureau), Dan Wallach | |
| Introduction to Digital Forensic Prolog Workshop | DFRWS EU 2017 | Pavel Gladyshev, Ph.D. (University College Dublin) | |
| Improving the Reliability of Chip-Off Forensic Analysis of NAND Flash Memory Devices | DFRWS EU 2017 | Aya Fukami, Saugata Ghose, Yixin Luo, Yu Cai, Onur Mutlu | |
| Forensic Analysis of Deduplicated File Systems | DFRWS EU 2017 | Dario Lanterna, Antonio Barili | |
| Force Open: Lightweight Black Box File Repair | DFRWS EU 2017 | Karl Wust, Petar Tsankov, Sasa Radomirovic, Mohammad Torabi Dashti | |
| Evidence Gathering for Network Security and Forensics | DFRWS EU 2017 | Dinil Mon Divakaran, Kar Wai Fok, Ido Nevat, Vrizlynn Thing | |
| Do Digital Investigators Have To Program? A Controlled Experiment in Digital Investigation | DFRWS EU 2017 | Felix Freiling (Friedrich-Alexander-University), Christian Zoubek |