Please note: All times below are in Central Daylight Time.

For clarity, the current time in Baton Rouge, LA is:

Return to the USA 2024 Conference Page

Please find our tentative program items below the table. Schedules are still work in progress.

Schedule of Events

TIMES ARE IN CDT
Monday, July 8
Women in Forensic Computing Workshop
Tuesday, July 9
Workshop Day
Wednesday, July 10
Main Conference
EveningDFRWS Rodeo
Thursday, July 11
Main Conference
Friday, July 12
Main Conference / Workshop/ Expedition

Tentative Program Items

While program items and schedules are still brewing and work-in-progress, you may find below the items that will be part of the conference.

The table above will hold schedules as they get fixed while the text area below will present to you the papers, workshops and presentations that were accepted for this conference.

Please bear with us on the fixed schedule which we will provide as soon as possible.

Keynote Speakers:

First Keynote:

Chris Sistrunk, Technical Leader, ICS/OT, Mandiant

Chris SistrunkChris Sistrunk is Technical Leader on the Mandiant ICS/OT Security Consulting team at Mandiant (part of Google Cloud) focusing on helping protect and secure critical infrastructure around the world for the last 10 years. As technical leader of the ICS/OT Consulting team, Chris leads ICS/OT assessment methodology development, helps clients better secure their ICS networks, analyzes client networks for threats, assists Mandiant incident response investigations involving control systems, and teaches Mandiant’s ICS security training courses.

Before Mandiant, Chris was a Senior Engineer at Entergy for over 11 years where he was a subject matter expert for Transmission and Distribution SCADA and Substation Automation systems, and cyber security. Chris was awarded Energy Sector Security Professional of the Year in 2014.

Chris is a Senior Member of the IEEE and is a registered Professional Engineer in Louisiana. He founded BSidesJackson, co-founded the BEER-ISAC, and helped organize the ICS Village at DEF CON 22. He holds BS electrical engineering and MS engineering and technology management degrees from Louisiana Tech University.

Second Keynote:

Dr. Tommy Morris, Director, Center for Cybersecurity Research and Education, Eminent Scholar and Professor, Electrical and Computer Engineering, The University of Alabama in Huntsville

Dr. Thommy MorrisDr. Tommy Morris currently serves as the founding Director of the Center for Cybersecurity Research and Education (CCRE) and as an Eminent Scholar and Professor of Electrical and Computer Engineering at the University of Alabama in Huntsville. Dr. Morris received his Ph.D. in Computer Engineering in 2008 from Southern Methodist University in Dallas, TX with a research emphasis in cyber security. His primary research interests include cyber security for industrial control systems and cyber physical systems. His recent research outcomes include vulnerability and exploit taxonomies, intrusion detection systems, and modeling and simulation of cyber physical systems for cybersecurity research and education. He has authored more than 80 peer reviewed research conference and journal articles in these areas. Dr. Morris’s research projects are funded by the US Army, National Security Agency, National Science Foundation, Department of Homeland Security, Pacific Northwest National Laboratory, NASA, the US Army Corps of Engineers Engineering Research Development Center (ERDC), and multiple technology companies. Prior to joining UAH, Dr. Morris served at Mississippi State University from 2008-2015 and Texas Instruments (TI) from 1991-2008. Dr. Morris is a Certified Information Systems Security Professional (CISSP).

List of Accepted Papers:

  1. Karley Waguespack, Kaitlyn Smith, Olame Muliri, Ramyapandian Vijayakanthan and Aisha Ali-Gombe, “MARS: The First Line of Defense for IoT Incident Responsee”
  2. Lisa Marie Dreier, Céline Vanini, Frank Breitinger, Christopher Hargreaves and Felix Freiling, Beyond Timestamps: Integrating Implicit Timing Information into Digital Forensic Timelines
  3. Dong Bin Oh, Donghyun Kim, Donghyun Kim and Huy Kang Kim, volGPT: Evaluation on triaging ransomware process in memory forensics with Large Language Model
  4. Taha Gharaibeh, Ibrahim Baggili and Anas Mahmoud, On Enhancing Memory Forensics with FAME: Framework for Advanced Monitoring and Execution
  5. Ella Savchenko, Jenny Ottmann and Felix Freiling, In the Time Loop: Data Remanence in Main Memory of Virtual Machines
  6. Céline Vanini, Chris Hargreaves, Harm van Beek and Frank Breitinger, Time anchors: A formalization of concepts for establishing clock accuracy during event reconstruction
  7. Christopher Bowen, Andrew Case, Golden Richard III and Ibrahim Baggili, A Step in a New Direction: NVIDIA GPU Kernel Driver Memory Forensics
  8. Janine Schneider, Maximilian Eichhorn, Lisa Marie Dreier and Christopher Hargreaves, Applying Digital Stratigraphy to the Problem of Recycled Storage Media
  9. Abdur Rahman Onik, Abdulla Asad, Trevor T Spinosa and Ibrahim Baggili, Hit and Run: Forensic Vehicle Event Reconstruction Through Driver-Based Cloud Data From Progressive’s Snapshot Application
  10. Dohun Kim, Jungheum Park and Sangjin Lee, Decrypting IndexedDB in Private Mode of Gecko-based Browsers
  11. Wasif Khan, Saed Alrabaee, Jie Tang and Kim-Kwang Raymond Choo, Compiler-provenance identification in obfuscated binaries using vision transformers
  12. Antonio Artur Moura, Napoleão Nepomuceno and Vasco Furtado, Enhancing Speaker Identification in Criminal Investigations through Clusterization and Rank-based Scoring
  13. Daniel Baier, Alexander Basse, Jan-Niclas Hilgert and Martin Lambertz, TLS Key Material Identification and Extraction in Memory: Current State and Future Challenges
  14. Jona Crasselt and Gaston Pugliese, Started Off Local, Now We’re in the Cloud: Forensic Examination of the Amazon Echo Show 15 Smart Display

Workshops:

  1. Anthony Andreoli, Anis Lounis, Mourad Debbabi, and Aiman Hanna, Footsteps in the Dark: Feeling our way to IoT Device Takeover via NVRAM Forensics
  2. Jessica Hyde, Third-Party App Analysis Methodologies in Mobile Forensics
  3. Isiaq Bolaji Ibrahim and Lydiah Muigwa, Blockchain in Digital Forensics – A Case of Pig Butchering Scam in Nigeria
  4. Andrew Case and Chris Bowen, Modern Memory Forensics with Volatility 3
  5. Ali Hadi and Mariam Khader, Threat Simulations – A Hands-on Investigation
  6. Ali Hadi and Mariam Khader, Internal Investigation

Presentations:

  1. Jigang Liu, A 20-year retrospective review of baccalaureate programs in Computer Forensics in the U.S.
  2. Biodoumoye Bokolo, “Crime-Intent Sentiment Detection on Twitter Data Using Machine Learning”

Evening Events:

  1. Rodeo: Wednesday night