Please note: All times below are in Central Daylight Time.

For clarity, the current time in Baton Rouge, LA is:

Return to the USA 2024 Conference Page

Please find our tentative program items below the table. Schedules are still work in progress.

Schedule of Events

TIMES ARE IN CDT
Monday, July 8
Women in Forensic Computing Workshop
Tuesday, July 9
Workshop Day
Wednesday, July 10
Main Conference
EveningDFRWS Rodeo
Thursday, July 11
Main Conference
Friday, July 12
Main Conference / Workshop/ Expedition

Tentative Program Items

While program items and schedules are still brewing and work-in-progress, you may find below the items that will be part of the conference.

The table above will hold schedules as they get fixed while the text area below will present to you the papers, workshops and presentations that were accepted for this conference.

Please bear with us on the fixed schedule which we will provide as soon as possible.

Keynote Speakers:

First Keynote:

Chris Sistrunk, Technical Leader, ICS/OT, Mandiant

Chris SistrunkChris Sistrunk is Technical Leader on the Mandiant ICS/OT Security Consulting team at Mandiant (part of Google Cloud) focusing on helping protect and secure critical infrastructure around the world for the last 10 years. As technical leader of the ICS/OT Consulting team, Chris leads ICS/OT assessment methodology development, helps clients better secure their ICS networks, analyzes client networks for threats, assists Mandiant incident response investigations involving control systems, and teaches Mandiant’s ICS security training courses.

Before Mandiant, Chris was a Senior Engineer at Entergy for over 11 years where he was a subject matter expert for Transmission and Distribution SCADA and Substation Automation systems, and cyber security. Chris was awarded Energy Sector Security Professional of the Year in 2014.

Chris is a Senior Member of the IEEE and is a registered Professional Engineer in Louisiana. He founded BSidesJackson, co-founded the BEER-ISAC, and helped organize the ICS Village at DEF CON 22. He holds BS electrical engineering and MS engineering and technology management degrees from Louisiana Tech University.

Second Keynote:

TBD

List of Accepted Papers:

  1. Karley Waguespack, Kaitlyn Smith, Olame Muliri, Ramyapandian Vijayakanthan and Aisha Ali-Gombe, “MARS: The First Line of Defense for IoT Incident Responsee”
  2. Lisa Marie Dreier, Céline Vanini, Frank Breitinger, Christopher Hargreaves and Felix Freiling, Beyond Timestamps: Integrating Implicit Timing Information into Digital Forensic Timelines
  3. Dong Bin Oh, Donghyun Kim, Donghyun Kim and Huy Kang Kim, volGPT: Evaluation on triaging ransomware process in memory forensics with Large Language Model
  4. Taha Gharaibeh, Ibrahim Baggili and Anas Mahmoud, On Enhancing Memory Forensics with FAME: Framework for Advanced Monitoring and Execution
  5. Ella Savchenko, Jenny Ottmann and Felix Freiling, In the Time Loop: Data Remanence in Main Memory of Virtual Machines
  6. Céline Vanini, Chris Hargreaves, Harm van Beek and Frank Breitinger, Time anchors: A formalization of concepts for establishing clock accuracy during event reconstruction
  7. Christopher Bowen, Andrew Case, Golden Richard III and Ibrahim Baggili, A Step in a New Direction: NVIDIA GPU Kernel Driver Memory Forensics
  8. Janine Schneider, Maximilian Eichhorn, Lisa Marie Dreier and Christopher Hargreaves, Applying Digital Stratigraphy to the Problem of Recycled Storage Media
  9. Abdur Rahman Onik, Abdulla Asad, Trevor T Spinosa and Ibrahim Baggili, Hit and Run: Forensic Vehicle Event Reconstruction Through Driver-Based Cloud Data From Progressive’s Snapshot Application
  10. Dohun Kim, Jungheum Park and Sangjin Lee, Decrypting IndexedDB in Private Mode of Gecko-based Browsers
  11. Wasif Khan, Saed Alrabaee, Jie Tang and Kim-Kwang Raymond Choo, Compiler-provenance identification in obfuscated binaries using vision transformers
  12. Antonio Artur Moura, Napoleão Nepomuceno and Vasco Furtado, Enhancing Speaker Identification in Criminal Investigations through Clusterization and Rank-based Scoring
  13. Daniel Baier, Alexander Basse, Jan-Niclas Hilgert and Martin Lambertz, TLS Key Material Identification and Extraction in Memory: Current State and Future Challenges
  14. Jona Crasselt and Gaston Pugliese, Started Off Local, Now We’re in the Cloud: Forensic Examination of the Amazon Echo Show 15 Smart Display

Workshops:

  1. Anthony Andreoli, Anis Lounis, Mourad Debbabi, and Aiman Hanna, Footsteps in the Dark: Feeling our way to IoT Device Takeover via NVRAM Forensics
  2. Jessica Hyde, Third-Party App Analysis Methodologies in Mobile Forensics
  3. Isiaq Bolaji Ibrahim and Lydiah Muigwa, Blockchain in Digital Forensics – A Case of Pig Butchering Scam in Nigeria
  4. Andrew Case and Chris Bowen, Modern Memory Forensics with Volatility 3
  5. Ali Hadi and Mariam Khader, Threat Simulations – A Hands-on Investigation (YTBA: Yet To Be Accepted)
  6. Ali Hadi and Mariam Khader, Internal Investigation (YTBA)

Presentations:

  1. Jigang Liu, A 20-year retrospective review of baccalaureate programs in Computer Forensics in the U.S.

Evening Events:

  1. Rodeo: Wednesday night