ICDF2C 2011
Third ICST International Conference on Digital Forensics and Cyber Crime
Dublin, Ireland, 26 - 28 October 2011
TECHNICAL PROGRAMME
26th October 2011 |
|||||
08:30 |
- |
09:00 |
Registration |
||
09:00 |
- |
10:30 |
Opening Session |
||
Welcome address by Garda Deputy Commissioner Noirin O'Sullivan |
|||||
Keynote speech on International Police Cooperation in the Fight Against Cybercrime by Mr. Jaime Ansieta, Assistant Director of INTERPOL Financial and High-tech Crime Sub-directorate |
|||||
10:30 |
- |
10:45 |
Coffee Break |
||
10:45 |
- |
12:30 |
Session I: Cybercrime Investigations |
||
Cynthia Murphy |
|||||
The Role of Perception in Age Estimation |
|||||
Kathryn Seigfried-Spellar, Marcus Rogers, Gary Bertoline |
|||||
Internet Child Pornography, U.S. Sentencing Guidelines, and the Role of Internet Service Providers |
|||||
Esti Peshin |
|||||
Lawful Interception 2.0: Regulating Social Media |
|||||
12:30 |
- |
13:30 |
Lunch |
||
13:30 |
- |
14:45 |
Session II: Mobile Device Forensics – 1 |
||
Mark Lohrum |
|||||
Forensic Extractions of Data from the Nokia N900 |
|||||
Thomas Schaefer, Hans Hoefken, Marko Schuba |
|||||
Windows Phone 7 from a Digital Forensics' Perspective |
|||||
14:45 |
- |
15:00 |
Coffee Break |
||
15:00 |
- |
16:30 |
Session III: Mobile Device Forensics – 2 |
||
Satheesh Kumar S, Bibin Thomas, Thomas K L |
|||||
An agent based tool for Windows Mobile forensics |
|||||
Eric Katz, Richard Mislan, Marcus Rogers |
|||||
Results of Field Testing Mobile Phone Shielding Devices |
|||||
Ramindu Silva, Kelly Cole, Richard Mislan |
|||||
All Bot Net: A Need for Smartphone P2P Awareness |
|||||
17:00 |
- |
18:30 |
Tutorial I: Mobile Phone Forensics (by Cindy Murphy, Madison Police Department) |
||
27th October 2011 |
|||||
09:00 |
- |
10:30 |
Session IV: New Developments in Digital Forensics |
||
Keynote speech by Prof. Marcus Rogers, Purdue University |
|||||
Jim Lyle, US National Institute of Standards and Technology (NIST) |
|||||
A strategy for testing metadata based deleted file recovery tools |
|||||
10:30 |
- |
10:45 |
Coffee Break |
||
10:45 |
- |
12:30 |
Neil Rowe, Simson L Garfinkel |
||
Finding anomalous and suspicious files from directory metadata on a large corpus |
|||||
Ahmed Shosha, Joshua James, Pavel Gladyshev |
|||||
A Novel Methodology for Malware Intrusion Attack Path Reconstruction |
|||||
Frank Breitinger, Harald Baier |
|||||
Performance Issues about Context Triggered Piecewise Hashing |
|||||
12:30 |
- |
13:30 |
Lunch |
||
13:30 |
- |
14:40 |
Session V: Systematic Methods of Investigation |
||
Clive Blackwell |
|||||
A Forensic Framework for Incident Analysis Applied to the Insider Threat |
|||||
Serguei A. Mokhov, Joey Paquet, Mourad Debbabi |
|||||
Reasoning About a Simulated Printer Case Investigation with Forensic Lucid |
|||||
14:40 |
- |
15:05 |
Session VI: Short Papers |
||
Sean Thorpe, Abbie Barbir , Indrakshi Ray, Tyrone W A Grandison, Indrajit Ray, Robert France |
|||||
Formal Parameterization of Log Synchronization Events |
|||||
Tejashree Datar, Matt Levendoski |
|||||
Yahoo! Messenger Forensics on Windows Vista and Windows 7 |
|||||
Martin Steinebach |
|||||
Robust Hashing for Efficient Forensic Analysis of Image Sets |
|||||
Anthony Keane, Stephen O'Shaughnessy |
|||||
Tracking User Activity on Personal Computers |
|||||
15:05 |
- |
15:25 |
Coffee Break & Poster Session |
||
15:25 |
- |
17:10 |
Session VII: Digital Forensic Techniques |
||
Alexander Barnett |
|||||
The Forensic Value of the Windows 7 Jump List |
|||||
Gyu-Sang Cho, Marcus Rogers |
|||||
Finding Forensic Information on Creating a Folder in $LogFile of NTFS |
|||||
Toshinobu Yasuhira, Kazuhiro Nishimura, Tomofumi Koida |
|||||
Rescuing Digital Data from Submerged HDD |
|||||
17:30 |
- |
19:00 |
Tutorial II: Facebook Forensics (by Cernam Ltd.) |
||
20:00 |
- |
Conference Dinner |
28th October 2011 |
|||||||
09:00 |
- |
10:30 |
Session VIII: Digital Forensics Education |
||||
Pavel Gladyshev, Marcus Rogers, John Sheppard, Anthony Keane Panel Session: The Future of Digital Forensic Education |
|||||||
Christian Moch, Felix C Freiling |
|||||||
Evaluating the Forensic Image Generator Generator |
|||||||
10:30 |
- |
10:45 |
Coffee Break |
||||
10:45 |
- |
12:30 |
Session IX: Internet & Network Investigations |
||||
Peter Wyatt, Pavel Gladyshev |
|||||||
Per Port Forensics, Integrating Digital Investigation into the Network Fabric |
|||||||
Kacper Gradon |
|||||||
Internet As a New Criminal Battlefield |
|||||||
Seth King |
|||||||
The Dancing Dodo – Recent spam activity on the cybercrime forums |
|||||||
12:30 |
- |
13:30 |
Lunch / Steering Committee Meeting |
||||
13:30 |
- |
14:10 |
Session X: Industry Talks Session |
||||
Ibrahim Baggili |
|||||||
Intelligent Triage Tools for Digital Forensics |
|||||||
Simon Collins |
|||||||
Role and Responsibilities of an Expert Witness |
|||||||
14:10 |
- |
14:30 |
Coffee Break |
||||
14:30 |
- |
16:00 |
Tutorial III: Taking Fingerprint Evidence form Digital Devices (by Veselko Hagen, Austria Federal Police) |
||||