This event is endorsed
and organized by

4th International Conference on Digital Forensics & Cyber Crime

October 25–26, 2012 | Lafayette, Indiana, United States

Day 1

8:30

REGISTRATION

9:00

Keynote: Pat Harrington - Tippecanoe County Prosecutor

9:30

Detection of Masqueraded Wireless Access Using 802.11 MAC Layer Fingerprints - (Christer Idland, Thomas Jelle, and Stig Mjolsnes)

10:00

BlackBerry PlayBook Backup Forensic Analysis -(Mohamed Al Marzougy, Ibrahim Baggili, and Andrew Marrington)

10:30

BREAK

11:00

Flash Malware: A Reverse Engineering Guide to Discover Its Purpose - (Francis Ripberger)

11:30

Towards Automated Malware Behavioral Analysis and Profiling for Forensic Investigation Purposes - (Ahmed F. Shosha, Joshua I. James, Chen-Ching Liu and Pavel Gladyshev)

12:00

Lunch

1:00

Face Recognition Based on Wavelet Transform and Adaptive  Local Binary Pattern - (Abdallah Mohamed and Roman Yampolskiy)

1:30

On Improving Authorship Attribution of Source Code - ( Matthew Tennyson)

2:00

Cybercrime, censorship, perception and bypassing controls: An exploratory Study - (Ibrahim Baggili, Moza Al Shamlan, Bedoor Al Jabri, Ayesha Al Zaabi)

2:30

Measuring the Preference of Image Content for Self-Reported Consumers of Child Pornography - (Kathryn C. Seigfried-Spellar)

3:00

BREAK

3:30

When Should Virtual Cybercrime Be Brought under the Scope Criminal Law? - (Litska Strikwerda)

4:00

Cloud Forensic Maturity Model - (Keyun Ruan and Joe Carthy)

4:30

Identifying Remnants Of Evidence In The Cloud - (Jeremy Koppen, Gerald Gent, Kevin Bryan, Lisa DiPippo, Jillian Kramer, Marquita Moreland, Victor Fay-Wolfe)

5:00

Cloud Computing Reference Architecture and its Forensic Implications: A Preliminary Analysis - (Keyun Ruan, Joe Carthy)

5:30

DEMO of Tools

 

 

6:30

Conference Supper

 

 

Day 2

8:30

REGISTRATION

9:00

Keynote: Rob Attoe - AccessData

9:30

On Improving Authorship Attribution of Source Code - (Matthew Tennyson)

10:00

Similarity Preserving Hashing: Eligible Properties and a new Algorithm MRSH-2 - (Frank Breitinger)

10:30

BREAK

11:00

On the Completeness of Reconstructed Data for Database Forensics - (Oluwasola Mary Fasan and Martin S Olivier)

11:30

A Review and Comparative Study of Digital Forensic Investigation Models - (Kwaku Kyei, Pavol Zavarsky, Dale Lindskog, Ron Ruhl)

12:00

Lunch

1:00

KEYNOTE: Dr. Eugene Spafford - CERIAS Purdue

1:30

Research trends in digital forensic science: An empirical analysis of published research - (Ibrahim Baggili, Afrah BaAbdallah, Deena Al-Safi, Andrew Marrington)

2:00

 Finding Data in DNA: Computer Forensic Investigations of Living Organisms - (Marc B. Beck, Eric C. Rouchka, Roman V. Yampolskiy)

2:30

 Investigating File Encrypted Material using NTFS $logfile - (Niall McGrath) 

3:00

BREAK

3:30

BREDOLAB, Shopping in the Cybercrime Underworld - (Daan de Graaf, Ahmed F.Shosha and Pavel Gladyshev)

4:00

Evaluating and Comparing Tools for Mobile Device Forensics using Quantitative Analysis - (Shahzad Saleem, Oliver Popov and Oheneba Kwame Appiah-Kubi)

4:30

A Forensic Investigation of an Xbox 360: Mapping Investigative Data Using Open Source Tools - (Ashley Podhradsky)

5:00

ANTS ROAD: A New Tool for SQLite data Recovery On Android Devices - (Lamine M. Aouad, Tahar M. Kechadi, and Roberto Di Russo)

5:30

Conference Wrap Up