Day 1 |
|
8:30 |
REGISTRATION |
9:00 |
Keynote: Pat Harrington - Tippecanoe County Prosecutor |
9:30 |
Detection of Masqueraded Wireless Access Using 802.11 MAC Layer Fingerprints - (Christer Idland, Thomas Jelle, and Stig Mjolsnes) |
10:00 |
BlackBerry PlayBook Backup Forensic Analysis -(Mohamed Al Marzougy, Ibrahim Baggili, and Andrew Marrington) |
10:30 |
BREAK |
11:00 |
Flash Malware: A Reverse Engineering Guide to Discover Its Purpose - (Francis Ripberger) |
11:30 |
Towards Automated Malware Behavioral Analysis and Profiling for Forensic Investigation Purposes - (Ahmed F. Shosha, Joshua I. James, Chen-Ching Liu and Pavel Gladyshev) |
12:00 |
Lunch |
1:00 |
Face Recognition Based on Wavelet Transform and Adaptive Local Binary Pattern - (Abdallah Mohamed and Roman Yampolskiy) |
1:30 |
On Improving Authorship Attribution of Source Code - ( Matthew Tennyson) |
2:00 |
Cybercrime, censorship, perception and bypassing controls: An exploratory Study - (Ibrahim Baggili, Moza Al Shamlan, Bedoor Al Jabri, Ayesha Al Zaabi) |
2:30 |
Measuring the Preference of Image Content for Self-Reported Consumers of Child Pornography - (Kathryn C. Seigfried-Spellar) |
3:00 |
BREAK |
3:30 |
When Should Virtual Cybercrime Be Brought under the Scope Criminal Law? - (Litska Strikwerda) |
4:00 |
Cloud Forensic Maturity Model - (Keyun Ruan and Joe Carthy) |
4:30 |
Identifying Remnants Of Evidence In The Cloud - (Jeremy Koppen, Gerald Gent, Kevin Bryan, Lisa DiPippo, Jillian Kramer, Marquita Moreland, Victor Fay-Wolfe) |
5:00 |
Cloud Computing Reference Architecture and its Forensic Implications: A Preliminary Analysis - (Keyun Ruan, Joe Carthy) |
5:30 |
DEMO of Tools |
|
|
6:30 |
Conference Supper |
|
|
Day 2 |
|
8:30 |
REGISTRATION |
9:00 |
Keynote: Rob Attoe - AccessData |
9:30 |
On Improving Authorship Attribution of Source Code - (Matthew Tennyson) |
10:00 |
Similarity Preserving Hashing: Eligible Properties and a new Algorithm MRSH-2 - (Frank Breitinger) |
10:30 |
BREAK |
11:00 |
On the Completeness of Reconstructed Data for Database Forensics - (Oluwasola Mary Fasan and Martin S Olivier) |
11:30 |
A Review and Comparative Study of Digital Forensic Investigation Models - (Kwaku Kyei, Pavol Zavarsky, Dale Lindskog, Ron Ruhl) |
12:00 |
Lunch |
1:00 |
KEYNOTE: Dr. Eugene Spafford - CERIAS Purdue |
1:30 |
Research trends in digital forensic science: An empirical analysis of published research - (Ibrahim Baggili, Afrah BaAbdallah, Deena Al-Safi, Andrew Marrington) |
2:00 |
Finding Data in DNA: Computer Forensic Investigations of Living Organisms - (Marc B. Beck, Eric C. Rouchka, Roman V. Yampolskiy) |
2:30 |
Investigating File Encrypted Material using NTFS $logfile - (Niall McGrath) |
3:00 |
BREAK |
3:30 |
BREDOLAB, Shopping in the Cybercrime Underworld - (Daan de Graaf, Ahmed F.Shosha and Pavel Gladyshev) |
4:00 |
Evaluating and Comparing Tools for Mobile Device Forensics using Quantitative Analysis - (Shahzad Saleem, Oliver Popov and Oheneba Kwame Appiah-Kubi) |
4:30 |
A Forensic Investigation of an Xbox 360: Mapping Investigative Data Using Open Source Tools - (Ashley Podhradsky) |
5:00 |
ANTS ROAD: A New Tool for SQLite data Recovery On Android Devices - (Lamine M. Aouad, Tahar M. Kechadi, and Roberto Di Russo) |
5:30 |
Conference Wrap Up |