Day 1 – 10th September 2018
09:00 | Registration starts |
09:15 – 09:30 | Welcome to ICDF2C’18
(General Chairs) |
09:30 – 10:30 | Keynote by Dr. Deborah Frincke
(National Security Agency/Central Security Service (NSA/CSS)
|
30 min Coffee Break | |
11:00 – 12:00 | Session I: Carving & Data hiding
On efficiency and effectiveness of Linear Function Detection Approaches for Memory Carving. Lorenz Liebler & Harald Baier (both University of Applied Sciences Darmstadt) fishy – A Framework for Implementing Filesystem-based Data Hiding Techniques. Thomas Göbel & Harald Baier (both University of Applied Sciences Darmstadt) |
1 Hour Lunch Break (provided) | |
13:00 – 15:00 | Workshop by Riscure Inc. (Sponsor)
|
30 min Coffee Break | |
15:30 – 17:30 | Workshop by Riscure Inc. (Sponsor) |
17:30 – 19:00 | Free time |
19:00 – open end | Gala Dinner at the Royal Sonesta Hotel (meeting in the venue lobby at 6.45 to walk over) |
Day 2 – 11th September 2018
09:00 | Registration starts |
09:30 – 10:30 | Keynote by Golden G. Richard III, Ph.D.
Associate Director for Cybersecurity, Center for Computation and Technology (CCT) |
30 min Coffee Break | |
11:00 – 12:00 | Session II: Android
If I Had a Million Cryptos: Cryptowallet Application Analysis and A Trojan Proofof-Concept. Trevor Haigh, Frank Breitinger & Ibrahim Baggili (all University of New Haven) AndroParse – An Android Feature Extraction Framework & Dataset. Rob Schmicker, Frank Breitinger & Ibrahim Baggili (all University of New Haven) |
1 Hour Lunch Break (provided) | |
13:00 – 15:00 | Presentations:
Atola Tech (Sponsor). John Graham (~15min) Hybrid Intrusion Detection System for Worm Attacks. Hassan Hadi Latheeth AlMaksousy & Michele C. Weigle (both) Old Dominion University. Short Paper (~20min) CASE/UCO: An Emerging Analysis Standard for Improving Digital Investigations. Vikram Harichandran (MITRE) (~30min) Memory Forensics in the Face of Modern Threats Andrew Case (~30min)
|
30-45 min Coffee Break and Poster session | |
15:30 – 17:00 | Session III: Forensic Readiness
Digital Forensic Readiness Framework for Ransomware Investigation. Avinash Singh, Ikuesan Richard Adeyemi & H.S. Venter (all University of Pretoria) Forensics Analysis of an On-line Game over Steam Platform. Raquel Tabuyo-Benito (Tallinn University of Technology), Hayretdin Bahsi (Tallinn University of Technology) and Pedro Peris-Lopez (Universidad Carlos III de Madrid) A Digital Forensic Investigation and Verification Model for Industrial Espionage. Jieun Dokko & Michael Shin (Texas Tech University) |
17:00 – 19:00 | Free time |
19:00 | Dinner (on your own) |
Day 3 – 12th September 2018
09:00 | Registration starts | |
09:30 – 10:30 | Session IV: Hard Drives and Digital Forensics
Solid State Drive Forensics: Where Do We Stand?. John Vieyra (Canada Border Services Agency), Mark Scanlon (University College Dublin) & Nhien An Le Khac (University College Dublin) Associating Drives Based on Their Artifact and Metadata Distributions. Neil Rowe (U.S. Naval Postgraduate School) |
|
30 min Coffee Break | ||
11:00 – 12:00 | Session V: Artefact correlation
Digital Forensics Event Graph Reconstruction. Daniel Schelkoph, Gilbert Peterson & James Okolica (all Air Force Institue of Technology) Multi-Item Passphrases: A Self-Adaptive Approach Against Offline Guessing Attacks. Jaryn Shen (Nanjing University), Kim-Kwang Raymond Choo (University of Texas at San Antonio) and Qingkai Zeng (Nanjing University) |
|
12:00 – 12:15 | Closing words | |
1.5 Hour Lunch Break (on your own) | ||
14:00 – 17:30 | Possibility to do sightseeing; depending on interest. Suggestions:
• World war II museum • Audubon Aquarium, • Audubon Butterfly Garden and Insectarium |
|