Program

 

Day 1 – 10th September 2018

09:00 Registration starts
09:15 – 09:30 Welcome to ICDF2C’18

(General Chairs)

09:30 – 10:30 Keynote by Dr. Deborah Frincke 

(National Security Agency/Central Security Service (NSA/CSS)

 

30 min Coffee Break
11:00 – 12:00 Session I: Carving & Data hiding

On efficiency and effectiveness of Linear Function Detection Approaches for

Memory Carving. Lorenz Liebler & Harald Baier (both University of Applied Sciences Darmstadt)

fishy – A Framework for Implementing Filesystem-based Data Hiding Techniques. Thomas Göbel & Harald Baier (both University of Applied Sciences Darmstadt)

1 Hour Lunch Break (provided)
13:00 – 15:00 Workshop by Riscure Inc.  (Sponsor)

 

30 min Coffee Break
15:30 – 17:30 Workshop by Riscure Inc.  (Sponsor)
17:30 – 19:00 Free time
19:00 – open end Gala Dinner at the Royal Sonesta Hotel (meeting in the venue lobby at 6.45 to walk over)

 

 

Day 2 – 11th September 2018

09:00 Registration starts
09:30 – 10:30 Keynote by Golden G. Richard III, Ph.D.

Associate Director for Cybersecurity, Center for Computation and Technology (CCT)

30 min Coffee Break
11:00 – 12:00 Session II: Android

If I Had a Million Cryptos: Cryptowallet Application Analysis and A Trojan Proofof-Concept. Trevor Haigh, Frank Breitinger & Ibrahim Baggili (all University of New Haven)

AndroParse – An Android Feature Extraction Framework & Dataset. Rob Schmicker,

Frank Breitinger & Ibrahim Baggili (all University of New Haven)

1 Hour Lunch Break (provided)
13:00 – 15:00 Presentations:

Atola Tech (Sponsor). John Graham (~15min)

Hybrid Intrusion Detection System for Worm Attacks.  Hassan Hadi Latheeth AlMaksousy & Michele C. Weigle (both) Old Dominion University. Short Paper (~20min)

CASE/UCO: An Emerging Analysis Standard for Improving Digital Investigations.

Vikram Harichandran (MITRE) (~30min)

Memory Forensics in the Face of Modern Threats

Andrew Case (~30min)

 

30-45 min Coffee Break and Poster session
15:30 – 17:00 Session III: Forensic Readiness

Digital Forensic Readiness Framework for Ransomware Investigation. Avinash Singh, Ikuesan Richard Adeyemi & H.S. Venter (all University of Pretoria)

Forensics Analysis of an On-line Game over Steam Platform. Raquel Tabuyo-Benito (Tallinn University of Technology), Hayretdin Bahsi  (Tallinn University of Technology) and Pedro Peris-Lopez (Universidad Carlos III de Madrid)

A Digital Forensic Investigation and Verification Model for Industrial Espionage.

Jieun Dokko & Michael Shin (Texas Tech University)

17:00 – 19:00 Free time
19:00 Dinner (on your own)

 

 

Day 3 – 12th September 2018

09:00 Registration starts
09:30 – 10:30 Session IV: Hard Drives and Digital Forensics

Solid State Drive Forensics: Where Do We Stand?. John Vieyra (Canada Border Services Agency), Mark Scanlon (University College Dublin) & Nhien An Le Khac (University College Dublin)

Associating Drives Based on Their Artifact and Metadata Distributions. Neil Rowe (U.S. Naval Postgraduate School)

30 min Coffee Break
11:00 – 12:00 Session V: Artefact correlation

Digital Forensics Event Graph Reconstruction. Daniel Schelkoph, Gilbert Peterson & James Okolica (all Air Force Institue of Technology)

Multi-Item Passphrases: A Self-Adaptive Approach Against Offline Guessing Attacks.

Jaryn Shen (Nanjing University), Kim-Kwang Raymond Choo (University of Texas at San Antonio) and Qingkai Zeng (Nanjing University)

12:00 – 12:15 Closing words
1.5 Hour Lunch Break (on your own)
14:00 – 17:30 Possibility to do sightseeing; depending on interest. Suggestions:

•       World war II museum

•       Audubon Aquarium,

•       Audubon Butterfly Garden and Insectarium