Day 1 - 28th September 2016
08:00 - 08:45 |
Bus from Holiday Inn Express Manhattan Midtown West to John Jay College (please be on time) Registration starts |
08:45 - 09:00 |
Welcome to ICDF2C'16 |
09:00 - 10:00 |
Keynote - Elizabeth Schweinsberg (Google) |
30 min Coffee Break |
|
10:30 - 12:30 |
Workshop on large amount of data during investigation (NUIX) |
1.5 Hours Lunch Break |
|
14:00 - 15:30 |
Session I: Investigative TechniquesNeil Rowe, Riqui Schwamm, Michael McCarrin and Ralucca Gera (all U.S. Naval Postgraduate School). Making Sense of Email Addresses on Drives Samer Al-Khateeb (University of Arkansas at Little Rock), Kevin J Conlan (University of New Haven), Nitin Agarwal (University of Arkansas at Little Rock), Ibrahim Baggili (University of New Haven) and Frank Breitinger (University of New Haven). Exploring Deviant Hacker Networks (DHN) On Social Media Platform Murat Gunestas and Zeki Bilgin (both Turkey Security Department). Log analysis using temporal logic and reconstruction approach: web server case |
30 min Coffee Break |
|
16:00 - 17:00
|
Session II: Digital Forensics Analyse TechniquesThibault Julliand, Vincent Nozick and Hugues Talbot (all University Paris-Est). Countering noise-based splicing detection using noise density transfer Marcus Thompson and Raymond Hansen (both Purdue University). Verification of recovered digital evidence on the amazon kindle |
17:30 19:00 - Whenever |
Bus back to the Holiday Inn Express Manhattan Midtown West Join us for a common dinner (on your own) |
Day 2 - 29th September 2016
9:00
|
Bus to John Jay College (please be on time) Registration starts |
09:30 - 10:30 |
Keynote - Nasir Memon (NYU Poly) |
30 min Coffee Break |
|
11:00 - 12:00 |
Workshop on Full Disk Encryption Password Cracking (Domingo Montanaro) |
1.5 Hours Lunch Break |
|
13:30 - 15:00 |
Session III: Approximate matchingVikram Harichandran, Frank Breitinger and Ibrahim Baggili (all University of New Haven). Bytewise Approximate Matching: The Good, The Bad, and The Unknown Doowon Jeong (Korea University), Frank Breitinger (University of New Haven), Hari Kang (Korea University) and Sangjin Lee (Korea University). Towards syntactic approximate matching - a pre-processing experiment Donghoon Chang, Somitra Sanadhya and Monika Singh (all Indraprastha Institute of Information Technology Delhi). Security Analysis of mvHash-B Similarity Hashing |
30 min Coffee Break |
|
15:30 - 16:30 |
Presentation SessionJan Pluskal, Ondrej Rysavy and Petr Matousek (all Brno University of Technology). On the identification of applications from captured network traffic Richard Wilson (University of Maryland, Baltimore County). Social Media, ISIS and Cyber Terrorism: An Anticipatory Ethical Analysis Richard Wilson (University of Maryland, Baltimore County). Information Warfare, Business and Infrastructure Defense: An Anticipatory Ethical Analysis |
Short break |
|
17:00 19:00 |
Reception at John Jay College (including Poster Session / Demonstrations) Bus back to the hotel |
Day 3 - 30th September 2016
08:30 - 09:00
|
Bus to John Jay College (please be on time) Registration starts |
09:00 - 10:30 |
Session IV: System DesignRadek Hranicky, Martin Holkovic, Petr Matousek and Ondrej Rysavy (all Brno University of Technology). On Efficiency of Distributed Password Recovery Hussam Mohammed, Nathan Clarke and Fudong Li (all School of Computing Plymouth). An automated approach for digital forensic analysis of heterogeneous big data Kibin Lee (Korea University), Joshua I. James (Hallym University), Tekachew Gobena Ejeta (Korea University) and Hyoungjoong Kim (Korea University). Electronic Voting Service Using Block-chain |
30 min Coffee Break |
|
11:00 - 12:00 |
Workshop on Drone Forensics (Devon Clark) |
12:00 - 12:15 12:30 |
Closing words Bus to the hotel |