What’s Happening at Techno Security San Diego: October 10-12, 2022

The Techno Security and Digital Forensics Conference is back in San Diego for its fourth year and is set to be even more successful than previous years. Running Monday, October 10th through Wednesday, October 12th, Techno Security will feature talks &h… Continue reading What’s Happening at Techno Security San Diego: October 10-12, 2022

BlockQuery: Toward Forensically Sound Cryptocurrency Investigation

Tiffanie: Hi, my name is Tiffanie Edwards, and I’m gonna be presenting the paper “BlockQuery: Toward Forensically Sound Cryptocurrency Investigation”.

So this is a little bit of background on the authors of this paper. Tyler Thomas is a … Continue reading BlockQuery: Toward Forensically Sound Cryptocurrency Investigation

A Live Digital Forensics Approach for Quantum Mechanical Computers

Dayton Closser: Well, good evening, everyone. Thank you very much for coming to this speech today. It’s great to be back after the COVID pandemic. It’s great to see everyone in person. I’ve immensely enjoyed speaking with all of… Continue reading A Live Digital Forensics Approach for Quantum Mechanical Computers

Identifying Document Similarity Using a fast Estimation of the Levenshtein Distance

Frank: Warm welcome also from my side. This is a presentation or some work that I did together with Peter. He reached out to me. He is in the States and he reached out and said, “hey, I saw … Read more The post Identifying Document Similar… Continue reading Identifying Document Similarity Using a fast Estimation of the Levenshtein Distance

Prudent Design Principles for Digital Tampering Experiments

Mark: Okay. Good afternoon. Welcome to the next full paper session. We have three papers for you in this session on forensic methods. So, Janine will start shortly with a paper on evidence tampering, we have a paper on … Read more The post… Continue reading Prudent Design Principles for Digital Tampering Experiments

DGForensiks’ Cindy Vasquez on Developing Digital Forensics Capacity in Mexico

Christa: This week on the Forensic Focus Podcast, our coverage of digital forensics issues across the world’s regions continues with Cindy Vazquez, owner of DGForensiks, a consultancy based just outside of Mexico City. We interviewed Cind… Continue reading DGForensiks’ Cindy Vasquez on Developing Digital Forensics Capacity in Mexico

UCD’s Prof. Liliana Pasquale on Filling the Cybersecurity Talent Gap

Christa Miller: As the cybersecurity talent gap continues to widen, a number of universities are developing programs to fill it. Among them is University College Dublin, which has just launched its brand new Master of Science in Cybersecurity p… Continue reading UCD’s Prof. Liliana Pasquale on Filling the Cybersecurity Talent Gap

Knock, Knock, Log: Threat Analysis, Detection & Mitigation of Covert Channels in Syslog Using Port Scans as Cover

In this paper, Kevin Lamshöft describes how researchers performed a threat analysis for a covert Command and Control (C2) channel using port scans as cover and syslog as carrier for data infiltration.

Session Chair: So, Kevin is presenting Kno… Continue reading Knock, Knock, Log: Threat Analysis, Detection & Mitigation of Covert Channels in Syslog Using Port Scans as Cover

Distant Traces and Their Use in Crime Scene Investigation

Starting with a physical crime scene – a fire – Manon Fischer describes how IoT devices such as “smart” plugs and thermostats store “distant traces” remotely, and could be used to help reconstruct a fire’s origin, cause, and timeline.

Session … Continue reading Distant Traces and Their Use in Crime Scene Investigation