What Can You Tell Us About Your Password? A Contextual Approach

Aikaterini: I’m Aikaterini Kanta. I’m a PhD candidate with University College Dublin, and I’m really glad to be here today. I’m going to talk to you about my PhD research. So, about contextual based decryption.

So, the … Continue reading What Can You Tell Us About Your Password? A Contextual Approach

Towards a Working Definition and Classification for Automation in Digital Forensics

Gaëtan Michelet: So good morning, everyone. Today I will present the project we are working on with Frank Breitinger and Graham Horsman. This project is “Towards a working definition and classification for automation in the context of digital for… Continue reading Towards a Working Definition and Classification for Automation in Digital Forensics

Digital Forensics Research Update: May 2022

Research published last month covered a wide range of issues in digital forensics, from limitations and challenges to new tools and techniques and lessons for those in higher education.

Digital forensic techniques, now and in the future

The Natio… Continue reading Digital Forensics Research Update: May 2022

Quantifying Data Volatility for IoT Forensics With Examples From Contiki OS

Bruce Nikkel: …paper of the session is from Jens-Petter Sandvik and his colleagues at NTNU, and it’s on “Quantifying Data Volatility for IoT Forensics With Examples From Contiki OS.”

Jens-Petter: Yeah. Thank you. So, I’… Continue reading Quantifying Data Volatility for IoT Forensics With Examples From Contiki OS

A Systematic Approach to Understanding MACB Timestamps on Unixlike Systems

Bruce Nikkel: Okay, thanks everyone. I hope you enjoyed the break. Welcome to the first session: session one, with the theme of file system forensics. We have two interesting papers in this session. The first one is a systematic … Read mor… Continue reading A Systematic Approach to Understanding MACB Timestamps on Unixlike Systems

A Systematic Approach to Understanding MACB Timestamps on Unixlike Systems

Bruce Nikkel: Okay, thanks everyone. I hope you enjoyed the break. Welcome to the first session: session one, with the theme of file system forensics. We have two interesting papers in this session. The first one is a systematic … Read mor… Continue reading A Systematic Approach to Understanding MACB Timestamps on Unixlike Systems

Enterprise Forensics: Traditions vs Reality in Modern DFIR

Hans: So our keynote for today. Actually, I ran into Emre (online, of course) Tinaztepe from Binalyze in December. It was an interesting online meeting. I had to understand their technology.

And I’m sure Emre’s going to tell us ab… Continue reading Enterprise Forensics: Traditions vs Reality in Modern DFIR

Global Incident Response: DFRWS-EU Keynote, 2022

Chris Hargreaves: Without further ado, we can start the formal program and I’ll hand over to Serge Droz – I did my best there – for the first keynote of the week. Thank you.

Serge: So, this technology … Read more The p… Continue reading Global Incident Response: DFRWS-EU Keynote, 2022

Preparing for an Advanced Cyber Battlefield: The Digital Forensics for National Security Symposium

With a focus on complex electronic crimes, attacks, and intrusions at the national, state, and local levels, the Digital Forensics for National Security Symposium facilitates discussions among defense, intelligence, government, industry, nonprofit, and… Continue reading Preparing for an Advanced Cyber Battlefield: The Digital Forensics for National Security Symposium

Santosh Khadsare on Capacity Building in Digital Forensics

Christa Miller: Capacity building for digital forensics is defined as the development of new professionals and better equipped work environments, particularly as the digital forensics industry struggles to keep pace with the way technology and … Continue reading Santosh Khadsare on Capacity Building in Digital Forensics