Robust Malware Detection Models: Learning From Adversarial Attacks and Defenses

Hello to all of you. My name is Hemant Rathore and I’m here to present the work “Robust Malware Detection Models: Learning From Adversarial Attacks and Defenses.” The other authors of this paper are Adithya Samavedhi, Sanjay K Sahay, and &h… Continue reading Robust Malware Detection Models: Learning From Adversarial Attacks and Defenses

Chip Chop: Smashing the Mobile Phone Security Chip for Fun and Digital Forensics

Hello, and welcome to Chip Chop: Smashing the Mobile Phone Security Chip for Fun and Digital Forensics. My name is Gunnar Alendal and I am a PhD candidate at NTNU in Norway, and I am going to talk about one … Read more The post Chip Chop: … Continue reading Chip Chop: Smashing the Mobile Phone Security Chip for Fun and Digital Forensics

Behavioral-Based Forensics and Investigation Approach for Analyzing Attacks on Water Plants Using GANs

Hello. My name is Nataliia Neshenko. I am a PhD candidate in Florida Atlantic University College of Engineering & Computer Science working with Professor Fuhrt and in collaboration with Professor Bou-Harb from the University of Texas in San A… Continue reading Behavioral-Based Forensics and Investigation Approach for Analyzing Attacks on Water Plants Using GANs

What Do Incident Response Practitioners Need To Know? A Skillmap for the Years Ahead

Okay, good afternoon. My name is Radek Hranincký. I’m currently finishing my PhD at Brno University of Technology in the Czech Republic. And together with my colleagues from different corners of Europe, we made this paper called “What do in… Continue reading What Do Incident Response Practitioners Need To Know? A Skillmap for the Years Ahead

Coffee Forensics: Reconstructing Data in IoT Devices Running Contiki OS

Hi, my name is Jens-Petter Sandvik and I’m a PhD student at Norwegian University of Science and Technology (NTNU for short). In addition to trying to finish a PhD, I’m working for the Norwegian police in the national cyber crime &hell… Continue reading Coffee Forensics: Reconstructing Data in IoT Devices Running Contiki OS

Time Well Spent: Precision Timing, Monotonic Clocks, and the PowerLogs Database for iOS

Hello, and welcome to our talk on Time Well-Spent: Precision Timing, Monotonic Clocks, and the PowerLogs Database for iOS.

As you might’ve guessed, we both work for Magnet Forensics, and this is the story of our research journey through … Continue reading Time Well Spent: Precision Timing, Monotonic Clocks, and the PowerLogs Database for iOS

The Potential of Digital Traces in Providing Evidence at Activity Level

Hello. My name is Hans Henseler from the University of Applied Sciences Leiden. I’m going to present about ‘The Potential of Digital Traces in Providing Evidence at Activity Level’. This presentation is based by work together with professio… Continue reading The Potential of Digital Traces in Providing Evidence at Activity Level