I Can Login Without Your Password: Data Acquisition From Web-Based Server Using Credential Attack

Hi, I’m Jaehyeok Han from South Korea. I’m going to talk about data acquisition from web based service, without password, and I used credential attack. Before presentation, I’d like to appreciate this opportunity to show our stu… Continue reading I Can Login Without Your Password: Data Acquisition From Web-Based Server Using Credential Attack

Using Micro-Services and Artificial Intelligence to Analyze Images in Criminal Evidences

Hi everyone. My name is Gabriel Souza, and now I will present a paper to the Digital Forensic Workshop USA, and the article is entitled “Using Micro-Services and Artificial Intelligence to Analyze Images in Criminal Evidences.” So, this work has … Continue reading Using Micro-Services and Artificial Intelligence to Analyze Images in Criminal Evidences

How Better Processes and Information Can Improve Digital Forensic Science: January’s Research Roundup

As digital forensics moves toward a more established presence within the forensic sciences, 2022 starts off on an existential note thanks to a set of papers exploring digital forensic expertise and process, and the language used to describe both.

Te… Continue reading How Better Processes and Information Can Improve Digital Forensic Science: January’s Research Roundup

Coffee Forensics: Reconstructing Data in IoT Devices Running Contiki OS

Hi, my name is Jens-Petter Sandvik and I’m a PhD student at Norwegian University of Science and Technology (NTNU for short). In addition to trying to finish a PhD, I’m working for the Norwegian police in the national cyber crime &hell… Continue reading Coffee Forensics: Reconstructing Data in IoT Devices Running Contiki OS

Time Well Spent: Precision Timing, Monotonic Clocks, and the PowerLogs Database for iOS

Hello, and welcome to our talk on Time Well-Spent: Precision Timing, Monotonic Clocks, and the PowerLogs Database for iOS.

As you might’ve guessed, we both work for Magnet Forensics, and this is the story of our research journey through … Continue reading Time Well Spent: Precision Timing, Monotonic Clocks, and the PowerLogs Database for iOS

How Human Factors Confound and Enrich Digital Forensics: The November-December Research Roundup

Human complexity lies at the heart of so much of digital forensics – both the artifacts that offer insights into people’s motives, means, and opportunity to commit wrongdoing, and the investigations that reveal them.

Our research roundup for the end… Continue reading How Human Factors Confound and Enrich Digital Forensics: The November-December Research Roundup

Lab Management and Novel Methods and Tools in the Forensic Sciences: Research from October

This month’s roundup features an eclectic assortment of research on mobile, IoT, and vehicular devices, as well as file forensics, image forensics, and threat detection. Much of this research explores novel acquisition techniques for newer technologies… Continue reading Lab Management and Novel Methods and Tools in the Forensic Sciences: Research from October

Insider Threat Prediction Based on Unsupervised Anomaly Detection Scheme for Proactive Forensic Investigation

Hello everyone. Wei Yichen from the University of Hong Kong. Today I’m going to introduce our paper about insider threat prediction based on Unsupervised Anomaly Detection Scheme for Proactive Forensic Investigation.Let’s start with t… Continue reading Insider Threat Prediction Based on Unsupervised Anomaly Detection Scheme for Proactive Forensic Investigation