Preparing for Court Testimony: What Happens When You Press That Button?

Heather Mahalik:  Hello, everyone. Welcome to Preparing for Court Testimony. This is a product that we worked on at Cellebrite; and Paul, Ian, and myself are here to share some hints and tips and best practices with you on … Read more The … Continue reading Preparing for Court Testimony: What Happens When You Press That Button?

Enhancing Digital Investigations With Cloud-Based Evidence

Matt: Hello everyone. My name is Matt Melton. I am a business development manager on our justice and public safety team at Amazon Web Services, or AWS, also known as the Amazon cloud. We’re gonna talk today about something … Read mor… Continue reading Enhancing Digital Investigations With Cloud-Based Evidence

BlockQuery: Toward Forensically Sound Cryptocurrency Investigation

Tiffanie: Hi, my name is Tiffanie Edwards, and I’m gonna be presenting the paper “BlockQuery: Toward Forensically Sound Cryptocurrency Investigation”.

So this is a little bit of background on the authors of this paper. Tyler Thomas is a … Continue reading BlockQuery: Toward Forensically Sound Cryptocurrency Investigation

A Live Digital Forensics Approach for Quantum Mechanical Computers

Dayton Closser: Well, good evening, everyone. Thank you very much for coming to this speech today. It’s great to be back after the COVID pandemic. It’s great to see everyone in person. I’ve immensely enjoyed speaking with all of… Continue reading A Live Digital Forensics Approach for Quantum Mechanical Computers

Identifying Document Similarity Using a fast Estimation of the Levenshtein Distance

Frank: Warm welcome also from my side. This is a presentation or some work that I did together with Peter. He reached out to me. He is in the States and he reached out and said, “hey, I saw … Read more The post Identifying Document Similar… Continue reading Identifying Document Similarity Using a fast Estimation of the Levenshtein Distance

Prudent Design Principles for Digital Tampering Experiments

Mark: Okay. Good afternoon. Welcome to the next full paper session. We have three papers for you in this session on forensic methods. So, Janine will start shortly with a paper on evidence tampering, we have a paper on … Read more The post… Continue reading Prudent Design Principles for Digital Tampering Experiments

Knock, Knock, Log: Threat Analysis, Detection & Mitigation of Covert Channels in Syslog Using Port Scans as Cover

In this paper, Kevin Lamshöft describes how researchers performed a threat analysis for a covert Command and Control (C2) channel using port scans as cover and syslog as carrier for data infiltration.

Session Chair: So, Kevin is presenting Kno… Continue reading Knock, Knock, Log: Threat Analysis, Detection & Mitigation of Covert Channels in Syslog Using Port Scans as Cover

Distant Traces and Their Use in Crime Scene Investigation

Starting with a physical crime scene – a fire – Manon Fischer describes how IoT devices such as “smart” plugs and thermostats store “distant traces” remotely, and could be used to help reconstruct a fire’s origin, cause, and timeline.

Session … Continue reading Distant Traces and Their Use in Crime Scene Investigation

The Wisdom of the Heap: Mesh It up by Weaving Data Structures

In this short presentation, Trufflepig Forensics’ Aaron Hartel and Christian Müller present some early stage research about the volatility of data in memory as data structures change version to version.

Session Chair: We’re now going over … Continue reading The Wisdom of the Heap: Mesh It up by Weaving Data Structures