Contributing Authors |
Preface |
Themes and Issues / Part I: |
Dealing with Terabyte Data Sets in Digital Investigations / Nicole Beebe ; Jan Clark1: |
Forensics and Privacy-Enhancing Technologies / Martin Olivier2: |
A Network-Based Architecture for Storing Digital Evidence / Mark Davis ; Gavin Manes ; Sujeet Shenoi3: |
Digital Forensics: Meeting the Challenges of Scientific Evidence / Matthew Meyers ; Marcus Rogers4: |
Non-Technical Manipulation of Digital Data / Michael Losavio5: |
Investigative Techniques / Part II: |
Detecting Social Engineering / Michael Hoeschele6: |
A Framework for Email Investigations / Anthony Persaud ; Yong Guan7: |
The Mitnick Case: How Bayes Could Have Helped / Thomas Duval ; Bernard Jouga ; Laurent Roger8: |
Applying Forensic Principles to Computer-Based Assessment / R. Laubscher ; D. Rabe ; M. Olivier ; J. Eloff ; H. Venter9: |
Exploring Forensic Data with Self-Organizing Maps / B. Fei10: |
Network Forensics / Part III: |
Integrating Digital Forensics in Network Infrastructures / Kulesh Shanmugasundaram ; Herve Bronnimann ; Nasir Memon11: |
Using Peer-to-Peer Technology for Network Forensics / Scott Redding12: |
Forensic Profiling System / P. Kahai ; M. Srinivasan ; K. Namuduri ; R. Pendse13: |
Global Internet Routing Forensics / Eunjong Kim ; Dan Massey ; Indrajit Ray14: |
Using Signaling Information in Telecom Network Forensics / T. Moore ; A. Meekan ; G. Manes ; S. Shenoi15: |
Portable Electronic Device Forensics / Part IV: |
Forensic Analysis of Mobile Phone Internal Memory / Svein Willassen16: |
Imaging and Analysis of GSM SIM Cards / Christopher Swenson17: |
Extracting Concealed Data from BIOS Chips / P. Gershteyn ; M. Davis18: |
Linux and File System Forensics / Part V: |
Recovering Digital Evidence from Linux Systems / Philip Craiger19: |
Detecting Hidden Data in Ext2/Ext3 File Systems / S. Piper20: |
Applications and Techniques / Part VI: |
Forensic Analysis of Digital Image Tampering / Gilbert Peterson21: |
Content-Based Image Retrieval for Digital Forensics / Y. Chen ; V. Roussev ; G. Richard III ; Y. Gao22: |
Making Decisions about Legal Responses to Cyber Attacks / L. Peng ; T. Wingfield ; D. Wijesekera ; E. Frye ; R. Jackson ; J. Michael23: |
Applying Filter Clusters to Reduce Search State Space / Jill Slay ; Kris Jorgensen24: |
In-Kernel Cryptographic Executable Verification / Yusuf Motara ; Barry Irwin25: |
Some Challenges in Digital Forensics / Eugene Spafford |
Evidence Collection and Handling |
AFF: An Open Extensible Format for Disk Imaging / S. Garfinkel ; D. Malan ; K. Dubec ; C. Stevens ; C. Pham |
File System Support for Digital Evidence Bags / Golden Richard III ; Vassil Roussev |
Remote Upload of Evidence Over Mobile Ad Hoc Networks |
Applying Machine Trust Models to Forensic Investigations / M. Wojcik |
Exploring Big Haystacks: Data Mining and Knowledge Management / Mark Pollitt ; Anthony Whitledge |
Forensic Techniques |
Countering Hostile Forensic Techniques / Scott Piper |
Using PLSI-U to Detect Insider Threats From Email Traffic / James Okolica ; Robert Mills |
Collusion Detection Using Multimedia Fingerprints |
Authorship Attribution for Electronic Documents / Patrick Juola |
Linking Individuals to Digital Information / Shelly Seier ; David Greer |
Use-Misuse Case Driven Analysis of Positive Train Control / Mark Hartong ; Rajni Goel ; Duminda Wijesekera |
Operating System and File System Forensics |
Mac OS X Forensics / Paul Burke |
Detecting Data Concealment Programs Using File System Analysis / R. Kennedy ; K. Pyles ; A. Strickler |
Assessing Trace Evidence Left by Secure Deletion Programs |
On the Reliability of Network Eavesdropping Tools / Eric Cronin ; Micah Sherr ; Matthew Blaze |
Active Traffic Capture for Network Forensics / Marco Slaviero ; Anna Granova |
Logical Traffic Isolation Using Differentiated Services / Tinus Strauss ; Derrick Kourie |
Passive Detection of NAT Routers and Client Counting / Kenneth Straka |
Analysis of Web Proxy Logs |
GSM Cell Site Forensics / Tyler Moore |
An Architecture for SCADA Network Forensics / T. Kilpatrick ; J. Gonzalez ; R. Chandia ; M. Papa |
Identifying Digital Cameras Using CFA Interpolation / Sevinc Bayram ; Husrev Sencar |
Forensic Analysis of BIOS Chips / Pavel Gershteyn |
Training, Governance and Legal Issues / Part VII: |
A Training Tool for Internet Crimes Against Children Cases / S. Aggarwal ; B. Breeden ; P. Henry ; J. Mulholland |
Process Flow Diagrams for Training and Operations / Jacobus Venter26: |
A Control Framework for Digital Forensics / S. von Solms ; C. Louwrens ; C. Reekie ; T. Grobler27: |
Criminal Regulation of Anti-Forensic Tools in Japan / Tetsuya Ishii28: |
Contributing Authors |
Preface |
Themes and Issues / Part I: |