IFIP TC6 Open Digital Library

Digital Forensics 2009: Hong Kong, China

Advances in Digital Forensics V - Fifth IFIP WG 11.9 International Conference on Digital Forensics, Orlando, Florida, USA, January 26-28, 2009, Revised Selected Papers

Gilbert L. Peterson, Sujeet Shenoi

Springer, IFIP Advances in Information and Communication Technology 306, ISBN: 978-3-642-04154-9



Contents

Themes and Issues

Digital Forensics as a Surreal Narrative.

Mark Pollitt

 3-15

Digital Forensic Research: The Good, the Bad and the Unaddressed.

Nicole Beebe

 17-36

Towards a Formalization of Digital Forensics.

Jill Slay, Yi-Chi Lin, Benjamin Turnbull, Jason Beckett, Paul Lin

 37-47

Forensic Techniques

Bulk Email Forensics.

Fred Cohen

 51-67

Analyzing the Impact of a Virtual Machine on a Host Machine.

Greg Dorn, Christopher Marberry, Scott Conrad, Philip Craiger

 69-81

Temporal Analysis of Windows MRU Registry Keys.

Yuandong Zhu, Pavel Gladyshev, Joshua James

 83-93

Using DCT Features for Printing Technique and Copy Detection.

Christian Schulze, Marco Schreyer, Armin Stahl, Thomas M. Breuel

 95-106

Source Camera Identification Using Support Vector Machines.

Bo Wang, Xiangwei Kong, Xingang You

 107-118

Forensic Analysis of the Sony Playstation Portable.

Scott Conrad, Carlos Rodriguez, Christopher Marberry, Philip Craiger

 119-129

Integrity and Privacy

Implementing Boot Control for Windows Vista.

Yuki Ashino, Keisuke Fujita, Maiko Furusawa, Tetsutaro Uehara, Ryoichi Sasaki

 133-141

A Forensic Framework for Handling Information Privacy Incidents.

Kamil Reddy, Hein S. Venter

 143-155

Network Forensics

Tracking Contraband Files Transmitted Using Bittorrent.

Karl R. Schrader, Barry E. Mullins, Gilbert L. Peterson, Robert F. Mills

 159-173

A Model for Foxy Peer-to-Peer Network Investigations.

Ricci S. C. Ieong, Pierre K. Y. Lai, Kam-Pui Chow, Frank Y. W. Law, Michael Y. K. Kwan, Kenneth Tse

 175-186

Detecting Fraud in Internet Auction Systems.

Yanlin Peng, Linfeng Zhang, Yong Guan

 187-198

Forensic Computing

A Cloud Computing Platform for Large-Scale Forensic Computing.

Vassil Roussev, Liqiang Wang, Golden G. Richard III, Lodovico Marziale

 201-214

Password Cracking Using Sony Playstations.

Hugo Kleinhans, Jonathan Butts, Sujeet Shenoi

 215-227

Investigative Techniques

A Cost-Effective Model for Digital Forensic Investigations.

Richard E. Overill, Michael Y. K. Kwan, Kam-Pui Chow, Pierre K. Y. Lai, Frank Y. W. Law

 231-240

Analysis of the Digital Evidence Presented in the Yahoo! Case.

Michael Y. K. Kwan, Kam-Pui Chow, Pierre K. Y. Lai, Frank Y. W. Law, Hayson Tse

 241-252

Legal Issues

Assessing the Legal Risks in Network Forensic Probing.

Michael Losavio, Olfa Nasraoui, Vincent Thacker, Jeffrey S. Marean, Nick Miles, Roman V. Yampolskiy, Ibrahim N. Imam

 255-266

A Survey of the Legal Issues Facing Digital Forensic Experts.

Sydney Liles, Marcus Rogers, Marianne Hoebich

 267-276

An Extended Model for E-Discovery Operations.

David Billard

 277-287

Evidence Management

Concept Mapping for Digital Forensic Investigations.

April Tanner, David A. Dampier

 291-300

System Support for Forensic Inference.

Ashish Gehani, Florent Kirchner, Natarajan Shankar

 301-316