IFIP TC6 Open Digital Library

Digital Forensics 2006: Orlando, Florida, USA

Advances in Digital Forensics II - IFIP International Conference on Digital Forensics, National Centre for Forensic Science, Orlando, Florida, USA, January 29 - February 1, 2006

Martin S. Olivier, Sujeet Shenoi

Springer, IFIP Advances in Information and Communication Technology 222, ISBN: 978-0-387-36890-0


Themes and Issues

Some Challenges in Digital Forensics.

Eugene H. Spafford


Evidence Collection and Handling

AFF: An Open Extensible Format for Disk Imaging.

Simson L. Garfinkel, David J. Malan, Karl-Alexander Dubec, Christopher C. Stevens, Cecile Pham


File System Support for Digital Evidence Bags.

Golden G. Richard III, Vassil Roussev


Remote Upload of Evidence over Mobile Ad Hoc Networks.

Indrajit Ray


Applying Machine Trust Models to Forensic Investigations.

Marika Wojcik, Hein S. Venter, Jan H. P. Eloff, Martin S. Olivier


Exploring Big Haystacks: Data Mining and Knowledge Management.

Mark Pollitt, Anthony Whitledge


Forensic Techniques

Countering Hostile Forensic Techniques.

Scott Piper, Mark Davis, Sujeet Shenoi


Using PLSI-U to Detect Insider Threats from Email Traffic.

James S. Okolica, Gilbert L. Peterson, Robert F. Mills


Collusion Detection Using Multimedia Fingerprints.

Anthony G. Persaud, Yong Guan


Authorship Attribution for Electronic Documents.

Patrick Juola


Linking Individuals to Digital Information.

Shelly Seier, David Greer, Gavin Manes


Use-Misuse Case Driven Analysis of Positive Train Control.

Mark Hartong, Rajni Goel, Duminda Wijesekera


Operating System and File System Forensics

Mac OS X Forensics.

Philip Craiger, Paul Burke


Detecting Data Concealment Programs Using File System Analysis.

Mark Davis, Richard Kennedy, Kristina Pyles, Amanda Strickler, Sujeet Shenoi


Assessing Trace Evidence Left by Secure Deletion Programs.

Paul Burke, Philip Craiger


Network Forensics

On the Reliability of Network Eavesdropping Tools.

Eric Cronin, Micah Sherr, Matt Blaze


Active Traffic Capture for Network Forensics.

Marco Slaviero, Anna Granova, Martin S. Olivier


Logical Traffic Isolation Using Differentiated Services.

Tinus Strauss, Martin S. Olivier, Derrick G. Kourie


Passive Detection of NAT Routers and Client Counting.

Kenneth Straka, Gavin Manes


Analysis of Web Proxy Logs.

Bennie Fei, Jan H. P. Eloff, Martin S. Olivier, Hein S. Venter


GSM Cell Site Forensics.

Christopher Swenson, Tyler Moore, Sujeet Shenoi


An Architecture for SCADA Network Forensics.

Tim Kilpatrick, Jesús González, Rodrigo Chandia, Mauricio Papa, Sujeet Shenoi


Portable Electronic Device Forensics

Identifying Digital Cameras Using CFA Interpolation.

Sevinc Bayram, Husrev T. Sencar, Nasir D. Memon


Forensic Analysis of BIOS Chips.

Pavel Gershteyn, Mark Davis, Sujeet Shenoi


Training, Governance and Legal Issues

A Training Tool for Internet Crimes Against Children Cases.

Sudhir Aggarwal, Bob Breeden, Peter Henry, Judie Mulholland


Process Flow Diagrams for Training and Operations.

Jacobus Venter


A Control Framework for Digital Forensics.

Sebastiaan H. von Solms, C. P. Louwrens, Colette Reekie, Talania Grobler


Criminal Regulation of Anti-Forensic Tools in Japan.

Tetsuya Ishii