IFIP TC6 Open Digital Library

Digital Forensics 2012: Pretoria, South Africa

Advances in Digital Forensics VIII - 8th IFIP WG 11.9 International Conference on Digital Forensics, Pretoria, South Africa, January 3-5, 2012, Revised Selected Papers

Gilbert L. Peterson, Sujeet Shenoi

Springer, IFIP Advances in Information and Communication Technology 383, ISBN: 978-3-642-33961-5


Themes and Issues

On the Creation of Reliable Digital Evidence.

Nicolai Kuntze, Carsten Rudolph, Aaron Alva, Barbara Endicott-Popovsky, John Christiansen, Thomas Kemmerich


Managing Terabyte-Scale Investigations with Similarity Digests.

Vassil Roussev


Visualizing Information in Digital Forensics.

Grant Osborne, Hannah Thinyane, Jill Slay


Forensic Techniques

XML Conversion of the Windows Registry for Forensic Processing and Distribution.

Alex Nelson


Context-Based File Block Classification.

Luigi Sportiello, Stefano Zanero


A New Approach for Creating Forensic Hashsets.

Marcelo Ruback, Bruno W. P. Hoelz, Célia Ghedini Ralha


Reasoning about Evidence using Bayesian Networks.

Hayson Tse, Kam-Pui Chow, Michael Y. K. Kwan


Data Visualization for Social Network Forensics.

Martin Mulazzani, Markus Huber, Edgar Weippl


Mobile Phone Forensics

Forensic Analysis of Pirated Chinese Shanzhai Mobile Phones.

Jun-bin Fang, Zoe L. Jiang, Kam-Pui Chow, Siu-Ming Yiu, Lucas Chi Kwong Hui, Gang Zhou, Mengfei He, Yanbin Tang


Comparing Sources of Location Data from Android Smartphones.

Michael Spreitzenbarth, Sven Schmitt, Felix C. Freiling


An Open Framework for Smartphone Evidence Acquisition.

Lamine M. Aouad, M. Tahar Kechadi, Justin Trentesaux, Nhien-An Le-Khac


Cloud Forensics

Finding File Fragments in the Cloud.

Dirk Ras, Martin S. Olivier


Isolating Instances in Cloud Forensics.

Waldo Delport, Martin S. Olivier


Key Terms for Service Level Agreements to Support Cloud Forensics.

Keyun Ruan, Joshua James, Joe Carthy, Tahar Kechadi


Network Forensics

Evidence Collection in Peer-to-Peer Network Investigations.

Teja Myneedu, Yong Guan


Validation of Rules Used in Foxy Peer-to-Peer Network Investigations.

Ricci S. C. Ieong, Kam-Pui Chow, Pierre K. Y. Lai


A Log File Digital Forensic Model.

Himal Lalla, Stephen Flowerday, Tendai Sanyamahwe, Paul Tarwireyi


Implementing Forensic Readiness Using Performance Monitoring Tools.

Franscois Van Staden, Hein S. Venter


Advanced Forensic Techniques

Reconstruction in Database Forensics.

Oluwasola Mary Fasan, Martin S. Olivier


Data Hiding Techniques for Database Environments.

Heloise Pieterse, Martin Olivier


Forensic Tracking and Mobility Prediction in Vehicular Networks.

Saif Al-Kuwari, Stephen D. Wolthusen


Using Internal Depth to Aid Stereoscopic Image Splicing Detection.

Mark-Anthony Fouche, Martin S. Olivier