IFIP TC6 Open Digital Library

Digital Forensics 2013: Orlando, FL, USA

Advances in Digital Forensics IX - 9th IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, USA, January 28-30, 2013, Revised Selected Papers

Gilbert L. Peterson, Sujeet Shenoi

Springer, IFIP Advances in Information and Communication Technology 410, ISBN: 978-3-642-41147-2



Contents

Themes and Issues

History, Historiography and the Hermeneutics of the Hard Drive.

Mark Pollitt

 3-17

Protecting Third Party Privacy in Digital Forensic Investigations.

Wynand van Staden

 19-31

On the Scientific Maturity of Digital Forensics Research.

Martin Olivier, Stefan Gruner

 33-49

Forensic Models

Cognitive Approaches for Digital Forensic Readiness Planning.

Antonio Pooe, Les Labuschagne

 53-66

A Harmonized Process Model for Digital Forensic Investigation Readiness.

Aleksandar Valjarevic, Hein S. Venter

 67-82

Evaluation of the Semi-automated Crime-Specific Digital Triage Process Model.

Gary Cantrell, David A. Dampier

 83-98

Forensic Techniques

Reducing the Time Required for Hashing Operations.

Frank Breitinger, Kaloyan Petrov

 101-117

Hash-Based File Content Identification Using Distributed Systems.

York Yannikos, Jonathan Schluessler, Martin Steinebach, Christian Winter, Kalman Graffi

 119-134

Creating Super Timelines in Windows Investigations.

Stephen Esposito, Gilbert Peterson

 135-144

Log File Analysis with Context-Free Grammars.

Gregory Bosman, Stefan Gruner

 145-152

Using a Goal-Driven Approach in the Investigation of a Questioned Contract.

Clive Blackwell, Shareeful Islam, Benjamin Aziz

 153-167

Filesystem Forensics

File Fragment Analysis Using Normalized Compression Distance.

Stefan Axelsson, Kamran Ali Bajwa, Mandhapati Venkata Srikanth

 171-182

Quantifying Windows File Slack Size and Stability.

Martin Mulazzani, Sebastian Neuner, Peter Kieseberg, Markus Huber, Sebastian Schrittwieser, Edgar Weippl

 183-193

Automating Video File Carving and Content Identification.

York Yannikos, Nadeem Ashraf, Martin Steinebach, Christian Winter

 195-212

Data Recovery from Proprietary Formatted Cctv Hard Disks.

Aswami Ariffin, Jill Slay, Kim-Kwang Raymond Choo

 213-223

Network Forensics

Creating Integrated Evidence Graphs for Network Forensics.

Changwei Liu, Anoop Singhal, Duminda Wijesekera

 227-241

A Generic Bayesian Belief Model for Similar Cyber Crimes.

Hayson Tse, Kam-Pui Chow, Michael Y. K. Kwan

 243-255

An Empirical Study Profiling Internet Pirates.

Pierre K. Y. Lai, Kam-Pui Chow, Xiao-Xi Fan, Vivien P. S. Chan

 257-272

Real-Time Covert Timing Channel Detection in Networked Virtual Environments.

Anyi Liu, Jim X. Chen, Harry Wechsler

 273-288

Cloud Forensics

Impact of Cloud Computing on Digital Forensic Investigations.

Stephen O'Shaughnessy, Anthony Keane

 291-303

Rule-Based Integrity Checking of Interrupt Descriptor Tables in Cloud Environments.

Irfan Ahmed, Aleksandar Zoranic, Salman Javaid, Golden G. Richard III, Vassil Roussev

 305-328

Forensic Tools

Comparison of the Data Recovery Function of Forensic Tools.

Joe Buchanan-Wollaston, Tim Storer, William Bradley Glisson

 331-347

Security Analysis and Decryption of Filevault 2.

Omar Choudary, Felix Gröbert, Joachim Metz

 349-363

Advanced Forensic Techniques

Detecting Counterfeit Currency and Identifying Its Source.

Ankit Sarkar, Robin Verma, Gaurav Gupta

 367-384

Towards Active Linguistic Authentication.

Patrick Juola, John Noecker Jr., Ariel Stolerman, Michael Ryan, Patrick Brennan, Rachel Greenstadt

 385-398