Digital Forensics 2008: Kyoto, Japan
Advances in Digital Forensics IV, Fourth Annual IFIP WG 11.9 Conference on Digital Forensics, Kyoto University, Kyoto, Japan, January 28-30, 2008
Indrajit Ray, Sujeet Shenoi
Springer, IFIP 285, ISBN: 978-0-387-84926-3
Contents
Themes and Issues
Evidence Recovery
Evaluation of Registry Data Removal by Shredder Programs.
Harry Velupillai, Pontjho Mokhonoana
51-58
Evidence Integrity
Using Boot Control to Preserve the Integrity of Evidence.
Keisuke Fujita, Yuki Ashino, Tetsutaro Uehara, Ryoichi Sasaki
61-74
Improving Disk Sector Integrity Using K-Dimension Hashing.
Zoe L. Jiang, Lucas Chi Kwong Hui, Siu-Ming Yiu
87-98
Evidence Management
Class-Aware Similarity Hashing for Data Classification.
Vassil Roussev, Golden G. Richard III, Lodovico Marziale
101-113
Forensic Techniques
Forensic Analysis of Volatile Instant Messaging.
Matthew Kiley, Shira Dankner, Marcus Rogers
129-138
Timely Rootkit Detection During Live Response.
Daniel Molina, Matthew Zimmerman, Gregory Roberts, Marnita Eaddie, Gilbert L. Peterson
139-148
Network Forensics
Identifying and Analyzing Web Server Attacks.
Christian Seifert, Barbara Endicott-Popovsky, Deborah A. Frincke, Peter Komisarczuk, Radu Muschevici, Ian Welch
151-161
Detecting Remote Exploits Using Data Mining.
Mohammad M. Masud, Latifur Khan, Bhavani M. Thuraisingham, Xinran Wang, Peng Liu 0005, Sencun Zhu
177-189
Portable Electronic Device Forensics
A New Feature-Based Method for Source Camera Identification.
Fanjie Meng, Xiangwei Kong, Xingang You
207-218
Legal Issues Pertaining to the Use of Cell Phone Data.
Charles Adams, Anthony Whitledge, Sujeet Shenoi
231-243
Event Data Recorder Forensics
Protection and Recovery of Railroad Event Recorder Data.
Mark Hartong, Rajni Goel, Duminda Wijesekera
247-260
Novel Investigative Techniques
Reasoning About Evidence Using Bayesian Networks.
Michael Y. K. Kwan, Kam-Pui Chow, Frank Y. W. Law, Pierre K. Y. Lai
275-289
Inferring Sources of Leaks in Document Management Systems.
Madhusudhanan Chandrasekaran, Vidyaraman Sankaranarayanan, Shambhu J. Upadhyaya
291-306
Image Background Matching for Identifying Suspects.
Paul Fogg, Gilbert L. Peterson, Michael Veth
307-321
Forensic Tools
Time Analysis of Hard Drive Imaging Tools.
Jack Wesley Riley, David A. Dampier, Rayford B. Vaughn
335-344
Fusion of Steganalysis Systems Using Bayesian Model Averaging.
Benjamin M. Rodriguez, Gilbert L. Peterson, Kenneth W. Bauer Jr.
345-355
A Virtual Digital Forensics Laboratory.
Philip Craiger, Paul Burke, Christopher Marberry, Mark Pollitt
357-365