IFIP TC6 Open Digital Library

Digital Forensics 2008: Kyoto, Japan

Advances in Digital Forensics IV, Fourth Annual IFIP WG 11.9 Conference on Digital Forensics, Kyoto University, Kyoto, Japan, January 28-30, 2008

Indrajit Ray, Sujeet Shenoi

Springer, IFIP 285, ISBN: 978-0-387-84926-3



Contents

Themes and Issues

When is Digital Evidence Forensically Sound?

Rodney McKemmish

 3-15

Applying Traditional Forensic Taxonomy to Digital Forensics.

Mark Pollitt

 17-26

Evidence Recovery

Recovering Data from Failing Floppy Disks.

Frederick Cohen, Charles Preston

 29-41

Extracting Evidence Using Google Desktop Search.

Timothy Pavlic, Jill Slay, Benjamin Turnbull

 43-50

Evaluation of Registry Data Removal by Shredder Programs.

Harry Velupillai, Pontjho Mokhonoana

 51-58

Evidence Integrity

Using Boot Control to Preserve the Integrity of Evidence.

Keisuke Fujita, Yuki Ashino, Tetsutaro Uehara, Ryoichi Sasaki

 61-74

Hypothesis-Based Investigation of Digital Timestamps.

Svein Yngvar Willassen

 75-86

Improving Disk Sector Integrity Using K-Dimension Hashing.

Zoe L. Jiang, Lucas Chi Kwong Hui, Siu-Ming Yiu

 87-98

Evidence Management

Class-Aware Similarity Hashing for Data Classification.

Vassil Roussev, Golden G. Richard III, Lodovico Marziale

 101-113

Applying Topic Modeling to Forensic Data.

Alta de Waal, Jacobus Venter, Etienne Barnard

 115-126

Forensic Techniques

Forensic Analysis of Volatile Instant Messaging.

Matthew Kiley, Shira Dankner, Marcus Rogers

 129-138

Timely Rootkit Detection During Live Response.

Daniel Molina, Matthew Zimmerman, Gregory Roberts, Marnita Eaddie, Gilbert L. Peterson

 139-148

Network Forensics

Identifying and Analyzing Web Server Attacks.

Christian Seifert, Barbara Endicott-Popovsky, Deborah A. Frincke, Peter Komisarczuk, Radu Muschevici, Ian Welch

 151-161

Forensic Web Services.

Murat Gunestas, Duminda Wijesekera, Anoop Singhal

 163-176

Detecting Remote Exploits Using Data Mining.

Mohammad M. Masud, Latifur Khan, Bhavani M. Thuraisingham, Xinran Wang, Peng Liu 0005, Sencun Zhu

 177-189

Portable Electronic Device Forensics

Using Sensor Dirt for Toolmark Analysis of Digital Photographs.

Martin S. Olivier

 193-206

A New Feature-Based Method for Source Camera Identification.

Fanjie Meng, Xiangwei Kong, Xingang You

 207-218

Data Recovery from Windows CE Based Handheld Devices.

Antonio Savoldi, Paolo Gubian

 219-230

Legal Issues Pertaining to the Use of Cell Phone Data.

Charles Adams, Anthony Whitledge, Sujeet Shenoi

 231-243

Event Data Recorder Forensics

Protection and Recovery of Railroad Event Recorder Data.

Mark Hartong, Rajni Goel, Duminda Wijesekera

 247-260

Automobile Event Data Recorder Forensics.

Nathan Singleton, Jeremy S. Daily, Gavin Manes

 261-272

Novel Investigative Techniques

Reasoning About Evidence Using Bayesian Networks.

Michael Y. K. Kwan, Kam-Pui Chow, Frank Y. W. Law, Pierre K. Y. Lai

 275-289

Inferring Sources of Leaks in Document Management Systems.

Madhusudhanan Chandrasekaran, Vidyaraman Sankaranarayanan, Shambhu J. Upadhyaya

 291-306

Image Background Matching for Identifying Suspects.

Paul Fogg, Gilbert L. Peterson, Michael Veth

 307-321

Forensic Tools

An Evidence Acquisition Tool for Live Systems.

Renico Koen, Martin S. Olivier

 325-334

Time Analysis of Hard Drive Imaging Tools.

Jack Wesley Riley, David A. Dampier, Rayford B. Vaughn

 335-344

Fusion of Steganalysis Systems Using Bayesian Model Averaging.

Benjamin M. Rodriguez, Gilbert L. Peterson, Kenneth W. Bauer Jr.

 345-355

A Virtual Digital Forensics Laboratory.

Philip Craiger, Paul Burke, Christopher Marberry, Mark Pollitt

 357-365