IFIP TC6 Open Digital Library

Digital Forensics 2011: Orlando, FL, USA

Advances in Digital Forensics VII - 7th IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, USA, January 31 - February 2, 2011, Revised Selected Papers

Gilbert L. Peterson, Sujeet Shenoi

Springer, IFIP Advances in Information and Communication Technology 361, ISBN: 978-3-642-24211-3



Contents

Themes and Issues

The State of the Science of Digital Evidence Examination.

Frederick Cohen, Julie Lowrie, Charles Preston

 3-21

An Investigative Framework for Incident Analysis.

Clive Blackwell

 23-34

Cloud Forensics.

Keyun Ruan, Joe Carthy, M. Tahar Kechadi, Mark Crosbie

 35-46

Forensic Techniques

Searching Massive Data Streams Using Multipattern Regular Expressions.

Jon Stewart, Joel Uckelman

 49-63

Fast Content-Based File Type Identification.

Irfan Ahmed, Kyung-suk Lhee, Hyunjung Shin, Manpyo Hong

 65-75

Case-Based Reasoning in Live Forensics.

Bruno W. P. Hoelz, Célia Ghedini Ralha, Frederico Mesquita

 77-88

Assembling Metadata for Database Forensics.

Hector Beyers, Martin S. Olivier, Gerhard P. Hancke

 89-99

Forensic Leak Detection for Business Process Models.

Rafael Accorsi, Claus Wonnemann

 101-113

Analyzing Stylometric Approaches to Author Obfuscation.

Patrick Juola, Darren Vescovi

 115-125

Fraud and Malware Investigations

Detecting Fraud Using Modified Benford Analysis.

Christian Winter, Markus Schneider 0002, York Yannikos

 129-141

Detecting Collusive Fraud in Enterprise Resource Planning Systems.

Asadul K. Islam, Malcolm Corney, George M. Mohay, Andrew J. Clark, Shane Bracher, Tobias Raub, Ulrich Flegel

 143-153

Analysis of Back-Doored Phishing Kits.

Heather McCalley, Brad Wardman, Gary Warner

 155-168

Identifying Malware Using Cross-Evidence Correlation.

Anders Flaglien, Katrin Franke, André Årnes

 169-182

Detecting Mobile Spam Botnets Using Artificial immune Systems.

Ickin Vural, Hein S. Venter

 183-192

Network Forensics

An FPGA System for Detecting Malicious DNS Network Traffic.

Brennon Thomas, Barry E. Mullins, Gilbert L. Peterson, Robert F. Mills

 195-207

Router and Interface Marking for Network Forensics.

Emmanuel S. Pilli, Ramesh Chandra Joshi, Rajdeep Niyogi

 209-220

Extracting Evidence Related to VoIP Calls.

David Irwin, Jill Slay

 221-228

Advanced Forensic Techniques

Sensitivity Analysis of Bayesian Networks Used in Forensic Investigations.

Michael Y. K. Kwan, Richard E. Overill, Kam-Pui Chow, Hayson Tse, Frank Y. W. Law, Pierre K. Y. Lai

 231-243

Steganographic Techniques for Hiding Data in SWF Files.

Mark-Anthony Fouche, Martin S. Olivier

 245-255

Evaluating Digital Forensic Options for the Apple iPad.

Andrew Hay, Dennis Krill, Benjamin Kuhar, Gilbert L. Peterson

 257-273

Forensic Analysis of Plug Computers.

Scott Conrad, Greg Dorn, Philip Craiger

 275-287