IFIP TC6 Open Digital Library

Digital Forensics 2012: Pretoria, South Africa

Advances in Digital Forensics VIII - 8th IFIP WG 11.9 International Conference on Digital Forensics, Pretoria, South Africa, January 3-5, 2012, Revised Selected Papers

Gilbert L. Peterson, Sujeet Shenoi

Springer, IFIP Advances in Information and Communication Technology 383, ISBN: 978-3-642-33961-5



Contents

Themes and Issues

On the Creation of Reliable Digital Evidence.

Nicolai Kuntze, Carsten Rudolph, Aaron Alva, Barbara Endicott-Popovsky, John Christiansen, Thomas Kemmerich

 3-17

Managing Terabyte-Scale Investigations with Similarity Digests.

Vassil Roussev

 19-34

Visualizing Information in Digital Forensics.

Grant Osborne, Hannah Thinyane, Jill Slay

 35-47

Forensic Techniques

XML Conversion of the Windows Registry for Forensic Processing and Distribution.

Alex Nelson

 51-65

Context-Based File Block Classification.

Luigi Sportiello, Stefano Zanero

 67-82

A New Approach for Creating Forensic Hashsets.

Marcelo Ruback, Bruno W. P. Hoelz, Célia Ghedini Ralha

 83-97

Reasoning about Evidence using Bayesian Networks.

Hayson Tse, Kam-Pui Chow, Michael Y. K. Kwan

 99-113

Data Visualization for Social Network Forensics.

Martin Mulazzani, Markus Huber, Edgar Weippl

 115-126

Mobile Phone Forensics

Forensic Analysis of Pirated Chinese Shanzhai Mobile Phones.

Jun-bin Fang, Zoe L. Jiang, Kam-Pui Chow, Siu-Ming Yiu, Lucas Chi Kwong Hui, Gang Zhou, Mengfei He, Yanbin Tang

 129-142

Comparing Sources of Location Data from Android Smartphones.

Michael Spreitzenbarth, Sven Schmitt, Felix C. Freiling

 143-157

An Open Framework for Smartphone Evidence Acquisition.

Lamine M. Aouad, M. Tahar Kechadi, Justin Trentesaux, Nhien-An Le-Khac

 159-166

Cloud Forensics

Finding File Fragments in the Cloud.

Dirk Ras, Martin S. Olivier

 169-185

Isolating Instances in Cloud Forensics.

Waldo Delport, Martin S. Olivier

 187-200

Key Terms for Service Level Agreements to Support Cloud Forensics.

Keyun Ruan, Joshua James, Joe Carthy, Tahar Kechadi

 201-212

Network Forensics

Evidence Collection in Peer-to-Peer Network Investigations.

Teja Myneedu, Yong Guan

 215-230

Validation of Rules Used in Foxy Peer-to-Peer Network Investigations.

Ricci S. C. Ieong, Kam-Pui Chow, Pierre K. Y. Lai

 231-245

A Log File Digital Forensic Model.

Himal Lalla, Stephen Flowerday, Tendai Sanyamahwe, Paul Tarwireyi

 247-259

Implementing Forensic Readiness Using Performance Monitoring Tools.

Franscois Van Staden, Hein S. Venter

 261-270

Advanced Forensic Techniques

Reconstruction in Database Forensics.

Oluwasola Mary Fasan, Martin S. Olivier

 273-287

Data Hiding Techniques for Database Environments.

Heloise Pieterse, Martin Olivier

 289-301

Forensic Tracking and Mobility Prediction in Vehicular Networks.

Saif Al-Kuwari, Stephen D. Wolthusen

 303-317

Using Internal Depth to Aid Stereoscopic Image Splicing Detection.

Mark-Anthony Fouche, Martin S. Olivier

 319-333