Looking for the test release of the BitCurator virtual environment? You can find the latest release on the front page of our wiki, in the Downloads section. We’ve also posted instructions to help you get started.
8th International Workshop on Systematic Approaches to Digital Forensics Engineering – Call For Papers
Call for Papers
8th International Workshop on
Systematic Approaches to Digital Forensics Engineering
In collaboration with Hong Kong University, Hong Kong Information Security and Forensics Society; Hong Kong Center for Information Security and Cryptography and the Hong Kong Law and Technology Center
November 21-22, 2013
Hong Kong University, Hong Kong, Peoples Republic of China
right before the HTCIA (High Technology Crime Investigation Association)
Law Enforcement Cyber Security Training Conference
November 25-29, 2013
Paper Due Date: Jun 24, 2013 (anywhere in the world)
Acceptance Notification Date: August 15, 2013
Final Paper: October 1, 2013
Conference Date: November 21-22, 2013
We invite you to SADFE-2013, the eighth international conference on Systematic Approaches to Digital Forensic Engineering to be held in Hong Kong, China November 21-22, 2013.
Digital forensics engineering and the curation of digital collections in cultural institutions face pressing and overlapping challenges related to provenance, chain of custody, authenticity, integrity, and identity. The analysis and sustainability of digital evidence requires innovative methods, systems and practices, grounded in solid research and understanding of user needs.
SADFE-2013 investigates the application of digital forensic engineering expertise to advance a variety of goals, including criminal and corporate investigations, as well as documentation of individual and organizational activities. We believe digital forensic engineering is vital to security, the administration of justice and the evolution of culture.
Submissions: Submissions are made via Reg-Site
A Best Paper Award will be made for the final papers.
We welcome previously unpublished papers on digital forensics and preservation as to civil, criminal and national security investigations for use within a court of law, the execution of national policy or to aid in understanding the past and digital knowledge in general.
We discuss digital forensic principles in new areas of the information society. We hope you consider submission for this international conference.
Potential topics to be addressed by submissions include, but are not limited to:
Digital Data and Evidence Management: advanced digital evidence discovery, collection, management, storage and preservation
Identification, authentication and collection of digital evidence
Extraction and management of forensic data/metadata
Identification and redaction of personally identifying information and other forms of sensitive information
Post-acquisition handling of evidence and the preservation of data integrity and admissibility
Evidence and digital memory preservation, curation and storage
Architectures and processes (including network processes) that comply with forensic requirements
Managing geographically, politically and/or jurisdictionally dispersed data artifacts
Data, digital knowledge, and web mining systems for identification and authentication of relevant data
Digital Evidence, Data Integrity and Analytics: advanced digital evidence and digitized data analysis, correlation, and presentation
Advanced search, analysis, and presentation of digital evidence
Cybercrime scenario analysis and reconstruction technologies
Legal case construction and digital evidence support
Cyber-crime strategy analysis and modeling
Combining digital and non-digital evidence
Supporting both qualitative and statistical evidence
Computational systems and computational forensic analysis
Digital evidence in the face of encryption
Forensic-support technologies: forensic-enabled and proactive monitoring/response
Forensics of embedded or non-traditional devices (e.g. digicams, cell phones, SCADA, obsolete storage media)
Forensic tool validation: methodologies and principles
Legal and technical collaboration
Digital forensics surveillance technology and procedures
“Honeypot” and other target systems for data collection and monitoring
Quantitative attack impact assessment
Comprehensive fault analysis, including, but not limited to, DFE study of broad realistic system and digital knowledge failures, criminal and non-criminal, with comprehensive DFE (malicious/non-malicious) analysis in theory, methods, and practices.
Forensic and digital data integrity issues for digital preservation and recovery, including
Legal and ethical challenges
Institutional arrangements and workflows
Political challenges and
Cultural and professional challenges
Scientific Principle-Based Digital Forensic Processes: systematic engineering processes supporting digital evidence management which are sound on scientific, technical and legal grounds
Legal/technical aspects of admissibility and evidence tests
Examination environments for digital data
Courtroom expert witness and case presentation
Case studies illustrating privacy, legal and legislative issues
Forensic tool validation: legal implications and issues
Legal and privacy implications for digital and computational forensic analysis
Handling increasing volumes of digital discovery
Legal, Ethical and Technical Challenges
The forensic, policy and ethical implications of
n The Internet of Things, The “Smart City,” “Big Data” or Cloud systems
New Evidence Decisions, e.g., United States v. Jones, _ U.S._ (2012) and United States v. Kotterman, _ F.3d _ (9th Cir. 2013)
Computational Forensics and Validation
Transnational Investigations/Case Integration under the Convention on Cybercrime of the Council of Europe
Issues in Forensic Authentication and Validation.
SADFE-2013 follows standard IEEE submission standards with full papers to be submitted by the final due date.
Prospective authors are invited to submit original work not previously published or planned for presentation. Papers are reviewed on the basis that they do not contain plagiarized material and have not been submitted to any other conference at the same time (double submission). Follow these links to learn more:
IEEE Policy on Plagiarism
IEEE Policy on Double Submission
PLEASE NOTE: To be published in the Conference Proceedings an author of an accepted paper is required to register for the conference. Non-refundable registration fees must be paid prior to uploading the final IEEE formatted, publication-ready version of the paper. For authors with multiple accepted papers, one registration is valid for up to 3 papers. Accepted and presented papers will be published in the 2013 Conference Proceedings.
During the initial paper submission process via REG-SITE, it is the authors’ responsibility to ensure that the author list and the paper title of the submitted pdf file is an exact match to the author list and paper title on the REG-SITE registration page. Registration must include all co-authors, not just the submitting author. Failure to comply with this rule might result in your paper being withdrawn from the review process.
All submissions should be written in English with a maximum paper length of six (6) printed pages (minimum 10-point font) including figures, without incurring additional page charges.
Standard IEEE conference templates for for Microsoft Word US letter is here: US letter.
Only PDF files will be accepted for the review process, and all submissions must be done through REG-SITE.
Deborah Frincke, Co-Chair (Department of Defense)
Ming-Yuh Huang, Co-Chair (Northwest Security Institute)
Michael Losavio (University of Louisville)
Alec Yasinsac (University of South Alabama)
Robert F. Erbacher (Army Research Laboratory)
Wenke Lee (George Institute of Technology)
Barbara Endicott-Popovsky (University of Washington)
Roy Campbell (University of Illinois, Urbana/Champaign)
Yong Guan (Iowa State University)
General Chair: K.P. Chow, Hong Kong University
Program Committee Co-Chairs: Christopher (Cal) Lee, University of North Carolina
Adel Elmaghraby, University of Louisville
Submission Chair: Luciana Duranti, University of British Columbia
Sudhir Aggarwal Florida State University
Galina Borisevich Perm State University
Long Chen Chongqing University of Posts and Telecommunications
K.P. Chow University of Hong Kong
David Dampier Mississippi State University
Hervé Debar France Telecom R&D
Barbara Endicott-Popovsky University of Washington
Robert Erbacher Northwest Security Institute
Xinwen Fu UMass Lowell
Simson Garfinkel Naval Postgraduate School
Brad Glisson University of Glasgow
Yong Guan Iowa State University
Barbara Guttman National Institute for Standards and Technology (USA)
Brian Hay University of Alaska, Fairbanks
Jeremy John British Library
Ping Ji John Jay College Of Criminal Justice
Yu-Li Li Ministry of Justice Investigation Bureau, Taiwan
Pinxin Liu Renmin University of China Law School
Michael Losavio University of Louisville
Nasir Memon Polytechnic Institute of NYU
Mariofanna Milanova University of Arkansas at Little Rock
Kara Nance University of Alaska, Fairbanks
Ming Ouyang University of Louisville
Gilbert Peterson Air Force Institute of Technology
Slim Rekhis University of Carthage
Golden Richard University of New Orleans
Corinne Rogers University of British Columbia
Ahmed Salem Hood College
Clay Shields Georgetown University
Vrizlynn Thing Institute for Infocomm Research, Singapore
Sean Thorp Faculty of Engineering and Computing at University of Technology , Jamaica
William(Bill) Underwood Georgia Tech
Wietse Venema IBM Research
Xinyuan(Frank) Wang George Mason University
Kam Woods University of North Carolina
Yang Xiang Deakin University, Australia
Fei Xu Institute of Information Engineering, Chinese Academy of Sciences
Alec Yasinsac University of South Alabama
SM Yiu Hong Kong University
Wei Yu Towson University
Nan Zhang George Washington University
Michael Losavio, University of Louisville,
+1 502 852 3509
Cal Lee and Kam Woods (Principal Investigator and Technical Lead for the BitCurator Project) will be offering the new two-day version of the Digital Forensics for Archivists class in Ann Arbor, Michigan on June 24-25, 2013.
This is part of the Digital Archives Specialist (DAS) curriculum for the Society of American Archivists. Learn about the fundamentals of digital forensics, application to archival workflows, and the latest capabilities of the BitCurator environment.
Do you have born-digital collections that you’re grappling with? Old media with file-systems that you can’t read? Concerns about disseminating your collections because they might contain sensitive information? Have you created disk images but don’t yet have the ability to process that data on the images?
Or are you a developer who would like to tackle some real-world challenges that will directly benefit collecting institutions in caring for born-digital materials? Are you adept at developing and applying open-source software and would like to learn through hands-on experience how to apply various open-source digital forensics tools to collections?
If you answered “yes” to any of the above, then we have an event for you!
The Open Planets Foundation and the University of Chapel Hill’s School of Library and Information Science proudly presents:
The OPF Hackathon at UNC Chapel Hill:
Tackling Real-World Collection Challenges with Digital Forensics Tools and Methods
Monday, June 3rd-Wednesday, June 5th
Registration cost: $150 (REDUCED!)
*includes 3 lunches and 2 dinners
Come join world renowned digital preservation experts, collection managers, and coders as we collectively hack through digital preservation problems using a variety of digital forensics methods and approaches.
Our expert facilitators will be available to provide hands on guidance. We will also be presenting awards for best collection challenge and best technical solution!
This is the first OPF Hackathon taking place in the United States and we are thrilled to host you as we hack out solutions to common problems in born-digital collections.
We’re excited to announce the newest release of the DFXML TAG library, which contains tags for all fiwalk-generated output. The next release will contain tags for bulk extractor technical metadata and some additional file system metadata. Special thanks to Marty Gengenbach, now the Electronic Records Archivist at the Kansas Historical Society, who began compiling the TAG Library as a master’s student at UNC SILS.
Gengenbach, Martin J. “‘The Way We Do it Here”’ Mapping Digital Forensics Workflows in Collecting Institutions.” A Master’s Paper for the M.S. in L.S degree. August, 2012.
This paper presents the findings of semi-structured interviews with archivists and curators applying digital forensics tools and practices to the management of born-digital content. The interviews were designed to explore which digital forensic tools are in use, how they are implemented within a digital forensics workflow, and what further challenges and opportunities such use may present. Findings indicate that among interview participants these tools are beneficial in the capture and preservation of born-digital content, particularly with digital media such as external hard drives, and optical or floppy disks. However, interviews reveal that metadata generated from the use of such tools is not easily translated into the arrangement, description, and provision of access to born-digital content.
See especially Marty’s descriptions and graphical representations of the institutions’ workflows (pages 27-69).