The Community for Technology Leaders
Systematic Approaches to Digital Forensic Engineering, IEEE International Workshop on (2005)
Taipei, Taiwan
Nov. 7, 2005 to Nov. 9, 2005
ISBN: 0-7695-2478-8
TABLE OF CONTENTS

Preface (PDF)

pp. vii

Computer forensics, information security and law: a case study (Abstract)

A. Herath , Comput. Sci. & Inf. Syst. Dept., Richard Stockton State Coll., Newark, NJ, USA
S. Herath , Comput. Sci. & Inf. Syst. Dept., Richard Stockton State Coll., Newark, NJ, USA
pp. 135-141
Introductions

Committees (PDF)

pp. ix
Keynote Address I

United States v Gorshkov Detailed Forensics and Case Study; Expert Witness Perspective (Abstract)

Philip Attfield , Northwest Security Institute, Seattle, Washington, U.S.A.
pp. 3-26
Session 1: Digital Forensic Engineering Process and Standards

Unifying Computer Forensics Modeling Approaches: A Software Engineering Perspective (Abstract)

A. Chris Bogen , US Army Corps of Engineers, Vicksburg, MS
David A. Dampier , Mississippi State University
pp. 27-39

Standardizing the Construction of a Digital Forensics Laboratory (Abstract)

George Yee , National Research Council Canada
Patrick S. Chen , Tatung University,Taiwan
Ying-Chieh Chen , Chiao-Tung University, Taiwan
Lawrence M. F. Tsai , Criminal Investigation Bureau, Taiwan
pp. 40-47

Digital Forensics: Exploring Validation, Verification and Certification (Abstract)

Tom Wilsdon , University of South Australia
Jill Slay , University of South Australia
pp. 48-55

Establishment of the Standard Operating Procedure (SOP) for Gathering Digital Evidence (Abstract)

I. L. Lin , MIS, Central Police University, Taiwan
Tzong-chen Wu , MIS, National Taiwan University of Science and Technology
Abe C. , EDBA, National Taiwan University of Science and Technology
T. H. Lan , Taipei Police Bureau, Taiwan
pp. 56-68
Session 2: Tools and Investigation Methodologies

The Use of Packet Inter-Arrival Times for Investigating Unsolicited Internet Traffic (Abstract)

Andrew Clark , Andrew Clark
George Mohay , George Mohay
Marc Dacier , Marc Dacier
Fabien Pouget , Fabien Pouget
Jacob Zimmermann , Jacob Zimmermann
pp. 89-104

SIMbrush: an Open Source Tool for GSM and UMTS Forensics Analysis (Abstract)

Paolo Gubian , University of Brescia, Italy
Antonio Savoldi , University of Brescia, Italy
Fabio Casadei , University of Brescia, Italy
pp. 105-119

Comparative Survey of Local Honeypot Sensors to Assist Network Forensics (Abstract)

M. Dacier , Institut Eurecom Sophia-Antipolis, France
F. Pouget , Institut Eurecom Sophia-Antipolis, France
P.T. Chen , National Cheng Kung University Tainan, Taiwan
C.S. Laih , National Cheng Kung University Tainan, Taiwan
pp. 120-134
Session 3: Evidence Analysis and Case Construction

Computer Forensics, Information Security and Law: A Case Study (Abstract)

J. Herath , St. Cloud State University, St. Cloud, MN
Prasantha Samarasinghe , St. Cloud State University, St. Cloud, MN
Susantha Herath , St. Cloud State University, St. Cloud, MN
S. Herath , Richard Stockton State College of New Jersey, NJ
A. Herath , Richard Stockton State College of New Jersey, NJ
pp. 135-141

Legal Requirements for the Use of Keystroke Loggers (Abstract)

Charles W. Adams , University of Tulsa College of Law
pp. 142-154
Keynote Address III
Keynote Address IV

Technical Challenges and Directions for Digital Forensics (Abstract)

George Mohay , Queensland University of Technology Brisbane, Australia
pp. 155-164
Session 4: Legal Issues: Evidences, Cases and Prosecution

Evidence Handling in Proactive Cyberstalking Investigations: The PAPA Approach (Abstract)

L. Kermes , Florida State University, Tallahassee, FL
J. Mulholland , Florida State University, Tallahassee, FL
P. Henry , Florida State University, Tallahassee, FL
S. Aggarwal , Florida State University, Tallahassee, FL
pp. 165-176
Session 5: Cyber Investigation Systems

Digital Evidence Search Kit (Abstract)

W.W. Tsang , University of Hong Kong
K.Y. Lai , University of Hong Kong
K. H. Pun , University of Hong Kong
L.C.K. Hui , University of Hong Kong
H.W. Chan , University of Hong Kong
C.F. Chong , University of Hong Kong
K.P. Chow , University of Hong Kong
pp. 187-194

Anti-Cyberstalking: The Predator and Prey Alert (PAPA) System (Abstract)

M. Burmester , Florida State University, Tallahassee, FL
L. Kermes , Florida State University, Tallahassee, FL
S. Aggarwal , Florida State University, Tallahassee, FL
P. Henry , Florida State University, Tallahassee, FL
J. Mulholland , Florida State University, Tallahassee, FL
pp. 195-205

Challenges of Automating the Detection of Paedophile Activity on the Internet (Abstract)

George Mohay , Queensland University of Technology, Brisbane, Australia
Lyta Penna , Queensland University of Technology, Brisbane, Australia
Andrew Clark , Queensland University of Technology, Brisbane, Australia
pp. 206-222
Session 6: Integrity and Preservation of Data/Evidences

A DCT Quantization-Based Image Authentication System for Digital Forensics (Abstract)

I-Chuan Chang Bor-Wen Hsu , National Cheng Kung University Tainan,TAIWAN
Chi Sung Laih , National Cheng Kung University Tainan,TAIWAN
pp. 223-235

Digital evidence collection process in integrity and memory information gathering (Abstract)

Seokhee Lee , Graduate School of Information Security in Korea University
Sangjin Lee , Graduate School of Information Security in Korea University
Jongin Lim , Graduate School of Information Security in Korea University
Hyunsang Kim , Graduate School of Information Security in Korea University
pp. 236-247

SecSyslog: an Approach to Secure Logging Based on Covert Channels (Abstract)

Michele Zambelli , IRItaly (Incident Response Italy) project
Dario V. Forte , University of Milano at Crema
Cristiano Maruti , IRItaly (Incident Response Italy) project
Michele R. Vetturi , IRItaly (Incident Response Italy) project
pp. 248-263

Detecting Digital Tampering by Blur Estimation (Abstract)

Soo-Chang Pei , National Taiwan University
Dun-Yu Hsiao , National Taiwan University
pp. 264-278
Author Index

Author Index (PDF)

pp. 279
59 ms
(Ver )