The Community for Technology Leaders
Systematic Approaches to Digital Forensic Engineering, IEEE International Workshop on (2011)
Oakland, California, USA
May 26, 2011 to May 26, 2011
ISBN: 978-0-7695-4642-1
TABLE OF CONTENTS

Practitioners' Challenges Panel: The Challenges and Opportunities of Forensic Investigation over Large Data Sets: Timeliness vs Precision vs Comprehensiveness (PDF)

Nan Zhang , The George Washington University
Yong Guan , Iowa State University
Michael M Losavio , University of Louisville
Peter Vasquez , VTX Communications
Robert M. Nissen , National Computer Security Center
Edward Talbot , Sandia National Laboratory
Vassil Roussev , University of New Orleans
pp. 1-3

Technical Issues of Forensic Investigations in Cloud Computing Environments (PDF)

Dominik Birk , Ruhr-University Bochum, Horst Goertz Institute for IT Security, Bochum, Germany
Christoph Wegener , Ruhr-University Bochum, Horst Goertz Institute for IT Security, Bochum, Germany
pp. 1-10

Characterizing Data Structures for Volatile Forensics (PDF)

Ellick Chan , Department of Computer Science, University of Illinois, Urbana-Champaign
Shivaram Venkataraman , Department of Computer Science, University of Illinois, Urbana-Champaign
Nadia Tkach , Department of Computer Science, University of Illinois, Urbana-Champaign
Kevin Larson , Department of Computer Science, University of Illinois, Urbana-Champaign
Alejandro Gutierrez , Graduate School of Library and Information Science, University of Illinois, Urbana-Champaign
Roy H. Campbell , Department of Computer Science, University of Illinois, Urbana-Champaign
pp. 1-9
Papers

A Dual Cube Hashing Scheme for Solving LPP Integrity Problem (Abstract)

Junbin Fang , Department of Computer Science, The University of Hong Kong, Hong Kong
Zoe L. Jiang , School of Computer Science and Technology, Harbin Institute of Technology Shenzhen Graduate School, China
S. M. Yiu , Department of Computer Science, The University of Hong Kong, Hong Kong
K. P. Chow , Department of Computer Science, The University of Hong Kong, Hong Kong
Lucas C. K. Hui , Department of Computer Science, The University of Hong Kong, Hong Kong
Long Chen , Institute of Computer Science and Technology, Chongqing University of Posts and Telecommunications, China
Xiamu Niu , Faculty of Computer Science, Harbin Institute of Technology, China
pp. 1-7

Preparing for the Next Wikileaks: Making Forensics Techniques Work (Abstract)

Robert F. Erbacher , Senior Principal Scientist with the Northwest Security Institute
pp. 1-8

Computer Forensics And Electronic Evidence - Failure of Competent Computer Forensic Analysis And Other Computer-Related Acts As Ineffective Assistance Of Counsel (Abstract)

Michael Martin Losavio , Department of Justice Administration, University of Louisville
Deborah Wilson Keeling , Department of Justice Administration, University of Louisville
pp. 1-6

Firmware-assisted Memory Acquisition and Analysis tools for Digital Forensics (Abstract)

Jiang Wang , Center for Secure Information Systems, George Mason University
Fengwei Zhang , Center for Secure Information Systems, George Mason University
Kun Sun , Center for Secure Information Systems, George Mason University, Fairfax, VA
Angelos Stavrou , Center for Secure Information Systems, George Mason University
pp. 1-5

Case Study on South Africa and Namibia: A Model for Electronic Evidence for the SADC Region (Abstract)

Amelia Phillips , CIS and Computer Science Departments, Highline Community College
pp. 1-6

Host Identification via USB Fingerprinting (Abstract)

Lara Letaw , Department of Computer and Information Science, University of Oregon, Eugene
Joe Pletcher , Department of Computer and Information Science, University of Oregon, Eugene
Kevin Butler , Department of Computer and Information Science, University of Oregon, Eugene
pp. 1-9

Building Open and Scalable Digital Forensic Tools (PDF)

Vassil Roussev , Department of Computer Science, University of New Orleans, New Orleans, LA
pp. 1-6
94 ms
(Ver 3.3 (11022016))