The Community for Technology Leaders
Systematic Approaches to Digital Forensic Engineering, IEEE International Workshop on (2011)
Oakland, California, USA
May 26, 2011 to May 26, 2011
ISBN: 978-0-7695-4642-1
TABLE OF CONTENTS
Papers

Protecting Digital Data Privacy in Computer Forensic Examination (Abstract)

S.M. Yiu , The University of Hong Kong, Hong Kong
Patrick P.F. Chan , The University of Hong Kong, Hong Kong
Michael Y.K. Kwan , The University of Hong Kong, Hong Kong
Pierre K.Y. Lai , The University of Hong Kong, Hong Kong
Frank Y.W. Law , The University of Hong Kong, Hong Kong
K.P. Chow , The University of Hong Kong, Hong Kong
Hayson K.S. Tse , The University of Hong Kong, Hong Kong
pp. 1-6

Secure Digital Chains of Evidence (Abstract)

Nicolai Kuntze , Fraunhofer Institute for Secure Information Technology (SIT)
Carsten Rudolph , Fraunhofer Institute for Secure Information Technology (SIT)
pp. 1-8

Fuzzy Trace Validation: Toward an Offline Forensic Tracking Framework (Abstract)

Stephen D. Wolthusen , Information Security Group, Royal Holloway, University of London, and Norwegian Information Security Laboratory, Gj⊘vik University
Saif Al-Kuwari , Information Security Group, Royal Holloway, University of London, and Department of Information and Research, Ministry of Foreign Affair
pp. 1-4

A Dual Cube Hashing Scheme for Solving LPP Integrity Problem (Abstract)

Zoe L. Jiang , School of Computer Science and Technology, Harbin Institute of Technology Shenzhen Graduate School, China
S. M. Yiu , Department of Computer Science, The University of Hong Kong, Hong Kong
Junbin Fang , Department of Computer Science, The University of Hong Kong, Hong Kong
K. P. Chow , Department of Computer Science, The University of Hong Kong, Hong Kong
Long Chen , Institute of Computer Science and Technology, Chongqing University of Posts and Telecommunications, China
Xiamu Niu , Faculty of Computer Science, Harbin Institute of Technology, China
Lucas C. K. Hui , Department of Computer Science, The University of Hong Kong, Hong Kong
pp. 1-7

Preparing for the Next Wikileaks: Making Forensics Techniques Work (Abstract)

Robert F. Erbacher , Senior Principal Scientist with the Northwest Security Institute
pp. 1-8

Computer Forensics And Electronic Evidence - Failure of Competent Computer Forensic Analysis And Other Computer-Related Acts As Ineffective Assistance Of Counsel (Abstract)

Deborah Wilson Keeling , Department of Justice Administration, University of Louisville
Michael Martin Losavio , Department of Justice Administration, University of Louisville
pp. 1-6

Firmware-assisted Memory Acquisition and Analysis tools for Digital Forensics (Abstract)

Angelos Stavrou , Center for Secure Information Systems, George Mason University
Fengwei Zhang , Center for Secure Information Systems, George Mason University
Jiang Wang , Center for Secure Information Systems, George Mason University
Kun Sun , Center for Secure Information Systems, George Mason University, Fairfax, VA
pp. 1-5

Case Study on South Africa and Namibia: A Model for Electronic Evidence for the SADC Region (Abstract)

Amelia Phillips , CIS and Computer Science Departments, Highline Community College
pp. 1-6

Host Identification via USB Fingerprinting (Abstract)

Joe Pletcher , Department of Computer and Information Science, University of Oregon, Eugene
Kevin Butler , Department of Computer and Information Science, University of Oregon, Eugene
Lara Letaw , Department of Computer and Information Science, University of Oregon, Eugene
pp. 1-9

Boundary Conditions for the Digital Forensic Use of Electronic Evidence and The Need for Forensic Counter-Analysis (Abstract)

Roman Yampolskiy , Department of Computer Engineering and Computer Science, University of Louisville, Louisville, KY
Michael M. Losavio , Department of Justice Administration, University of Louisville, Louisville, KY
Deborah Wilson Keeling , Department of Justice Administration, University of Louisville, Louisville, KY
Musa Hindi , Department of Computer Engineering and Computer Science, University of Louisville, Louisville, KY
pp. 1-6
105 ms
(Ver )