Australian Digital Forensics Conference

Australian Digital Forensics Conference

 

Follow

Submissions from 2015

PDF

Mobile device damage and the challenges to the modern investigator, Dan Blackman

PDF

The challenges of seizing and searching the contents of Wi-Fi devices for the modern investigator, Dan Blackman and Patryk Szewczyk

PDF

An overview of bluetooth device discovery and fingerprinting techniques – assessing the local context, Maxim Chernyshev

PDF

Security assessment of IoT devices: The case of two smart TVs, Maxim Chernyshev and Peter Hannay

PDF

Steganography as a threat – fairytale or fact?, Tom Cleary

PDF

Mining social networking sites for digital evidence, Brian Cusack and Saud Alshaifi

PDF

Improving the detection and validation of inland revenue numbers, Henry Gee, Thomas Laurenson, and Hank Wolfe

PDF

Comparison of Live Response, Linux Memory Extractor (LiME) and Mem tool for acquiring android’s volatile memory in the malware incident, Andri Heriyanto, Craig Valli, and Peter Hannay

PDF

Image similarity using dynamic time warping of fractal features, Ahmed Ibrahim and Craig Valli

PDF

Cyber Black Box: Network intrusion forensics system for collecting and preserving evidence of attack, Jong-Hyun Kim, Joo-Young Lee, Yangseo Choi, Sunoh Choi, and Ik-kyun Kim

PDF

Towards a standardised strategy to collect and distribute application software artifacts, Thomas Laurenson, Stephen MacDonell, and Hank Wolfe

PDF

Cyber Blackbox for collecting network evidence, Jooyoung Lee, Sunoh Choi, Yangseo Choi, Jonghyun Kim, Ikkyun Kim, and Youngseok Lee

PDF

Analysis into developing accurate and efficient intrusion detection approaches, Priya Rabadia and Craig Valli

PDF

File system modelling for digital triage: An inductive profiling approach, Benjamin Rice and Benjamin Turnbull

PDF

The spy in your pocket: Smartphones and geo-location data, Krishnun Sansurooah and Bradley Keane

PDF

Mapping the laws which apply to intercepting wireless communications in a Western Australian legal context, Craig Valli

Submissions from 2014

PDF

A forensically-enabled IAAS cloud computing architecture, Saad Alqahtany, Nathan Clarke, Steven Furnell, and Christoph Reich

PDF

Rapid forensic crime scene analysis using inexpensive sensors, Dan Blackman

PDF

Locational wireless and social media-based surveillance, Maxim Chernyshev

PDF

The zombies strike back: Towards client-side BeEFdetection, Maxim Chernyshev and Peter Hannay

PDF

Listening to botnet communication channels to protect information systems, Brian Cusack and Sultan Almutairi

PDF

Up-dating investigation models for smart phone procedures, Brian Cusack and Raymond Lutui

PDF

Forensic examination and analysis of the Prefetch files on the banking Trojan malware incidents, Andri P. Heriyanto

PDF

The impact of custom ROM backups on android external storage erasure, Haydon Hope and Peter Hannay

PDF

Suitability of lacunarity measure for blind steganalysis, Ahmed Ibrahim

PDF

A user-oriented network forensic analyser: The design of a high-level protocol analyser, D Joy, F Li, N L. Clarke, and S M. Furnell

PDF

Finding evidence of wordlists being deployed against SSH honeypots – implications and impacts, Priya Rabadia and Craig Valli

PDF

12th Australian Digital Forensics Conference, 2014, Edith Cowan University: conference details, Security Research Institute, Edith Cowan University

PDF

A forensic overview of the LG Smart TV, Iain Sutherland, Konstantino Xynos, Huw Read, Andy Jones, and Tom Drange

PDF

Towards a set of metrics to guide the generation of fake computer file systems, Ben Whitham

Submissions from 2013

PDF

Towards An Automated Forensic Examiner (AFE) Based Upon Criminal Profiling & Artificial Intelligence, M Al Fahdi, N L. Clarke, and S M. Furnell

PDF

Security Of Internet Protocol Cameras – A Case Example, William Campbell

PDF

Volatile Memory Acquisition Tools – A Comparison Across Taint And Correctness, William Campbell

PDF

Verification Of Primitive Sub Ghz Rf Replay Attack Techniques Based On Visual Signal Analysis , Maxim Chernyshev

PDF

Acquisition Of Evidence From Network Intrusion Detection Systems, Brian Cusack and Muteb Alqahtani

PDF

Steganographic Checks In Digital Forensic Investigation: A Social Networking Case, Brian Cusack and Aimie Chee

PDF

Identifying Bugs In Digital Forensic Tools , Brian Cusack and Alain Homewood

PDF

Including Network Routers In Forensic Investigation, Brian Cusack and Raymond Lutui

PDF

Forensic Memory Dump Analysis And Recovery Of The Artefacts Of Using Tor Bundle Browser – The Need, Divya Dayalamurthy

PDF

Procedures And Tools For Acquisition And Analysis Of Volatile Memory On Android Smartphones , Andri P. Heriyanto

PDF

Security Analysis And Forensic Investigation Of Home & Commercial Alarm Systemsin New Zealand: Current Research Findings, Alastair Nisbet and Maria Kim

PDF

A Forensic Analysis And Comparison Of Solid State Drive Data Retention With Trim Enabled File Systems , Alastair Nisbet, Scott Lawrence, and Matthew Ruff

PDF

Robust Watermarking Method By Systematic Block Diffusion Using Discrete Cosine Transform, Kazuo Ohzeki, Kazutaka Bannai, Yutaka Hirakawa, and Kiyotsugu Sato

PDF

An Investigation Into The Efficiency Of Forensic Data Erasure Tools For Removable Usb Flash Memory Storage Devices, Krishnun Sansurooah, Haydon Hope, Hani Almutairi, Fayadh Alnazawi, and Yunhan Jiang

PDF

Sellers Continue to Give Away Confidential Information on Second Hand Memory Cards Sold in Australia, Patryk Szewczyk, Nikki Robins, and Krishnun Sansurooah

PDF

Patterns and Patter - An Investigation into SSH Activity Using Kippo Honeypots, Craig Valli, Priya Rabadia, and Andrew Woodward

Submissions from 2012

PDF

Forensic Readiness for Wireless Medical Systems, Brian Cusack and Ar Kar Kyaw

PDF

Secure Key Deployment and Exchange Protocol for Manet Information Management, Brian Cusack and Alastair Nisbet

PDF

Evidence Examination Tools for Social Networks, Brian Cusack and Jung Son

PDF

What is the Proper Forensics Approach on Trojan Banking Malware Incidents?, Andri P. Heriyanto

PDF

The 2012 Analysis of Information Remaining on Computer Hard Disks Offered for Sale on the Second Hand Market in the UAE, Andy Jones, Thomas Martin, and Mohammed Alzaabi

PDF

The 2012 Investigation into Remnant Data on Second Hand Memory Cards Sold in Australia, Patryk Szewczyk and Krishnun Sansurooah

PDF

Eavesdropping on the Smart Grid, Craig Valli, Andrew Woodward, Clinton Carpene, Peter Hannay, Murray Brand, Reino Karvinen, and Christopher Holme

Submissions from 2011

PDF

Guidelines for the digital forensic processing of smartphones, Khawla Abdulla Alghafli, Andrew Jones, and Thomas Anthony Martin

PDF

Forensic recovery and analysis of the artefacts of crimeware toolkits, Murray Brand

PDF

Looking to iPhone backup files for evidence extraction, Clinton Carpene

PDF

Information leakage through second hand USB flash drives within the United Kingdom, Widya Chaerani, Nathan Clarke, and Christopher Bolan

PDF

Tracing sources of DOS and DDOS attack: evidential recovery, Brian Cusack and Cary Ho

PDF

Systems architecture for the acquisition and preservation of wireless network traffic, Brian Cusack and Thomas Laurenson

PDF

Acquisition of digital evidence in android smartphones, Andre Morum de L. Simao, Fabio Caus Sicoli, Laerte Peotta de Melo, and Rafael Timoteo de Sousa Junior

PDF

Visualising forensic data: investigation to court, Ken Fowle and Damian Schofield

PDF

Organisational preparedness for hosted virtual desktops in the context of digital forensics, Nirbhay Jawale and Ajit Narayanan

PDF

Component technologies for e-discovery and prototyping of suit-coping system, Youngsoo Kim and Dowon Hong

PDF

An evaluation of data erasing tools, Thomas Martin and Andrew Jones

PDF

Can current packet analysis software detect BitTorrent activity or extract files from BTP and μTP traffic streams?, William Pung and Andrew Woodward

PDF

Forensic analysis of the android file system YAFFS2, Darren Quick and Mohammed Alzaabi

PDF

Data remanence in New Zealand: 2011, Dax Roberts and H B. Wolfe

PDF

Forensic investigation method and tool based on the user behaviour analysis, Namheun Son and Sangjin Lee

PDF

A 2011 investigation into remnant data on second hand memory cards sold in Australia, Patryk Szewczyk and Krishnun Sansurooah

Submissions from 2010

PDF

Forensic Analysis of the Windows 7 Registry, Khawla Abdulla Alghafli, Andrew Jones, and Thomas Anthony Martin

PDF

The 2010 Personal Firewall Robustness Evaluation, Satnam Singh Bhamra

PDF

Lessons Learned from an Investigation into the Analysis Avoidance Techniques of Malicious Software, Murray Brand, Craig Valli, and Andrew Woodward

PDF

Malware Forensics: Discovery of the Intent of Deception , Murray Brand, Craig Valli, and Andrew Woodward

PDF

An Investigation into the Efficacy of Three Erasure Tools under Windows 7 , Cheng Toy Chiang, Kelvin Triton, and Andrew Woodward

PDF

Evidential Recovery in a RFID Business System, Brian Cusack and Ar Kar Ayaw

PDF

Cyber Forensics Assurance, Glenn S. Dardick

PDF

The Science, The Technology, The Law , Ken Fowle

PDF

Fireguard - A Secure Browser with Reduced Forensic Footprint, Don Griffiths and Peter James

PDF

The 2009 Analysis of Information Remaining on Disks Offered for Sale on the Second Hand Market , Andy Jones, Craig Valli, Glenn S. Dardick, Iain Sutherland, G. Dabibi, and Gareth Davies

PDF

Remote Access Forensics for VNC and RDP on Windows Platform, Paresh Kerai

PDF

Avoiding Sanctions at the E-Discovery Meet-And-Confer in Common Law Countries, Milton Luoma and Vicki Luoma

PDF

Digital Forensics Analysis of Spectral Estimation Methods , Tolga Mataracioglu and Unal Tatar

PDF

Does the use of MIMO Technology used by 802.11n Reduce or Increase the Impact of Denial of Service Attacks?, William Pung and Andrew Woodward

PDF

Towards an Automated Digital Data Forensic Model with specific reference to Investigation Processes , Johan Scholtz and Ajit Narayanan

PDF

Zombie Hard disks - Data from the Living Dead , Iain Sutherland, Gareth Davies, Andy Jones, and Andrew J. C. Blyth

PDF

An Analysis of Malfeasant Activity Directed at a VoIP Honeypot , Craig Valli

PDF

Development, Delivery and Dynamics of a Digital Forensics Subject , Tanveer A. Zia

Submissions from 2009

PDF

Theory and practice of flash memory mobile forensics, Salvatore Fiorillo

PDF

Secure State Deletion: Testing the efficacy and integrity of secure deletion tools on Solid State Drives, Michael Freeman and Andrew Woodward

PDF

SmartPot: Creating a 1st Generation Smartphone Honeypot, Michael Freeman and Andrew Woodward

PDF

Satellite Navigation Forensics Techniques, Peter Hannay

PDF

Zubulake: The Catalyst for Change in eDiscovery, Penny Herickhoff and Vicki M. Luoma

PDF

The 2009 Analysis of Information Remaining on USB Storage Devices Offered for Sale on the Second Hand Market, Andy Jones, Craig Valli, and G. Dabibi

PDF

Qualcomm v. Broadcom: Implications for Electronic Discovery, Milton H. Luoma and Vicki M. Luoma

PDF

Cybercrime Attribution: An Eastern European Case Study, Stephen McCombie, Josef Pieprzyk, and Paul Watters

PDF

A forensics overview and analysis of USB flash memory devices, Krishnun Sansurooah

PDF

ADSL Router Forensics Part 2: Acquiring Evidence, Patryk Szewczyk

PDF

Automatic detection of child pornography, Glen Thompson

PDF

The not so smart, smart grid: Potential security risks associated with the deployment of smart grid technologies, Craig Valli

Submissions from 2008

PDF

iPhone Forensics Methodology and Tools, Haitham AL-Hajri and Krishnun Sansurooah