Australian Digital Forensics Conference

Australian Digital Forensics Conference

 

Follow

Submissions from 2013

PDF

Towards An Automated Forensic Examiner (AFE) Based Upon Criminal Profiling & Artificial Intelligence, M Al Fahdi, N L. Clarke, and S M. Furnell

PDF

Security Of Internet Protocol Cameras – A Case Example, William Campbell

PDF

Volatile Memory Acquisition Tools – A Comparison Across Taint And Correctness, William Campbell

PDF

Verification Of Primitive Sub Ghz Rf Replay Attack Techniques Based On Visual Signal Analysis , Maxim Chernyshev

PDF

Acquisition Of Evidence From Network Intrusion Detection Systems, Brian Cusack and Muteb Alqahtani

PDF

Steganographic Checks In Digital Forensic Investigation: A Social Networking Case, Brian Cusack and Aimie Chee

PDF

Identifying Bugs In Digital Forensic Tools , Brian Cusack and Alain Homewood

PDF

Including Network Routers In Forensic Investigation, Brian Cusack and Raymond Lutui

PDF

Forensic Memory Dump Analysis And Recovery Of The Artefacts Of Using Tor Bundle Browser – The Need, Divya Dayalamurthy

PDF

Procedures And Tools For Acquisition And Analysis Of Volatile Memory On Android Smartphones , Andri P. Heriyanto

PDF

Security Analysis And Forensic Investigation Of Home & Commercial Alarm Systemsin New Zealand: Current Research Findings, Alastair Nisbet and Maria Kim

PDF

A Forensic Analysis And Comparison Of Solid State Drive Data Retention With Trim Enabled File Systems , Alastair Nisbet, Scott Lawrence, and Matthew Ruff

PDF

Robust Watermarking Method By Systematic Block Diffusion Using Discrete Cosine Transform, Kazuo Ohzeki, Kazutaka Bannai, Yutaka Hirakawa, and Kiyotsugu Sato

PDF

An Investigation Into The Efficiency Of Forensic Data Erasure Tools For Removable Usb Flash Memory Storage Devices, Krishnun Sansurooah, Haydon Hope, Hani Almutairi, Fayadh Alnazawi, and Yunhan Jiang

PDF

Sellers Continue to Give Away Confidential Information on Second Hand Memory Cards Sold in Australia, Patryk Szewczyk, Nikki Robins, and Krishnun Sansurooah

PDF

Patterns and Patter - An Investigation into SSH Activity Using Kippo Honeypots, Craig Valli, Priya Rabadia, and Andrew Woodward

Submissions from 2012

PDF

Forensic Readiness for Wireless Medical Systems, Brian Cusack and Ar Kar Kyaw

PDF

Secure Key Deployment and Exchange Protocol for Manet Information Management, Brian Cusack and Alastair Nisbet

PDF

Evidence Examination Tools for Social Networks, Brian Cusack and Jung Son

PDF

What is the Proper Forensics Approach on Trojan Banking Malware Incidents?, Andri P. Heriyanto

PDF

The 2012 Analysis of Information Remaining on Computer Hard Disks Offered for Sale on the Second Hand Market in the UAE, Andy Jones, Thomas Martin, and Mohammed Alzaabi

PDF

The 2012 Investigation into Remnant Data on Second Hand Memory Cards Sold in Australia, Patryk Szewczyk and Krishnun Sansurooah

PDF

Eavesdropping on the Smart Grid, Craig Valli, Andrew Woodward, Clinton Carpene, Peter Hannay, Murray Brand, Reino Karvinen, and Christopher Holme

Submissions from 2011

PDF

Guidelines for the digital forensic processing of smartphones, Khawla Abdulla Alghafli, Andrew Jones, and Thomas Anthony Martin

PDF

Forensic recovery and analysis of the artefacts of crimeware toolkits, Murray Brand

PDF

Looking to iPhone backup files for evidence extraction, Clinton Carpene

PDF

Information leakage through second hand USB flash drives within the United Kingdom, Widya Chaerani, Nathan Clarke, and Christopher Bolan

PDF

Tracing sources of DOS and DDOS attack: evidential recovery, Brian Cusack and Cary Ho

PDF

Systems architecture for the acquisition and preservation of wireless network traffic, Brian Cusack and Thomas Laurenson

PDF

Acquisition of digital evidence in android smartphones, Andre Morum de L. Simao, Fabio Caus Sicoli, Laerte Peotta de Melo, and Rafael Timoteo de Sousa Junior

PDF

Visualising forensic data: investigation to court, Ken Fowle and Damian Schofield

PDF

Organisational preparedness for hosted virtual desktops in the context of digital forensics, Nirbhay Jawale and Ajit Narayanan

PDF

Component technologies for e-discovery and prototyping of suit-coping system, Youngsoo Kim and Dowon Hong

PDF

An evaluation of data erasing tools, Thomas Martin and Andrew Jones

PDF

Can current packet analysis software detect BitTorrent activity or extract files from BTP and μTP traffic streams?, William Pung and Andrew Woodward

PDF

Forensic analysis of the android file system YAFFS2, Darren Quick and Mohammed Alzaabi

PDF

Data remanence in New Zealand: 2011, Dax Roberts and H B. Wolfe

PDF

Forensic investigation method and tool based on the user behaviour analysis, Namheun Son and Sangjin Lee

PDF

A 2011 investigation into remnant data on second hand memory cards sold in Australia, Patryk Szewczyk and Krishnun Sansurooah

Submissions from 2010

PDF

Forensic Analysis of the Windows 7 Registry, Khawla Abdulla Alghafli, Andrew Jones, and Thomas Anthony Martin

PDF

The 2010 Personal Firewall Robustness Evaluation, Satnam Singh Bhamra

PDF

Lessons Learned from an Investigation into the Analysis Avoidance Techniques of Malicious Software, Murray Brand, Craig Valli, and Andrew Woodward

PDF

Malware Forensics: Discovery of the Intent of Deception , Murray Brand, Craig Valli, and Andrew Woodward

PDF

An Investigation into the Efficacy of Three Erasure Tools under Windows 7 , Cheng Toy Chiang, Kelvin Triton, and Andrew Woodward

PDF

Evidential Recovery in a RFID Business System, Brian Cusack and Ar Kar Ayaw

PDF

Cyber Forensics Assurance, Glenn S. Dardick

PDF

The Science, The Technology, The Law , Ken Fowle

PDF

Fireguard - A Secure Browser with Reduced Forensic Footprint , Don Griffiths and Peter James

PDF

The 2009 Analysis of Information Remaining on Disks Offered for Sale on the Second Hand Market , Andy Jones, Craig Valli, Glenn S. Dardick, Iain Sutherland, G. Dabibi, and Gareth Davies

PDF

Remote Access Forensics for VNC and RDP on Windows Platform, Paresh Kerai

PDF

Avoiding Sanctions at the E-Discovery Meet-And-Confer in Common Law Countries, Milton Luoma and Vicki Luoma

PDF

Digital Forensics Analysis of Spectral Estimation Methods , Tolga Mataracioglu and Unal Tatar

PDF

Does the use of MIMO Technology used by 802.11n Reduce or Increase the Impact of Denial of Service Attacks?, William Pung and Andrew Woodward

PDF

Towards an Automated Digital Data Forensic Model with specific reference to Investigation Processes , Johan Scholtz and Ajit Narayanan

PDF

Zombie Hard disks - Data from the Living Dead , Iain Sutherland, Gareth Davies, Andy Jones, and Andrew J. C. Blyth

PDF

An Analysis of Malfeasant Activity Directed at a VoIP Honeypot , Craig Valli

PDF

Development, Delivery and Dynamics of a Digital Forensics Subject , Tanveer A. Zia

Submissions from 2009

PDF

Theory and practice of flash memory mobile forensics, Salvatore Fiorillo

PDF

Secure State Deletion: Testing the efficacy and integrity of secure deletion tools on Solid State Drives, Michael Freeman and Andrew Woodward

PDF

SmartPot: Creating a 1st Generation Smartphone Honeypot, Michael Freeman and Andrew Woodward

PDF

Satellite Navigation Forensics Techniques, Peter Hannay

PDF

Zubulake: The Catalyst for Change in eDiscovery, Penny Herickhoff and Vicki M. Luoma

PDF

The 2009 Analysis of Information Remaining on USB Storage Devices Offered for Sale on the Second Hand Market, Andy Jones, Craig Valli, and G. Dabibi

PDF

Qualcomm v. Broadcom: Implications for Electronic Discovery, Milton H. Luoma and Vicki M. Luoma

PDF

Cybercrime Attribution: An Eastern European Case Study, Stephen McCombie, Josef Pieprzyk, and Paul Watters

PDF

A forensics overview and analysis of USB flash memory devices, Krishnun Sansurooah

PDF

ADSL Router Forensics Part 2: Acquiring Evidence, Patryk Szewczyk

PDF

Automatic detection of child pornography, Glen Thompson

PDF

The not so smart, smart grid: Potential security risks associated with the deployment of smart grid technologies, Craig Valli

Submissions from 2008

PDF

iPhone Forensics Methodology and Tools, Haitham AL-Hajri and Krishnun Sansurooah

PDF

Digital forensics and the legal system: A dilemma of our times, James Tetteh Ami-Narh and Patricia A.H. Williams

PDF

Validating digital evidence for legal argument, Richard Boddington, Valerie Hobbs, and Graham Mann

PDF

Survey and future trends of efficient cryptographic function implementations on, Adrian Boeing

PDF

Forensic Acquisition and Analysis of the TomTom One Satellite Navigation Unit, Peter Hannay

PDF

Preventing the Acquisition of Data from Virtual Machine based Secure Portable Execution Environments, Peter James

PDF

Extraction of User Activity through Comparison of Windows Restore Points, Damir Kahvedžić and Tahar Kechadi

PDF

Trouble in Florida: The Genesis of Phishing attacks on Australian Banks, Stephen McCombie

PDF

Data recovery from PalmmsgV001, Satheesaan Pasupatheeswaran

PDF

Email 'Message-IDs' helpful for forensic analysis?, Satheesaan Pasupatheeswaran

PDF

Data Hiding in Windows Executable Files, DaeMin Shin, Yeog Kim, KeunDuck Byun, and SangJin Lee

PDF

Subverting National Internet Censorship - An Investigation into existing Tools and Techniques, Jason Smart, Kyle Tedeschi, Daniel Meakins, Peter Hannay, and Christopher Bolan

PDF

Industrial Espionage from Residual Data: Risks and Countermeasures, Iain Sutherland

PDF

Malware, Viruses and Log Visualisation, Iain Swanson

PDF

Virtual Environments Support Insider Security Violations, Iain Swanson and Patricia A.H. Williams

PDF

Malware Detection and Removal: An examination of personal anti-virus software, Patryk Szewczyk and Murray Brand

PDF

The Impact of U3 Devices on Forensic Analysis, R. Tank and Patricia A.H. Williams

PDF

Issues common to Australian critical infrastructure providers SCADA networks discovered through computer and network vulnerability analysis, Craig Valli

PDF

The Malware Analysis Body of Knowledge (MABOK), Craig Valli

PDF

The 2008 Australian study of remnant data contained on 2nd hand hard disks: the saga continues, Craig Valli and Andrew Woodward

Submissions from 2007

PDF

The effectiveness of investigative tools for Secure Digital (SD) Memory Card forensics, Haitham Al-Hajri and Patricia Williams

PDF

Extracting Inter-arrival Time Based Behaviour from Honeypot Traffic using Cliques, Saleh Almotairi, Andrew Clark, Marc Dacier, Corrado Leita, George Mohay, Van Hau Pham, Olivier Thonnard, and Jacob Zimmermann

PDF

Introduction to Mobile Phone Flasher Devices and Considerations for their Use in Mobile Phone Forensics, Marwan Al-Zarouni

PDF

A Proof-of-Concept Project for Utilizing U3 Technology in Incident Response, Marwan Al-Zarouni and Haitham Al-Hajri

PDF

ID Theft: A Computer Forensics' Investigation Framework, Olga Angelopoulou

PDF

Mood 300 IPTV decoder forensics, An An Hilven

PDF

Managing Digital Forensic Knowledge An Applied Approach, David P. Biros, Mark Weiser, and John Witfield

PDF

Forensic Analysis Avoidance Techniques of Malware, Murray Brand

PDF

BLOGS: ANTI-FORENSICS and COUNTER ANTI-FORENSICS, Glenn S. Dardick, Claire R. La Roche, and Mary A. Flanigan

PDF

Pocket SDV with SDGuardian: A Secure & Forensically Safe Portable Execution Environment, Peter Hannay and Peter James

PDF

A forensically tested tool for identification of notebook computers to aid recovery: LIARS phase I proof of concept, Peter Hannay, Andrew Woodward, and Nic Cope