DFRWSUSA 2018 July 15, 2018 to July 18, 2018, Rhode Island, USA

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Keynote Address Prof. Eugene Spafford , Captain Alfred N/A
Memory Forensics and the Windows Subsystem for Linux Andrew Case , Aisha Ali-gombe , Golden Richard Iii , Nathan Lewis The Windows Subsystem for Linux (WSL) was first included in the Anniversary Update of Microsoft's ...
Leveraging Relocations in Kernel ELF-binaries for Linux Kernel Version Identification Irfan Ahmed , Manish Bhatt Identification of operating system kernel version is essential in a large number of forensic and ...
Forensic Analysis of Multiple Device BTRFS Configurations Using The Sleuth Kit Paper Jan-niclas Hilgert , Martin Lambertz , Shujian Yang The analysis of file systems is a fundamental step in every forensic investigation. Long-known file ...
Reconstructing Streamed Video Content: A Case Study on YouTube and Facebook Live Stream Content in the Chrome Web Browser Cache Graeme Horsman With the increased popularity of online video streaming comes the risk of this technology's subsequent ...
Welcome pwn: Almond Smart Home Hub Forensics Iain Sutherland , Konstantinos Xynos , Huw Read , Akshay Awasthi Many home interactive sensors and networked devices are being branded as “Internet of Things” or ...
Experience Constructing the Artifact Genome Project (AGP): Managing the Domain's Knowledge One Artifact at a Time Frank Breitinger , Ibrahim Baggili , Devon Clark , Cinthya Grajeda Mendez , Laura Sanchez While various tools have been created to assist the digital forensics community with acquiring, processing, ...
IoT 4n6: The Growing Impact of IoT on Digital Forensics Jessica Hyde N/A
Was the 2016 Election Hacked? Your Forensic Expertise is Needed! Suzanne Mello-stark N/A
Automated Forensic Analysis of Mobile Applications on Android Devices Kun Yang , Tong Zhu , Fengguo Wei , Ting Chen , Xiaodong Lin It is not uncommon that mobile phones are involved in criminal activities, e.g., the surreptitious ...
DroidKex: Fast Extraction of Ephemeral TLS Keys from the Memory of Android Apps Hans Reiser , Benjamin Taubmann , Omar Al Abduljaleel Fast extraction of ephemeral data from the memory of a running process without affecting the ...
Digital Forensic Investigation of Two-Way Radio Communication Equipment and Services Mark Scanlon , Kim-kwang Raymond Choo , Arie Kouwen , Nhien Khac Historically, radio-equipment has solely been used as a two-way analogue communication device. Today, the use ...
Analyzing the DarkNetMarkets Subreddit for Evolutions of Tools and Trends Using LDA Topic Modeling Kyle Porter Darknet markets, which can be considered as online black markets, in general sell illegal items ...
Who Watches the Watcher? Detecting Hypervisor Introspection from Unprivileged Guests Mark Bridgman , Tomasz Tuzel , Joshua Zepf We present research on the limitations of detecting atypical activity by a hypervisor from the ...
Turbinia: Automation of Forensic Processing in the Cloud Thomas Chopitea , Aaron Peterson N/A
Drone Forensics Program Steve Watson N/A
Multinomial Malware Classification Via Low-level Features Sergii Banin , Geir Olav Dyrkolbotn Because malicious software or (”malware”) is so frequently used in a cyber crimes, malware detection ...
Deep Learning at the Shallow End: Malware Classification for Non-Domain Experts Mark Scanlon , Quan Le , Oisin Boydell Current malware detection and classification approaches generally rely on time consuming and knowledge intensive processes ...
CGC Monitor: A Vetting System for the DARPA Cyber Grand Challenge Timothy Vidas , Michael F. Thompson The DARPA Cyber Grand Challenge (CGC) pit autonomous machines against one another in a battle ...
Using Santa to Augment Forensic Investigations Gary Brown , James Nettesheim N/A
Damaged Device Forensics Steve Watson N/A
Adding APFS Support to The Sleuthkit Framework Joe Sylve N/A