Computer Forensics

Title Speakers Conference Tags
Cracking And Analyzing Apple iCloud Protocols: iCloud Backups, Find My iPhone, Document Storage. Vladimir Katalov DeepSec-2013 - Vienna,Austria Computer Forensics Attack iCloud
Defeating Windows memory forensics Luka Milkovic Chaos Communication Congress-29 - Hamburg, Germany Computer Forensics Memory Acquisition Anti-forensics
The "WOW-Effect" - The whole dimension Christian Wojner Deepsec-2012 - Vienna, Austria Computer Forensics WOW64
Adding temporal component to memory forensics Endre Bangerter , Dominic Fischer Hashdays-2012 - Lucerne,Switzerland Computer Forensics Reverse Engineering Tool
ANDROID FORENSIC DEEP DIVE Bradley Schatz Breakpoint-2012 - Melbourne,Australia Android Computer Forensics YAFFS2
Simplifying RAM Forensics - A GUI and Extensions for the Volatility Framework Steffen Logen , Hans Hfken , Marko Schuba International Workshop on Digital Forensics-2012 - Prague, Czech Republic Computer Forensics Volatility Framework
CATCHING INSIDER DATA THEFT WITH STOCHASTIC FORENSICS Jonathan Grier BlackHat USA-2012 - Las Vegas, USA Computer Forensics
Attacking Is Easy, Defending Is Hard Walter Belgers OWASP BeNelux-2010 - Netherlands Security Computer Forensics Network Penetration Analysis
Windows 7 Forensics Anonymous Speaker BugCon-2010 - Mexico Security Computer Forensics Forensics
Connecting The Prime Minister To Routers Hillar Aarelaid CyberSec -2010 - Brussels, Belgium Security Computer Forensics Routing Intrusion Detection Incident Response Forensics
Resilience And Contingency Planning Peter Sommer CyberSec -2010 - Brussels, Belgium Security Computer Forensics Intrusion Detection Incident Response Cyberwar
Using Recursive Incentives To Win The Darpa Network Challenge Galen Pickard CollSec-2010 - Washington DC, USA Security Computer Forensics Infrastructure Computer Forensics Network Penetration
Bitflip: Determine A Data'S Signature Coverage From Within The Application Henrich Christopher Poehls OWASP Appsec-2010 - Stocholm, Sweden Security Computer Forensics Application Security Forensics
The Computer Forensic & Ediscovery Tools That Time Forgot Adam Daniel Ruxcon-2010 - Melbourne, Austrailia Computer Forensics
How To Do Real World Computer Forensics... And Not Get Burned Nick Klein Ruxcon-2010 - Melbourne, Austrailia Computer Forensics
Challenges in modern IT-forensics Bo Norgren SEC-T-2008 - Stockholm, Sweden Security Computer Forensics
Building A Global Early Warning System For Internet Attacks Elias Levy , Oliver Friedrichs Blackhat USA-2002 - Las Vegas, USA Computer Forensics Security
Neutralizing Nimda: Technical, Moral, And Legal Discussions Of An Automated Strike-Back Timothy ( Thor ) Mullen Blackhat USA-2002 - Las Vegas, USA Security Computer Forensics
Scene Of The Cybercrime: Assisting Law Enforcement In Tracking Down And Prosecuting Cybercriminals Debra Littlejohn Shinder Blackhat USA-2002 - Las Vegas, USA Security Computer Forensics
Phase Ii - 2Nd Generation Honeynet Technologies The Honeynet Project Blackhat USA-2002 - Las Vegas, USA Security Computer Forensics
Security Event Correlation – Security'S Holy Grail? Matthew Caldwell Blackhat USA-2002 - Las Vegas, USA Security Computer Forensics
Cisco Router Forensics Thomas Akin Blackhat USA-2002 - Las Vegas, USA Security Computer Forensics