IMF 2014 May 12, 2014 to May 14, 2014, Munster,Germany

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Welcome Rainer Böhme N/A
Challenges of Coordinated Linux and Android Intrusions Eoghan Casey Coordinated attacks against Linux/Android systems Advances in Linux/Android malware Convergence of Linux/Android threats Forensics and ...
The humming hum: background noise as a carrier of ENF artifacts in mobile device audio recordings Matthias Kirchner , Niklas Fechner N/A
AFAUC - anti-forensics of storage devices by alternative use of communication channels Harald Baier , Julian Knauer N/A
Capacity Building for Computer Emergency Response Teams Marco Thorbruegge Definition of baseline capabilities for national / governmental CERTs Capacity building for CERT via good ...
Wrap-Up Felix C. Freiling , Holger Morgenstern , Oliver Göbel N/A
Incident Response in Times of Cholera Klaus-peter Kossakowski Rules for incident response - and forensic related to incidents - have changed Incident response ...
Information Security Incident Management: Identified Practice in Large Organizations Karin Bernsmed , Maria b. Line , Cathrine Hove , Marte Tårnes N/A
Information security incident management: Planning for failure Maria b. Line , Inger Jaatun N/A
Current Challenges in Multimedia Forensics Thomas Gloe Imperfections at the interface between analogue and digital signals Forensic methods for image, video and ...
Post-Mortem Memory Analysis of Cold-Booted Android Devices Tilo Muller , Michael Spreitzenbarth , Christian Hilgers , Holger Macht N/A
Assuming a state of compromise. A best practise approach for SMEs on incident response management Ralph Noll , Alexander Harsch , Steffen Idler N/A
A model for types of internet-based communication (short talk) Jana Dittmann , Robert Altschaffel , Stefan Kiltz , Christian Krätzer N/A
Android App for First Response According to ISO/IEC 27037 Philipp Heischkamp , Fabian Adolphs ISO/IEC 27037 describes the steps that IT staff should follow in a first response. The ...
Dynamic Correlation of Digital Forensics Reports Christoph Beckmeyer The Direct Report Correlation Tool (DIRECT) is a research prototype that correlates data of different ...
Digital Forensics of RAM Images Using VOLIX II Patrick Bock "Volatility Interface and Extensions" (VOLIX) is a tool that provides better usability and additional functionality ...
Finding abandoned data in SQLite databases Martin Westmann Creating a new SQLlite database based on the freepages in SQLite databases.
Legal and Ethical Principles Graham Thornburrow-dobson Nature of Evidence Chain of Custody Rules of Procedure Role of Expert Witness Codes of ...