Call for Papers

We are using EasyChair as the submission and review system. Over the past a few years, SADFE has had a great experience with EasyChair. Submissions should be made at: https://easychair.org/my/conference?conf=sadfe2020

Review Process

Papers will be double-blind reviewed using the EasyChair Submission system. Each paper will receive no less than three professional peer reviews with results used for acceptance determination.


Submissions Guidelines


Paper submissions:

All paper submissions must be original work; authors must dearly document any overlap with previously published or simultaneously submitted papers from any of the authors. We are looking for submissions of 5 to 10 pages, excluding references and supplementary materials using the IEEE transactions format. Papers must be formatted for US letter (not A4) size paper. The text must be formatted in a two-column layout, with columns no more than 9.5 in tall and 3.5 in wide. The text must be in Times font, 10-point or larger, with 11-point or larger line spacing. Authors are encouraged to use the IEEE conference proceedings templates. LaTeX submissions should use IEEEtran.cls version 1.8. All submissions will be automatically checked for conformance to these requirements. Failure to adhere to the page limit and formatting requirements are grounds for rejection without review.

We encourage authors to submit papers of appropriate length for the research contribution. If your research contributions only requires 5-7 pages, please only submit 5-7 pages (plus references). Shorter papers with be reviewed like any other paper and not penalized. Papers shorter than 5 pages or longer than 10 pages {excluding references) will not be considered. Submitting supplementary material that adds depth to the contribution and/or contributes to the submission's replicability is strongly encouraged. Reviewing will be double blind.  

Papers must be submitted in a form suitable for anonymous review: no author names or affiliations may appear on the title page, and papers should avoid revealing their identity in the text. When referring to your previous work, do so in the third person, as though it were written by someone else. Only blind the reference itself in the (unusual) case that a third-person reference is infeasible. Publication as a technical report or in an online repository does not constitute a violation of this policy. Contact the program chairs if you have any questions. Papers that are not properly anonymized may be rejected without review.

Poster proposals:

We encourage submission of poster proposals for a chance to present your work in an interactive manner in front of an international audience of forensics security experts from industry, government, and academia. Posters can cover preliminary or exploratory work, smaller research projects, projects that are showing promising results but aren't quite ready for a full publication, or any other work that would benefit from discussion in this sort of an open forum. Topics of interest are the same as those for papers. We are looking for posters that address just about any current digital forensics topic. We are particularly interested in work that shares real-life experiences including actual system or product implementation, deployment, and lessons learned. Poster proposals should be at most 2 pages in length and should briefly describe the objectives of the current work, any accomplishments to date, and future plans. Poster proposal submissions should not be anonymized, so please make sure you include author information (name, affiliation, country) in your proposal. If accepted, you are expected to attend the poster session and stand by their poster (1-2 hours). Posters are not considered to be a prior publication.

Panel proposals:

We encourage submission of panels on the topics suggested below. A panel submission should be 1 page (US letter) in PDF format, listing the panel moderator and affiliation, as well as potential panelists and the panel topic. Length of a panel is typically 1 hour. Panel submissions should not be anonymized.

Tutorial proposals:

We also encourage submission of tutorials on the topics below. A tutorial submission should be 1-2 pages (US letter) in PDF format. It should specify the tutorial title, subject area, leader(s), the intended audience, specify any needed lecture materials or books, and length (half-day or full-day). Submissions should focus on the topics below. Vendor-specific training sessions will be rejected. Tutorials requiring textbooks or copyrighted materials such as research papers should make sure permission can be granted by the copyright holders. Tutorials submissions should not be anonymized.

We are using EasyChair as the submission and review system. Over the past a few years, SADFE has had a great experience with EasyChair. Submissions should be made at: https://easychair.org/my/conference?conf=sadfe2020


Important Dates for SADFE


  • Deadline for full papers: January 31, 2020
  • Deadline for panel and tutorial proposals: February 28, 2020
  • Notification of paper acceptance or rejection: February 28, 2020
  • Deadline for final paper camera ready copy: March 27, 2020
  • Deadline for poster session abstracts: March 27, 2020
  • Notification for panel/tutorial acceptance or rejection: March 27, 2020
  • Notification for poster acceptance or rejection: April 10, 2020
  • SADFE 2020 symposium dates: May 14-15, 2020

Topics to be Addressed


Potential topics to be addressed by submissions include, but are not limited to:

  • Digital Data and Evidence Management: advanced digital evidence discovery, collection, management, storage and preservation
  • Identification, authentication and collection of digital evidence
  • Extraction and management of forensic data/metadata
  • Identification and redaction of personally identifying information and other forms of sensitive information
  • Post-acquisition handling of evidence and the preservation of data integrity and admissibility
  • Evidence and digital memory preservation, curation and storage
  • Architectures and processes (including network processes) that comply with forensic requirements
  • Managing geographically, politically and/or jurisdictionally dispersed data artifacts
  • Data, digital knowledge, and web mining systems for identification and authentication of relevant data
  • Network forensics, including botnet forensics
  • Digital Evidence, Data Integrity and Analytics: advanced digital evidence and digitized data analysis, correlation, and presentation
  • Advanced search, analysis, and presentation of digital evidence
  • Cybercrime scenario analysis and reconstruction technologies
  • Legal case construction and digital evidence support
  • Cyber-crime strategy analysis and modeling
  • Combining digital and non-digital evidence
  • Supporting both qualitative and statistical evidence
  • Computational systems and computational forensic analysis
  • Digital evidence in the face of encryption
  • Forensic-support technologies: forensic enabled and proactive monitoring/response
  • Machine learning techniques, deep learning techniques for analytics and discovery
  • Forensics of embedded or non-traditional devices (e.g. IoT, cell phones, SCADA, broadband routers, obsolete storage media)
  • Innovative forensic engineering tools and applications
  • Proactive forensic-enabled support for incident response
  • Forensic tool validation: methodologies and principles
  • Legal and technical collaboration
  • Digital forensics surveillance technology and procedures
  • “Honeypot” and other target systems for data collection and monitoring
  • Quantitative attack impact assessment
  • Comprehensive fault analysis, including, but not limited to, DFE study of broad realistic system and digital knowledge failures, criminal and non-criminal, with comprehensive DFE (malicious/non-malicious) analysis in theory, methods, and practices.
  • Machine learning techniques, deep learning techniques for analytics and discovery
  • Forensic and digital data integrity issues for digital preservation and recovery, including
  • Technological challenges
  • Legal and ethical challenges
  • Economic challenges
  • Institutional arrangements and workflows
  • Political challenges and
  • Cultural and professional challenges
  • Scientific Principle-Based Digital Forensic Processes: systematic engineering processes supporting digital evidence management which are sound on scientific, technical and legal grounds
  • Legal/technical aspects of admissibility and evidence tests
  • Examination environments for digital data
  • Courtroom expert witness and case presentation
  • Case studies illustrating privacy, legal and legislative issues
  • Forensic tool validation: legal implications and issues
  • Legal and privacy implications for digital and computational forensic analysis
  • Handling increasing volumes of digital discovery
  • New Evidence Decisions, e.g., United States v. Jones, _ U.S._ (2012) and United States v. Kotterman, _ F.3d _(9th Cir. 2013)
  • Computational Forensics and Validation
  • Transnational Investigations/Case Integration under the Convention on Cybercrime of the Council of Europe
  • Issues in Forensic Authentication and Validation.
  • Legal, Ethical and Technical Challenges
  • Forensic, Policy and Ethical Implications of The Internet of Things, The “Smart City,” “Big Data” or Cloud systems


Contact


Program Chair:
Sven Dietrich, CUNY John Jay College of Criminal Justice, USA

General Chair:
Matluba Khodjaeva, CUNY John Jay College of Criminal Justice, USA

Steering Committee:
Sven Dietrich, John Jay College of Criminal Justice at City University of New York, USA
Deborah Frincke, National Security Agency, USA
Yong Guan, Iowa State University, USA
M Huang, Boeing Research and Technology (retired), USA
Michael Losavio, University of Louisville, USA
Alec Yasinsac, University of South Alabama, USA


Program Committee (as of November 29, 2019):
Sudhir Aggarwal, Florida State University, USA
Frank Breitinger, University of Liechtenstein, Liechtenstein
L Jean Camp, Indiana University at Bloomington, USA
K P Chow, The University of Hong Kong, Hong Kong
Marc Dacier, EURECOM, France
Herve Debar, Telecom Sud-Paris, France
David Dittrich, University of Washington Tacoma, USA
Patrick Duessel, CBS Corporation, USA
Felix Freiling, Friedrich-Alexander Universitaet, Germany
Deborah Frincke, National Security Agency, USA
Simson Garfinkel, US Census Bureau, USA
Lambert Grosskopf, Universitaet Bremen, Germany
Yong Guan, Iowa State University, USA
Barbara Guttman, NIST, USA
Shweta Jain, CUNY John Jay College of Criminal Justice, USA
Yu-Li Lin, Chang Gung University, Taiwan
Michael Losavio, University of Louisville, USA
David Manz, Pacific Northwest National Laboratory, USA
Nasir Memon, New York University, USA
Mariofanna Milanova, University of Arkansas Little Rock, USA
Carsten Momsen, Freie Universitaet Berlin, Germany
Kara Nance, University of Alaska, USA
Gilbert Peterson, Air Force Institute of Technology, USA
Slim Rekhis, University of Carthage, Tunisia
Priyanka Samanta, CUNY Graduate Center, USA
Angelos Stavrou, George Mason University, USA
Wietse Venema, Google, USA
Alec Yasinsac, University of South Alabama, USA