10:30-12:25 |
Theme:
Digital Objects As
Forensic Evidence
|
10:30‐10:50 | C. Rudolph & N. Kuntze, FraunhoferInstitute for Secure Information Technology, Darmstadt, Germany: Constructing and Evaluating Digital Evidence for Processes |
10:50‐11:10 | A. Alva, B. Endicott‐Popovsky & S. David, University of Washington: Forensic Barriers: Legal Implications of Storing Information in the Cloud |
11:10‐11:30 | D. Keeling & M. Losavio, University of Louisville: Models in Collaborative and Distributed DigitalInvestigation With Ubiquitous Computing and Communication Systems |
11:30‐11:50 | F. Marturana, G. Me, University of Tor Vergata, Roma & S. Tacconi, Ministero dell’Interno, Italy : Cloud computing implications to Digital Forensics: a new methodology proposal |
11:50‐12:10 | A. Hay & G. Peterson, Air force Institute of Technology, Ohio: Memory Forensics: Extract file handles. |
12:10‐12:25 | DISCUSSION |
12:25-13:40 |
Lunch
|
13:40-15:45 |
Theme:
Trusting Data and
Documents Online
|
13:40‐14:00 | J. Fang, Z. L. Jiang, S. M. Yiu, L. Hui, K. P. Chow & N. He,
University of Hong Kong: Investigating and Analyzing the Web‐based
Contents on Chinese Shanzhai Mobile Phones |
14:00‐14:20 | J. Huang, Y. Chen, K. Choo & X. Fu, UMass Lowell, & Z. Ling, South East University, Nanjing, China: Refining the Framework of Digital Forensics |
14:20‐14:40 | F.R. Van Staden & H. S. Venter, University of Pretoria, South Africa: Implementing Digital Forensic Readiness For Cloud Computing Using Performance Monitoring Tools |
14:40‐15:00 | Y. Cai & P. Ji, City University of New York: Security Monitoring for Wireless Network Forensics (SMoWF) |
15:00‐15:15 | DISCUSSION |
15:15-15:45 | COFFEE BREAK |