CFP Travel Travel
IEEE Symposium on Security and Privacy
Call For Papers

8th International Workshop on Systematic Approaches to Digital Forensics Engineering In collaboration with Hong Kong University, Hong Kong Information Security and Forensics Society; Hong Kong Center for Information Security and Cryptography and the Hong Kong Law and Technology Center November 21-22, 2013 Hong Kong University, Hong Kong, Peoples Republic of China

Important Dates:

Paper Due Date: Jun 24, 2013 (anywhere in the world)
Acceptance Notification Date: August 15, 2013
Final Paper: October 1, 2013
Conference Date: November 21-22, 2013

We invite you to SADFE-2013, the eighth international conference on Systematic Approaches to Digital Forensic Engineering to be held in Hong Kong, China November 21-22, 2013. Digital forensics engineering and the curation of digital collections in cultural institutions face pressing and overlapping challenges related to provenance, chain of custody, authenticity, integrity, and identity. The analysis and sustainability of digital evidence requires innovative methods, systems and practices, grounded in solid research and understanding of user needs. SADFE-2013 investigates the application of digital forensic engineering expertise to advance a variety of goals, including criminal and corporate investigations, as well as documentation of individual and organizational activities. We believe digital forensic engineering is vital to security, the administration of justice and the evolution of culture.

Submissions:

Submissions are made via Reg-Site

A Best Paper Award will be made for the final papers.

Topics:

We welcome previously unpublished papers on digital forensics and preservation as to civil, criminal and national security investigations for use within a court of law, the execution of national policy or to aid in understanding the past and digital knowledge in general. We discuss digital forensic principles in new areas of the information society. We hope you consider submission for this international conference. Potential topics to be addressed by submissions include, but are not limited to:

Digital Data and Evidence Management:

  • Advanced digital evidence discovery, collection, management, storage and preservation
  • Identification, authentication and collection of digital evidence
  • Extraction and management of forensic data/metadata
  • Identification and redaction of personally identifying information and other forms of sensitive information
  • Post-acquisition handling of evidence and the preservation of data integrity and admissibility
  • Evidence and digital memory preservation, curation and storage
  • Architectures and processes (including network processes) that comply with forensic requirements
  • Managing geographically, politically and/or jurisdictionally dispersed data artifacts
  • Data, digital knowledge, and web mining systems for identification and authentication of relevant data
  • Botnet forensics

    Digital Evidence, Data Integrity and Analytics:

  • Advanced digital evidence and digitized data analysis, correlation, and presentation
  • Advanced search, analysis, and presentation of digital evidence
  • Cybercrime scenario analysis and reconstruction technologies
  • Legal case construction and digital evidence support
  • Cyber-crime strategy analysis and modeling
  • Combining digital and non-digital evidence
  • Supporting both qualitative and statistical evidence
  • Computational systems and computational forensic analysis
  • Digital evidence in the face of encryption
  • Forensic-support technologies: forensic-enabled and proactive monitoring/response
  • Forensics of embedded or non-traditional devices (e.g. digicams, cell phones, SCADA, obsolete storage media)

    Forensic tool validation:

  • Methodologies and principles
  • Legal and technical collaboration
  • Digital forensics surveillance technology and procedures
  • “Honeypot” and other target systems for data collection and monitoring
  • Quantitative attack impact assessment
  • Comprehensive fault analysis, including, but not limited to, DFE study of broad realistic system and digital knowledge failures, criminal and non-criminal, with comprehensive DFE (malicious/non-malicious) analysis in theory, methods, and practices.

    Forensic and digital data integrity issues for digital preservation and recovery, including

  • Technological challenges
  • Legal and ethical challenges
  • Economic challenges
  • Institutional arrangements and workflows
  • Political challenges and
  • Cultural and professional challenges

    Scientific Principle-Based Digital Forensic Processes:

  • Systematic engineering processes supporting digital evidence management which are sound on scientific, technical and legal grounds
  • Legal/technical aspects of admissibility and evidence tests
  • Examination environments for digital data
  • Courtroom expert witness and case presentation
  • Case studies illustrating privacy, legal and legislative issues
  • Forensic tool validation: legal implications and issues
  • Legal and privacy implications for digital and computational forensic analysis
  • Handling increasing volumes of digital discovery

    Legal, Ethical and Technical Challenges

  • The forensic, policy and ethical implications of The Internet of Things, The “Smart City,” “Big Data” or Cloud systems
  • New Evidence Decisions, e.g., United States v. Jones, _ U.S._ (2012) and United States v. Kotterman, _ F.3d _ (9th Cir. 2013)
  • Computational Forensics and Validation
  • Transnational Investigations/Case Integration under the Convention on Cybercrime of the Council of Europe
  • Issues in Forensic Authentication and Validation.

    Submission:

    SADFE-2013 follows standard IEEE submission standards with full papers to be submitted by the final due date.

    Prospective authors are invited to submit original work not previously published or planned for presentation. Papers are reviewed on the basis that they do not contain plagiarized material and have not been submitted to any other conference at the same time (double submission). Follow these links to learn more: