Call For Papers
8th International Workshop on
Systematic Approaches to Digital Forensics Engineering
In collaboration with Hong Kong University, Hong Kong Information Security and Forensics Society; Hong Kong Center for Information Security and Cryptography and the Hong Kong Law and Technology Center
November 21-22, 2013
Hong Kong University, Hong Kong, Peoples Republic of China
Important Dates:
Paper Due Date: |
Jun 24, 2013 (anywhere in the world) |
Acceptance Notification Date: |
August 15, 2013 |
Final Paper: |
October 1, 2013 |
Conference Date: |
November 21-22, 2013 |
We invite you to SADFE-2013, the eighth international conference on Systematic Approaches to Digital Forensic Engineering to be held in Hong Kong, China November 21-22, 2013.
Digital forensics engineering and the curation of digital collections in cultural institutions face pressing and overlapping challenges related to provenance, chain of custody, authenticity, integrity, and identity. The analysis and sustainability of digital evidence requires innovative methods, systems and practices, grounded in solid research and understanding of user needs.
SADFE-2013 investigates the application of digital forensic engineering expertise to advance a variety of goals, including criminal and corporate investigations, as well as documentation of individual and organizational activities. We believe digital forensic engineering is vital to security, the administration of justice and the evolution of culture.
Submissions:
Submissions are made via Reg-Site
A Best Paper Award will be made for the final papers.
Topics:
We welcome previously unpublished papers on digital forensics and preservation as to civil, criminal and national security investigations for use within a court of law, the execution of national policy or to aid in understanding the past and digital knowledge in general.
We discuss digital forensic principles in new areas of the information society. We hope you consider submission for this international conference.
Potential topics to be addressed by submissions include, but are not limited to:
Digital Data and Evidence Management:
Advanced digital evidence discovery, collection, management, storage and preservation
Identification, authentication and collection of digital evidence
Extraction and management of forensic data/metadata
Identification and redaction of personally identifying information and other forms of sensitive information
Post-acquisition handling of evidence and the preservation of data integrity and admissibility
Evidence and digital memory preservation, curation and storage
Architectures and processes (including network processes) that comply with forensic requirements
Managing geographically, politically and/or jurisdictionally dispersed data artifacts
Data, digital knowledge, and web mining systems for identification and authentication of relevant data
Botnet forensics
Digital Evidence, Data Integrity and Analytics:
Advanced digital evidence and digitized data analysis, correlation, and presentation
Advanced search, analysis, and presentation of digital evidence
Cybercrime scenario analysis and reconstruction technologies
Legal case construction and digital evidence support
Cyber-crime strategy analysis and modeling
Combining digital and non-digital evidence
Supporting both qualitative and statistical evidence
Computational systems and computational forensic analysis
Digital evidence in the face of encryption
Forensic-support technologies: forensic-enabled and proactive monitoring/response
Forensics of embedded or non-traditional devices (e.g. digicams, cell phones, SCADA, obsolete storage media)
Forensic tool validation:
Methodologies and principles
Legal and technical collaboration
Digital forensics surveillance technology and procedures
“Honeypot” and other target systems for data collection and monitoring
Quantitative attack impact assessment
Comprehensive fault analysis, including, but not limited to, DFE study of broad realistic system and digital knowledge failures, criminal and non-criminal, with comprehensive DFE (malicious/non-malicious) analysis in theory, methods, and practices.
Forensic and digital data integrity issues for digital preservation and recovery, including
Technological challenges
Legal and ethical challenges
Economic challenges
Institutional arrangements and workflows
Political challenges and
Cultural and professional challenges
Scientific Principle-Based Digital Forensic Processes:
Systematic engineering processes supporting digital evidence management which are sound on scientific, technical and legal grounds
Legal/technical aspects of admissibility and evidence tests
Examination environments for digital data
Courtroom expert witness and case presentation
Case studies illustrating privacy, legal and legislative issues
Forensic tool validation: legal implications and issues
Legal and privacy implications for digital and computational forensic analysis
Handling increasing volumes of digital discovery
Legal, Ethical and Technical Challenges
The forensic, policy and ethical implications of The Internet of Things, The “Smart City,” “Big Data” or Cloud systems
New Evidence Decisions, e.g., United States v. Jones, _ U.S._ (2012) and United States v. Kotterman, _ F.3d _ (9th Cir. 2013)
Computational Forensics and Validation
Transnational Investigations/Case Integration under the Convention on Cybercrime of the Council of Europe
Issues in Forensic Authentication and Validation.
Submission:
SADFE-2013 follows standard IEEE submission standards with full papers to be submitted by the final due date.
Prospective authors are invited to submit original work not previously published or planned for presentation. Papers are reviewed on the basis that they do not contain plagiarized material and have not been submitted to any other conference at the same time (double submission). Follow these links to learn more:
|
|
|