International Conference… Cyber Crime.
Possible place for your ads! Serious advertiser welcome! Send us an email, to agree!
Cyber Crime… is global problem.
Keeping up with our international theme at ICDF2C, we are proud to announce this year that ICDF2C 2013 will run in parallel to InfoSecurity Russia 2013.
The premiere information security industry event in Russia.
We are also proud to announce that starting with this year’s conference, ICDF2C is collaborating with the Journal of Digital Investigation, the leading international journal in the area of digital forensics and incident response.
In addition to the publication of the proceedings in the Lecture Notes of the ICST, the best research papers presented at ICDF2C 2013 will be expanded and peer reviewed for a special issue of the Journal of Digital Investigation.
Participants in the 2013 conference will be able to attend both the InfoSecurity Russia event and ICDF2C and hear the latest developments in both research and industry.
The conference provides a venue which offers chances for networking and high-quality training through expert speakers, state-of-the-art work from researchers all around the world, and tutorials on digital forensic techniques and methods of cyber crime investigation.
This ICST conference is endorsed by EAI.
SCOPE:
The Internet has made it easier to perpetrate crimes by providing criminals an avenue for launching attacks with relative anonymity.
The increased complexity of the communication and networking infrastructure is making investigation of the cybercrimes difficult.
Clues of illegal activities are often buried in large volumes of data that needs to be sifted through in order to detect crimes and collect evidence.
The field of digital forensics and cybercrime investigation has become very important for law enforcement, national security, and information assurance.
This is a multidisciplinary area that encompasses law, computer science, finance, telecommunications, data analytics, and policing.
This conference brings together practitioners and researchers from diverse fields providing opportunities for business and intellectual engagement among attendees.
ICDF2C 2013 – Crocus Expo, Moscow
Preliminary Program
Day 1 – 25th September, 2013 |
|
09:00 – 10:30 |
Session I: Cybercrime Investigations |
Keynote speech: International Cooperation in the area of Cybercrime Investigation by Mr. Kunwon Yang, Assistant Director of INTERPOL Digital Forensics Laboratory, INTERPOL Global Complex for Innovation | |
Cybercrime investigations in the context of Russian Legal System [to be confirmed] | |
10:30 – 10:45 |
Coffee Break |
10:45 – 12:15 |
Session II: Cyberterrorism & Cyberwarfare |
Murdoch Watney | |
Determining when Conduct in Cyberspace constitutes Cyber Warfare in terms of the International law and Tallinn Manual on the International Law Applicable to Cyber Warfare: a Synopsis | |
Esti Peshin | |
Regulating the Lawful Interception of Social Network Services: Current Trends | |
12:15 – 13:15 |
Lunch |
13:15 – 14:45 |
Session III: Computer Triage and Preliminary Examination |
Andrew Daniel, Farkhund Iqbal, and Ibrahim Baggili | |
Computer Profiling for Preliminary Forensic Examination | |
Fergal Brennan, Martins Udris, and Pavel Gladyshev | |
An Automated Link Analysis Solution Applied to Digital Forensic Investigations | |
14:45 – 15:00 |
Coffee Break |
15:00 – 16:30 |
Session IV: Cloud Investigations |
Lucia De Marco, M-Tahar Kechadi, and Filomena Ferrucci | |
Cloud Forensics Readiness: Foundations | |
Joshua James, Ahmed F.Shosha, and Pavel Gladyshev | |
Determining Training Needs for Cloud Infrastructure Investigations using I-STRIDE | |
20:30 – 23:00 |
Conference Dinner |
Day 2: 26 September 2013 |
|
09:00 – 10:30 |
Session V: Fighting Cybercrime in Russian Online Banking – panel discussion (Moderator: Konyavki V.A.) – t.b.c. |
10:30 – 10:45 |
Coffee Break |
10:45 – 12:15 |
Session VI: Digital Forensics – Image Analysis |
Martin Steinebach |
|
FaceHash: Face Detection and Robust Hashing |
|
Munkhbaatar Doyoddorj, and Kyung-Hyune Rhee |
|
Robust Copy-Move Forgery Detection Based on Dual-Transform |
|
12:15 – 13:15 |
Lunch |
13:15 – 14:45 |
Session VII: Digital Forensics – Digital Forensic Process |
Thomas Kemmerich, Florian Junge, and Karsten Sohr |
|
Towards a process model for hash functions in digital forensics |
|
Joshua James, Pavel Gladyshev |
|
Measuring Accuracy of Automated Parsing and Categorization Tools and Processes in Digital Investigations |
|
14:45 – 15:00 |
Coffee Break |
15:00 – 15:45 |
Session VIII: Child Abuse Investigations |
Kathryn Seigfried-Spellar |
|
Distinguishing the Viewers, Downloaders, and Exchangers of Internet Child Pornography by Individual Differences: Preliminary Findings |
|
15:45 – 16:30 |
Session IX: Short Papers |
Clive Blackwell, Aaron Greetham |
|
Automating Incident Response with Visualisation and Alerting in Splunk |
|
Deepak Gupta, Babu M. Mehtre |
|
Mozilla Firefox Browsing Artifacts in 3 Different Anti-Forensics Modes |
|
Alexei Dingli |
|
Web page Extractor |
|
Alexei Dingli |
|
Child Abuse Image Detection |
Day 3: 27 September 2013 | |
09:00 – 10:30 |
Session X: Digital Forensic Artifacts |
Asif Iqbal, Hanan Al Obaidli, Andrew Marrington, and Ibrahim Baggili | |
Amazon Kindle Fire HD Forensics | |
Prachi Goel, and Babu Mehtre | |
Forensic Artifacts of flareGet Download Manager | |
10:30 – 10:45 |
Coffee Break |
10:45 – 12:15 |
Session XI: Digital Forensic Analysis Techniques |
Neil Rowe | |
Identifying forensically uninteresting files using a large corpus | |
Frank Breitinger, Georgios Stivaktakis, and Vassil Roussev | |
Evaluating Detection Error Trade-offs for Bitwise Approximate Matching Algorithms | |
12:15 – 13:15 |
Lunch |
13:15 – 14:45 |
Session XII: Data Carving and Classification |
Martin Lambertz, Rafael Uetz, and Elmar Gerhards-Padilla | |
Resurrection: A Carver for Fragmented Files | |
Rainer Poisel, Marlies Rybnicek, and Simon Tjoa | |
Taxonomy of Data Fragment Classification Techniques | |
14:45 – 15:00 |
Coffee Break |
15:00 – 15:45 |
Session XIII: Digital Forensics – Decryption Techinques |
Shabana Subhair, Balan C, and Thomas KL | |
Forensic Decryption of FAT BitLocker Volume | |
15:45 – 16:45 |
Tutorial: Advanced Mobile Phone Forensics by Dr. Eogthan Casey (to be confirmed) |
ICDF2C 2013 – Crocus Expo, Moscow
Final Program
Day 1: 26th September 2013, Thursday |
|
10:00 – 10:30 |
Registration |
10:30 – 11:30 |
Session I: Opening Session |
Keynote speech by Mr. Kunwon Yang, Assistant Director of INTERPOL Digital Forensics Laboratory, INTERPOL Global Complex for Innovation | |
Keynote speech by Alexey Yakovlev, Assistant Director of the Digital Forensic Service of the Investigtative Committee of Russian Federation | |
11:30 – 11:45 |
Coffee Break |
11:45 – 12:15 |
Session II: Investigations of Internet Crimes against Children |
Kathryn Seigfried-Spellar | |
Distinguishing the Viewers, Downloaders, and Exchangers of Internet Child Pornography by Individual Differences: Preliminary Findings | |
12:15 – 13:15 |
Session III: Cyber terrorism & cyber warfare |
Murdoch Watney | |
Determining when Conduct in Cyberspace constitutes Cyber Warfare in terms of the International law and Tallinn Manual on the International Law Applicable to Cyber Warfare: a Synopsis | |
Esti Peshin | |
Regulating the Lawful Interception of Social Network Services: Current Trends | |
13:15 – 14:30 |
Lunch |
14:30 – 14:45 |
Session IV: Computer Triage and Preliminary Examination |
Andrew Daniel, Farkhund Iqbal, and Ibrahim Baggili | |
Computer Profiling for Preliminary Forensic Examination | |
Fergal Brennan, Martins Udris, and Pavel Gladyshev | |
An Automated Link Analysis Solution Applied to Digital Forensic Investigations | |
14:30 – 14:45 |
Session V: Decryption Methods for Digital Forensics |
Shabana Subhair, Balan C, and Thomas KL | |
Forensic Decryption of FAT BitLocker Volume | |
16:00 – 16:15 |
Coffee Break |
16:15 – 17:15 |
Session VI: Cloud Investigations |
Lucia De Marco, M-Tahar Kechadi, and Filomena Ferrucci | |
Cloud Forensics Readiness: Foundations | |
Joshua James, Ahmed F.Shosha, and Pavel Gladyshev | |
Determining Training Needs for Cloud Infrastructure Investigations using I-STRIDE | |
16:15 – 17:45 |
Session VII: Short Papers |
Deepak Gupta, Babu M. Mehtre | |
Mozilla Firefox Browsing Artifacts in 3 Different Anti-Forensics Modes | |
Alexei Dingli | |
Web page Extractor | |
Alexei Dingli | |
Child Abuse Image Detection | |
18:30 – 21:00 |
Conference Dinner |
Day 2: 27 September 2013, Friday |
|
10:00 – 10:30 |
Session VIII: Education |
Boris Nikolayevich Korobets | |
Third-level cyberforeniscs education in the Russian Federation: experiences and hopes | |
10:30 – 11:30 |
Session IX: Image Forensics |
Martin Steinebach | |
FaceHash: Face Detection and Robust Hashing | |
Munkhbaatar Doyoddorj, and Kyung-Hyune Rhee | |
Robust Copy-Move Forgery Detection Based on Dual-Transform | |
11:30 – 11:45 |
Coffee Break |
11:45 – 13:15 |
Session X: Digital Forensics – Analysis Techniques |
Neil Rowe | |
Identifying forensically uninteresting files using a large corpus | |
Frank Breitinger, Georgios Stivaktakis, and Vassil Roussev | |
Evaluating Detection Error Trade-offs for Bitwise Approximate Matching Algorithms | |
Igor Yurievich Yurin | |
Forensics Assistant: capabilities & specific features of digital forensic software developed in the context of Russian legislation | |
13:15 – 14:30 |
Lunch |
14:30 – 15:30 |
Session XI: Digital Forensics – Process |
Thomas Kemmerich, Florian Junge, and Karsten Sohr | |
Towards a process model for hash functions in digital forensics | |
Joshua James, Pavel Gladyshev | |
Measuring Accuracy of Automated Parsing and Categorization Tools and Processes in Digital Investigations | |
15:30 – 16:30 |
Session XII: Data Carving and Classification |
Martin Lambertz, Rafael Uetz, and Elmar Gerhards-Padilla | |
Resurrection: A Carver for Fragmented Files | |
Rainer Poisel, Marlies Rybnicek, and Simon Tjoa | |
Taxonomy of Data Fragment Classification Techniques | |
16:30 – 16:45 |
Coffee Break & Poster Session |
16:45 – 17:45 |
Session XIII: Digital Forensics – Applications & Artifacts |
Asif Iqbal, Hanan Al Obaidli, Andrew Marrington, and Ibrahim Baggili | |
Amazon Kindle Fire HD Forensics | |
Prachi Goel, and Babu Mehtre | |
Forensic Artifacts of flareGet Download Manager |