[Pasig-discuss] 8th International Workshop on Systematic Approaches to Digital Forensics Engineering - Call For Papers
Cal Lee
callee at email.unc.edu
Fri Jun 14 09:39:00 EDT 2013
Call for Papers
SADFE 2013
8th International Workshop on
Systematic Approaches to Digital Forensics Engineering
In collaboration with Hong Kong University, Hong Kong Information
Security and Forensics Society; Hong Kong Center for Information
Security and Cryptography and the Hong Kong Law and Technology Center
November 21-22, 2013
Hong Kong University, Hong Kong, Peoples Republic of China
right before the HTCIA (High Technology Crime Investigation Association)
Law Enforcement Cyber Security Training Conference
November 25-29, 2013
Important Date:
Paper Due Date: Jun 24, 2013 (anywhere in the world)
Acceptance Notification Date: August 15, 2013
Final Paper: October 1, 2013
Conference Date: November 21-22, 2013
We invite you to SADFE-2013, the eighth international conference on
Systematic Approaches to Digital Forensic Engineering to be held in Hong
Kong, China November 21-22, 2013.
Digital forensics engineering and the curation of digital collections in
cultural institutions face pressing and overlapping challenges related
to provenance, chain of custody, authenticity, integrity, and identity.
The analysis and sustainability of digital evidence requires innovative
methods, systems and practices, grounded in solid research and
understanding of user needs.
SADFE-2013 investigates the application of digital forensic engineering
expertise to advance a variety of goals, including criminal and
corporate investigations, as well as documentation of individual and
organizational activities. We believe digital forensic engineering is
vital to security, the administration of justice and the evolution of
culture.
Submissions: Submissions are made via Reg-Site
A Best Paper Award will be made for the final papers.
Topics:
We welcome previously unpublished papers on digital forensics and
preservation as to civil, criminal and national security investigations
for use within a court of law, the execution of national policy or to
aid in understanding the past and digital knowledge in general.
We discuss digital forensic principles in new areas of the information
society. We hope you consider submission for this international conference.
Potential topics to be addressed by submissions include, but are not
limited to:
Digital Data and Evidence Management: advanced digital evidence
discovery, collection, management, storage and preservation
Identification, authentication and collection of digital evidence
Extraction and management of forensic data/metadata
Identification and redaction of personally identifying
information and other forms of sensitive information
Post-acquisition handling of evidence and the preservation of
data integrity and admissibility
Evidence and digital memory preservation, curation and storage
Architectures and processes (including network processes) that
comply with forensic requirements
Managing geographically, politically and/or jurisdictionally
dispersed data artifacts
Data, digital knowledge, and web mining systems for
identification and authentication of relevant data
Botnet forensics
Digital Evidence, Data Integrity and Analytics: advanced digital
evidence and digitized data analysis, correlation, and presentation
Advanced search, analysis, and presentation of digital evidence
Cybercrime scenario analysis and reconstruction technologies
Legal case construction and digital evidence support
Cyber-crime strategy analysis and modeling
Combining digital and non-digital evidence
Supporting both qualitative and statistical evidence
Computational systems and computational forensic analysis
Digital evidence in the face of encryption
Forensic-support technologies: forensic-enabled and proactive
monitoring/response
Forensics of embedded or non-traditional devices (e.g. digicams,
cell phones, SCADA, obsolete storage media)
Forensic tool validation: methodologies and principles
Legal and technical collaboration
Digital forensics surveillance technology and procedures
"Honeypot" and other target systems for data collection and
monitoring
Quantitative attack impact assessment
Comprehensive fault analysis, including, but not limited to,
DFE study of broad realistic system and digital knowledge failures,
criminal and non-criminal, with comprehensive DFE
(malicious/non-malicious) analysis in theory, methods, and practices.
Forensic and digital data integrity issues for digital preservation
and recovery, including
Technological challenges
Legal and ethical challenges
Economic challenges
Institutional arrangements and workflows
Political challenges and
Cultural and professional challenges
Scientific Principle-Based Digital Forensic Processes: systematic
engineering processes supporting digital evidence management which are
sound on scientific, technical and legal grounds
Legal/technical aspects of admissibility and evidence tests
Examination environments for digital data
Courtroom expert witness and case presentation
Case studies illustrating privacy, legal and legislative issues
Forensic tool validation: legal implications and issues
Legal and privacy implications for digital and computational
forensic analysis
Handling increasing volumes of digital discovery
Legal, Ethical and Technical Challenges
The forensic, policy and ethical implications of
n The Internet of Things, The “Smart City,” “Big Data” or
Cloud systems
New Evidence Decisions, e.g., United States v. Jones, _ U.S._
(2012) and United States v. Kotterman, _ F.3d _ (9th Cir. 2013)
Computational Forensics and Validation
Transnational Investigations/Case Integration under the
Convention on Cybercrime of the Council of Europe
Issues in Forensic Authentication and Validation.
Submission:
SADFE-2013 follows standard IEEE submission standards with full papers
to be submitted by the final due date.
Prospective authors are invited to submit original work not previously
published or planned for presentation. Papers are reviewed on the basis
that they do not contain plagiarized material and have not been
submitted to any other conference at the same time (double submission).
Follow these links to learn more:
IEEE Policy on Plagiarism
IEEE Policy on Double Submission
PLEASE NOTE: To be published in the Conference Proceedings an author of
an accepted paper is required to register for the conference.
Non-refundable registration fees must be paid prior to uploading the
final IEEE formatted, publication-ready version of the paper. For
authors with multiple accepted papers, one registration is valid for up
to 3 papers. Accepted and presented papers will be published in the 2013
Conference Proceedings.
Paper submissions:
During the initial paper submission process via REG-SITE, it is the
authors' responsibility to ensure that the author list and the paper
title of the submitted pdf file is an exact match to the author list and
paper title on the REG-SITE registration page. Registration must include
all co-authors, not just the submitting author. Failure to comply with
this rule might result in your paper being withdrawn from the review
process.
All submissions should be written in English with a maximum paper length
of six (6) printed pages (minimum 10-point font) including figures,
without incurring additional page charges.
Standard IEEE conference templates for for Microsoft Word US letter is
here: US letter.
Only PDF files will be accepted for the review process, and all
submissions must be done through REG-SITE.
Steering Committee:
Deborah Frincke, Co-Chair (Department of Defense)
Ming-Yuh Huang, Co-Chair (Northwest Security Institute)
Michael Losavio (University of Louisville)
Alec Yasinsac (University of South Alabama)
Robert F. Erbacher (Army Research Laboratory)
Wenke Lee (George Institute of Technology)
Barbara Endicott-Popovsky (University of Washington)
Roy Campbell (University of Illinois, Urbana/Champaign)
Yong Guan (Iowa State University)
Organizing Committee:
General Chair: K.P. Chow, Hong Kong University
Program Committee Co-Chairs: Christopher (Cal) Lee, University of North
Carolina
Adel Elmaghraby, University of Louisville
Submission Chair: Luciana Duranti, University of British Columbia
Program Committee:
Sudhir Aggarwal Florida State University
Galina Borisevich Perm State University
Long Chen Chongqing University of Posts and Telecommunications
K.P. Chow University of Hong Kong
David Dampier Mississippi State University
Hervé Debar France Telecom R&D
Barbara Endicott-Popovsky University of Washington
Robert Erbacher Northwest Security Institute
Xinwen Fu UMass Lowell
Simson Garfinkel Naval Postgraduate School
Brad Glisson University of Glasgow
Yong Guan Iowa State University
Barbara Guttman National Institute for Standards and Technology (USA)
Brian Hay University of Alaska, Fairbanks
Jeremy John British Library
Ping Ji John Jay College Of Criminal Justice
Yu-Li Li Ministry of Justice Investigation Bureau, Taiwan
Pinxin Liu Renmin University of China Law School
Michael Losavio University of Louisville
Nasir Memon Polytechnic Institute of NYU
Mariofanna Milanova University of Arkansas at Little Rock
Kara Nance University of Alaska, Fairbanks
Ming Ouyang University of Louisville
Gilbert Peterson Air Force Institute of Technology
Slim Rekhis University of Carthage
Golden Richard University of New Orleans
Corinne Rogers University of British Columbia
Ahmed Salem Hood College
Clay Shields Georgetown University
Vrizlynn Thing Institute for Infocomm Research, Singapore
Sean Thorp Faculty of Engineering and Computing at University of
Technology , Jamaica
William(Bill) Underwood Georgia Tech
Wietse Venema IBM Research
Xinyuan(Frank) Wang George Mason University
Kam Woods University of North Carolina
Yang Xiang Deakin University, Australia
Fei Xu Institute of Information Engineering, Chinese Academy of Sciences
Alec Yasinsac University of South Alabama
SM Yiu Hong Kong University
Wei Yu Towson University
Nan Zhang George Washington University
Contact Information:
Michael Losavio, University of Louisville,
michael.losavio at louisville.edu
+1 502 852 3509
More information about the Pasig-discuss
mailing list