[Pasig-discuss] 8th International Workshop on Systematic Approaches to Digital Forensics Engineering - Call For Papers

Cal Lee callee at email.unc.edu
Fri Jun 14 09:39:00 EDT 2013


Call for Papers


SADFE 2013
8th International Workshop on
Systematic Approaches to Digital Forensics Engineering
In collaboration with Hong Kong University, Hong Kong Information 
Security and Forensics Society; Hong Kong Center for Information 
Security and Cryptography and the Hong Kong Law and Technology Center
November 21-22, 2013
Hong Kong University, Hong Kong, Peoples Republic of China

right before the HTCIA (High Technology Crime Investigation Association)
Law Enforcement Cyber Security Training Conference
November 25-29, 2013


Important Date:
Paper Due Date: 	Jun 24, 2013 (anywhere in the world)
Acceptance Notification Date: 	August 15, 2013
Final Paper: 	October 1, 2013
Conference Date: 	November 21-22, 2013


We invite you to SADFE-2013, the eighth international conference on 
Systematic Approaches to Digital Forensic Engineering to be held in Hong 
Kong, China November 21-22, 2013.

Digital forensics engineering and the curation of digital collections in 
cultural institutions face pressing and overlapping challenges related 
to provenance, chain of custody, authenticity, integrity, and identity. 
The analysis and sustainability of digital evidence requires innovative 
methods, systems and practices, grounded in solid research and 
understanding of user needs.

SADFE-2013 investigates the application of digital forensic engineering 
expertise to advance a variety of goals, including criminal and 
corporate investigations, as well as documentation of individual and 
organizational activities. We believe digital forensic engineering is 
vital to security, the administration of justice and the evolution of 
culture.



Submissions: Submissions are made via Reg-Site

A Best Paper Award will be made for the final papers.



Topics:

We welcome previously unpublished papers on digital forensics and 
preservation as to civil, criminal and national security investigations 
for use within a court of law, the execution of national policy or to 
aid in understanding the past and digital knowledge in general.

We discuss digital forensic principles in new areas of the information 
society. We hope you consider submission for this international conference.

Potential topics to be addressed by submissions include, but are not 
limited to:

     Digital Data and Evidence Management: advanced digital evidence 
discovery, collection, management, storage and preservation
         Identification, authentication and collection of digital evidence
         Extraction and management of forensic data/metadata
         Identification and redaction of personally identifying 
information and other forms of sensitive information
         Post-acquisition handling of evidence and the preservation of 
data integrity and admissibility
         Evidence and digital memory preservation, curation and storage
         Architectures and processes (including network processes) that 
comply with forensic requirements
         Managing geographically, politically and/or jurisdictionally 
dispersed data artifacts
         Data, digital knowledge, and web mining systems for 
identification and authentication of relevant data
         Botnet forensics

     Digital Evidence, Data Integrity and Analytics: advanced digital 
evidence and digitized data analysis, correlation, and presentation
         Advanced search, analysis, and presentation of digital evidence
         Cybercrime scenario analysis and reconstruction technologies
         Legal case construction and digital evidence support
         Cyber-crime strategy analysis and modeling
         Combining digital and non-digital evidence
         Supporting both qualitative and statistical evidence
         Computational systems and computational forensic analysis
         Digital evidence in the face of encryption
         Forensic-support technologies: forensic-enabled and proactive 
monitoring/response

     Forensics of embedded or non-traditional devices (e.g. digicams, 
cell phones, SCADA, obsolete storage media)
         Forensic tool validation: methodologies and principles
         Legal and technical collaboration
         Digital forensics surveillance technology and procedures
         "Honeypot" and other target systems for data collection and 
monitoring
         Quantitative attack impact assessment
         Comprehensive fault analysis, including, but not limited to, 
DFE study of broad realistic system and digital knowledge failures, 
criminal and non-criminal, with comprehensive DFE 
(malicious/non-malicious) analysis in theory, methods, and practices.

     Forensic and digital data integrity issues for digital preservation 
and recovery, including
         Technological challenges
         Legal and ethical challenges
         Economic challenges
         Institutional arrangements and workflows
         Political challenges and
         Cultural and professional challenges

     Scientific Principle-Based Digital Forensic Processes: systematic 
engineering processes supporting digital evidence management which are 
sound on scientific, technical and legal grounds
         Legal/technical aspects of admissibility and evidence tests
         Examination environments for digital data
         Courtroom expert witness and case presentation
         Case studies illustrating privacy, legal and legislative issues
         Forensic tool validation: legal implications and issues
         Legal and privacy implications for digital and computational 
forensic analysis
         Handling increasing volumes of digital discovery

     Legal, Ethical and Technical Challenges
         The forensic, policy and ethical implications of
          n The Internet of Things, The “Smart City,” “Big Data” or 
Cloud systems
         New Evidence Decisions, e.g., United States v. Jones, _ U.S._ 
(2012) and United States v. Kotterman, _ F.3d _ (9th Cir. 2013)
         Computational Forensics and Validation
         Transnational Investigations/Case Integration under the 
Convention on Cybercrime of the Council of Europe
         Issues in Forensic Authentication and Validation.

Submission:

SADFE-2013 follows standard IEEE submission standards with full papers 
to be submitted by the final due date.

Prospective authors are invited to submit original work not previously 
published or planned for presentation. Papers are reviewed on the basis 
that they do not contain plagiarized material and have not been 
submitted to any other conference at the same time (double submission). 
Follow these links to learn more:

     IEEE Policy on Plagiarism

     IEEE Policy on Double Submission

PLEASE NOTE: To be published in the Conference Proceedings an author of 
an accepted paper is required to register for the conference. 
Non-refundable registration fees must be paid prior to uploading the 
final IEEE formatted, publication-ready version of the paper. For 
authors with multiple accepted papers, one registration is valid for up 
to 3 papers. Accepted and presented papers will be published in the 2013 
Conference Proceedings.


Paper submissions:

During the initial paper submission process via REG-SITE, it is the 
authors' responsibility to ensure that the author list and the paper 
title of the submitted pdf file is an exact match to the author list and 
paper title on the REG-SITE registration page. Registration must include 
all co-authors, not just the submitting author. Failure to comply with 
this rule might result in your paper being withdrawn from the review 
process.

All submissions should be written in English with a maximum paper length 
of six (6) printed pages (minimum 10-point font) including figures, 
without incurring additional page charges.

Standard IEEE conference templates for for Microsoft Word US letter is 
here: US letter.

Only PDF files will be accepted for the review process, and all 
submissions must be done through REG-SITE.


Steering Committee:

Deborah Frincke, Co-Chair (Department of Defense)
Ming-Yuh Huang, Co-Chair (Northwest Security Institute)
Michael Losavio (University of Louisville)
Alec Yasinsac (University of South Alabama)
Robert F. Erbacher (Army Research Laboratory)
Wenke Lee (George Institute of Technology)
Barbara Endicott-Popovsky (University of Washington)
Roy Campbell (University of Illinois, Urbana/Champaign)
Yong Guan (Iowa State University)



Organizing Committee:
General Chair: 	K.P. Chow, Hong Kong University
Program Committee Co-Chairs: 	Christopher (Cal) Lee, University of North 
Carolina
Adel Elmaghraby, University of Louisville
Submission Chair: 	Luciana Duranti, University of British Columbia

Program Committee:


Sudhir 	Aggarwal 	Florida State University
Galina 	Borisevich 	Perm State University
Long 	Chen 	Chongqing University of Posts and Telecommunications
K.P. 	Chow 	University of Hong Kong
David 	Dampier 	Mississippi State University
Hervé 	Debar 	France Telecom R&D
Barbara 	Endicott-Popovsky 	University of Washington
Robert 	Erbacher 	Northwest Security Institute
Xinwen 	Fu 	UMass Lowell
Simson 	Garfinkel 	Naval Postgraduate School
Brad 	Glisson 	University of Glasgow
Yong 	Guan 	Iowa State University
Barbara 	Guttman 	National Institute for Standards and Technology (USA)
Brian 	Hay 	University of Alaska, Fairbanks
Jeremy 	John 	British Library
Ping 	Ji 	John Jay College Of Criminal Justice
Yu-Li 	Li 	Ministry of Justice Investigation Bureau, Taiwan
Pinxin 	Liu 	Renmin University of China Law School
Michael 	Losavio 	University of Louisville
Nasir 	Memon 	Polytechnic Institute of NYU
Mariofanna 	Milanova 	University of Arkansas at Little Rock
Kara 	Nance 	University of Alaska, Fairbanks
Ming 	Ouyang 	University of Louisville
Gilbert 	Peterson 	Air Force Institute of Technology
Slim 	Rekhis 	University of Carthage
Golden 	Richard 	University of New Orleans
Corinne 	Rogers 	University of British Columbia
Ahmed 	Salem 	Hood College
Clay 	Shields 	Georgetown University
Vrizlynn 	Thing 	Institute for Infocomm Research, Singapore
Sean 	Thorp 	Faculty of Engineering and Computing at University of 
Technology , Jamaica
William(Bill) 	Underwood 	Georgia Tech
Wietse 	Venema 	IBM Research
Xinyuan(Frank) 	Wang 	George Mason University
Kam 	Woods 	University of North Carolina
Yang 	Xiang 	Deakin University, Australia
Fei 	Xu 	Institute of Information Engineering, Chinese Academy of Sciences
Alec 	Yasinsac 	University of South Alabama
SM 	Yiu 	Hong Kong University
Wei 	Yu 	Towson University
Nan 	Zhang 	George Washington University
   	  	

Contact Information:
Michael Losavio, University of Louisville,
michael.losavio at louisville.edu
+1 502 852 3509


More information about the Pasig-discuss mailing list