Listed below are papers written by authors that will be presenting during the ADFSL conference sessions.

You may view the author's abstracts at any time by clicking on a paper. Full-text of the papers will be available post-conference on or about May 17, 2017.

Papers

Subscribe to RSS Feed

An Accidental Discovery of IoT Botnets and a Method for Investigating Them With a Custom Lua Dissector

Max Gannon, University of Alabama, Birmingham
Gary Warner, University of Alabama, Birmingham
Arsh Arora, University of Alabama, Birmingham

Case Study: A New Method for Investigating Crimes Against Children

Hallstein Asheim Hansen, Norwegian Police
Stig Andersen, Norwegian Police
Stefan Axelsson, Norwegian University of Science and Technology
Svein Hopland, Norwegian Police

Defining a Cyber Jurisprudence

Peter R. Stephenson PhD, independent researcher in cyber jurisprudence

DETECT KERNEL-MODE ROOTKITS VIA REAL TIME LOGGING & CONTROLLING MEMORY ACCESS

Igor Korkin
Satoshi Tanda

Detecting Deception in Asynchronous Text

Fletcher Glancy, Oklahoma State University - Main Campus

Development of A Professional Code of Ethics in Digital Forensics

Kathryn C. Seigfried-Spellar, Purdue University
Marcus Rogers, Computer Information & Technology, Purdue University
Danielle M. Crimmins 2184089, Purdue University

Digital Forensics Tool Selection with Multi-armed Bandit Problem

Umit Karabiyik, Sam Houston State University
Tugba Karabiyik, Sam Houston State University

Downstream Competence Challenges and Legal/Ethical Risks in Digital Forensics-2017 ADFSL Conference

Michael M. Losavio, University of Louisville

Exploring Digital Evidence with Graph Theory

Imani Palmer, University of Illinois at Urbana-Champaign
Boris Gelfand, Los Alamos National Laboratory
Roy Campbell, University of Illinois at Urbana-Champaign

Fast Filtering of Known PNG Files Using Early File Features

Sean McKeown, Napier University
Gordon Russell, Napier University
Petra Leimich, Napier University

Harnessing Predictive Models for Assisting Network Forensic Investigations of DNS Tunnels

Irvin Homem, Stockholm University
Panagiotis Papapetrou, Stockholm University

Kelihos Botnet: A Never-Ending Saga

Arsh Arora, University of Alabama, Birmingham
Max Gannon, University of Alabama, Birmingham
Gary Warner, University of Alabama, Birmingham

Source Anonymization of Digital Images: A Counter–Forensic Attack on PRNU based Source Identification Techniques

Prithviraj Sengupta, National Institute of Technology, Rourkela
Venkata Udaya Sameer, National Institute of Technology, Rourkela
Ruchira Naskar, National Institute of Technology, Rourkela
Ezhil Kalaimannan, University of West Florida

Understanding Deleted File Decay on Removable Media using Differential Analysis

James H. Jones Jr, George Mason University
Anurag Srivastava, George Mason University
Josh Mosier
Connor Anderson
Seth Buenafe