Cyberforensics 2013 :: Programme

:::   Monday 10th June 2013   :::

9.00 Registration

9.15 Welcome

9.20 Keynote: Tony Neate (Get Safe Online), Internet Security: Changing the behaviour of people who don't care....!

10.00 Sarah Morris (Cranfield University) and Howard Chivers (University of York), Thumbnail Cache File Fragment Identification using a Bayesian Network

 

Ross Paterson and Petra Leimich (University of Abertay Dundee), An investigation into PL/SQL Injection

 

11.15 Coffee

 

11.30 Michelle Govan (Glasgow Caledonian University), Forensic Droplets and Puddles from the Cloud

 

Olga Angelopoulou (University of Derby) and Stilianos Vidalis (University of Staffordshire), Towards 'Crime Specific' Digital Investigation Frameworks

 

George R S Weir and Richard Connor (University of Strathclyde), The importance of image similarity for criminal investigation

 

13.15 Lunch

 

14.00 Tom Coppock and Diane Gan (University of Greenwich), Forensic Investigation into Mac OS X Volatile Memory

 

Harjinder Lallie and Tim Chen (University of Warwick), GeoTract: Issues in Pattern Matching Geospatial Data on Digital Storage Systems

 

Michelle Govan (Glasgow Caledonian University), Temporal Analysis of an iMessage Communication Exchange

 

15.45 Coffee

 

16.00 Keynote: Matthew Williams (Cardiff Centre for Crime, Law & Justice), Multi-Agency Partnerships in eCrime Reduction: Mapping the Network Cooperation Space

 

Anne David and Christopher Hargreaves (Cranfield University), Detecting Tor Vidalia Bundle installation

 

17.10 Close

19.00 Conference Gala Dinner

:::   Tuesday 11th June 2013   :::

9.00 Registration

 

9.15 Gavin Hales, Ian Ferguson and Jacqueline Archibald (University of Abertay Dundee), On the use of hyperbolic visualization to assist digital forensic analysis

 

10.00 Tameem Chowdhury (University of South Wales), Stilianos Vidalis (University of Stafford) and Christopher Tubb (University of South Wales), Proactively Defending Computing Infrastructures through the Implementation of Live Forensic Capture in Corporate Network Security

 

Man Qi. Clear Up Grey Areas (Canterbury Christ Church University), Cybercrime Legislation Progress in China

 

11.15 Coffee

 

11.30 Steven Toes and Majdi Owda (Manchester Metropolitan University),Template-Based Information Extraction System for Detection of Events on Twitter

 

Vítor J. (Catholic University of Portugal), Sérgio T. de Magalhães (Catholic University of Portugal) and Henrique D. Santos (University of Minho), Feasibility Study of a Multimodal Biometric Authentication Solution Based on Pointer Dynamics and Skin Conductivity

 

Nikolaos Sarantinos & A. Al-Nemrat (University of East London), Using Statistical Sampling Methodology to investigate child pornography cases

 

13.15 Lunch

 

14.00 Mark Graham and Adrian Winckles (Anglia Ruskin University), A benchmarking performance analysis of SRTP against IPsec for securing VoIP in the LAN

 

Fletcher Bayley and Diane Gan (University of Greenwich), Forensic Analysis of Digital Attack Tool Artifacts

 

15.15 Coffee

 

15.30 Adrian Winckles and Alexander Pedersen (Anglia Ruskin University), Analyzing Botnet Component Structures to Trace a P2P Botnet Botmaster

 

16.10 Plenary discussion

 

16.40 End