Advances in Digital Forensics III

IFIP International Conference on Digital Forensics, National Centre for Forensic Science, Orlando, Florida, January 28-January 31, 2007

  • Philip Craiger
  • Sujeet Shenoi
Conference proceedings DigitalForensics 2007
Part of the IFIP — The International Federation for Information Processing book series (IFIPAICT, volume 242)

Table of contents

  1. Front Matter
    Pages n1-xx
  2. Legal Issues

    1. Front Matter
      Pages 1-1
    2. Barbara Endicott-Popovsky, Brian Chee, Deborah Frincke
      Pages 3-19
    3. C. Swenson, C. Adams, A. Whitledge, S. Shenoi
      Pages 21-39
    4. M. Rogers, K. Scarborough, K. Frakes, C. San Martin
      Pages 41-52
  3. Insider Threat Detection

    1. Front Matter
      Pages 53-53
    2. D. Ha, S. Upadhyaya, H. Ngo, S. Pramanik, R. Chinchani, S. Mathew
      Pages 55-73
    3. Daniel Ray, Phillip Bradford
      Pages 75-86
  4. Rootkit Detection

    1. Front Matter
      Pages 87-87
    2. A. Todd, J. Benson, G. Peterson, T. Franz, M. Stevens, R. Raines
      Pages 89-105
    3. Doug Wampler, James Graham
      Pages 107-116
  5. Authorship Attribution

    1. Front Matter
      Pages 117-117
    2. Patrick Juola
      Pages 119-132
  6. Forensic Techniques

    1. Front Matter
      Pages 147-147
    2. Christopher Marberry, Philip Craiger
      Pages 149-161
    3. James Lyle, Steven Mead, Kelsey Rider
      Pages 163-177
    4. Nicole Beebe, Glenn Dietrich
      Pages 179-191
    5. Benjamin Rodriguez, Gilbert Peterson
      Pages 193-204
    6. A. Barclay, L. Watson, D. Greer, J. Hale, G. Manes
      Pages 205-214

About these proceedings

Introduction

ADVANCES IN DIGITAL FORENSICS III

Edited by: Philip Craiger and Sujeet Shenoi

Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Networked computing, wireless communications and portable electronic devices have expanded the role of digital forensics beyond traditional computer crime investigations. Practically every crime now involves some aspect of digital evidence; digital forensics provides the techniques and tools to articulate this evidence. Digital forensics also has myriad intelligence applications. Furthermore, it has a vital role in information assurance -- investigations of security breaches yield valuable information that can be used to design more secure systems.

Advances in Digital Forensics III describes original research results and innovative applications in the emerging discipline of digital forensics. In addition, it highlights some of the major technical and legal issues related to digital evidence and electronic crime investigations. The areas of coverage include:

- Legal Issues

- Insider Threat Detection

- Rootkit Detection

- Authorship Attribution

- Forensic Techniques

- File System Forensics

- Network Forensics

- Portable Electronic Device Forensics

- Evidence Analysis and Management

- Formal Methods

This book is the third volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.9 on Digital Forensics, an international community of scientists, engineers and practitioners dedicated to advancing the state of the art of research and practice in digital forensics. The book contains a selection of twenty-four edited papers from the Third Annual IFIP WG 11.9 Conference on Digital Forensics, held at the National Center for Forensic Science, Orlando, Florida, USA in the spring of 2007.

Advances in Digital Forensics III is an important resource for researchers, faculty members and graduate students, as well as for practitioners and individuals engaged in research and development efforts for the law enforcement and intelligence communities.

Philip Craiger is an Assistant Professor of Engineering Technology and Assistant Director for Digital Evidence at the National Center for Forensic Science, University of Central Florida, Orlando, Florida, USA.

Sujeet Shenoi is the F.P. Walter Professor of Computer Science and a principal with the Center for Information Security at the University of Tulsa, Tulsa, Oklahoma, USA.

Keywords

Call Records Computer Attacks Evidence Mining Management Processing Rootkits Steganography Text Threat Detection Video

Editors and affiliations

  • Philip Craiger
    • 1
  • Sujeet Shenoi
    • 2
  1. 1.University of Central FloridaOrlandoUSA
  2. 2.University of TulsaTulsaUSA

Bibliographic information

  • DOI https://doi.org/10.1007/978-0-387-73742-3
  • Copyright Information International Federation for Information Processing 2007
  • Publisher Name Springer, New York, NY
  • eBook Packages Computer Science
  • Print ISBN 978-0-387-73741-6
  • Online ISBN 978-0-387-73742-3
  • Series Print ISSN 1571-5736
  • About this book