Download the Call for Papers in PDF

Call for Papers

SADFE-2015

Tenth International Conference on Systematic Approaches to Digital Forensics Engineering

September 30 – October 2, 2015

Malaga, Spain

 

Organized by: University of Malaga

Invitation to submit

We invite you to SADFE-2015, the tenth international conference on Systematic Approaches to Digital Forensic Engineering to be held in Malaga, Spain, September 30 – October 2, 2015.

Digital forensics engineering and the curation of digital collections in cultural institutions face pressing and overlapping challenges related to provenance, chain of custody, authenticity, integrity, and identity. The generation, analysis and sustainability of digital evidence require innovative methods, systems and practices, grounded in solid research and understanding of user needs. The term digital forensic readiness describes systems that are build to satisfy the needs for secure digital evidence.

SADFE-2015 investigates requirements for digital forensic readiness and methods, technologies, and building blocks for digital forensic engineering. Digital forensic at SADFE focuses on variety of goals, including criminal and corporate investigations, data records produced by calibrated devices, as well as documentation of individual and organizational activities. Another focus is on challenges brought in by globalization and cross-legislation digital applications. We believe digital forensic engineering is vital to security, the administration of justice and the evolution of culture.

Topics:

We welcome previously unpublished papers on engineering approaches for digital forensics, forensic readiness, technical building blocks for secure digital evidence and digital forensics and preservation as to civil, criminal and national security investigations for use within a court of law, the execution of national policy or to aid in understanding the past and digital knowledge in general.

We discuss digital forensic principles in new areas of the information society. We hope you consider submission for this international conference.

Potential topics to be addressed by submissions include, but are not limited to:

  • Digital Data and Evidence Management: advanced digital evidence discovery, collection, management, storage and preservation
    • Identification, authentication and collection of digital evidence
    • Extraction and management of forensic data/metadata
    • Identification and redaction of personally identifying information and other forms of sensitive information
    • Post-acquisition handling of evidence and the preservation of data integrity and admissibility
    • Evidence and digital memory preservation, curation and storage
    • Architectures and processes (including network processes) that comply with forensic requirements
    • Managing geographically, politically and/or jurisdictionally dispersed data artifacts
    • Data, digital knowledge, and web mining systems for identification and authentication of relevant data
    • Botnet forensics
  • Digital Evidence, Data Integrity and Analytics: advanced digital evidence and digitized data analysis, correlation, and presentation
    • Advanced search, analysis, and presentation of digital evidence
    • Cybercrime scenario analysis and reconstruction technologies
    • Legal case construction and digital evidence support
    • Cyber-crime strategy analysis and modeling
    • Combining digital and non-digital evidence
    • Supporting both qualitative and statistical evidence
    • Computational systems and computational forensic analysis
    • Digital evidence in the face of encryption
    • Forensic-support technologies: forensic-enabled and proactive monitoring/response
  • Forensics of embedded or non-traditional devices (e.g. digicams, cell phones, SCADA, obsolete storage media)
    • Innovative forensic engineering tools and applications
    • Proactive forensic-enabled support for incident response
    • Forensic tool validation: methodologies and principles
    • Legal and technical collaboration
    • Digital forensics surveillance technology and procedures
    • “Honeypot” and other target systems for data collection and monitoring
    • Quantitative attack impact assessment
    • Comprehensive fault analysis, including, but not limited to, DFE study of broad realistic system and digital knowledge failures, criminal and non-criminal, with comprehensive DFE (malicious/non-malicious) analysis in theory, methods, and practices.
  • Forensic and digital data integrity issues for digital preservation and recovery, including
    • Technological challenges
    • Legal and ethical challenges
    • Economic challenges
    • Institutional arrangements and workflows
    • Political challenges and
    • Cultural and professional challenges
  • Scientific Principle-Based Digital Forensic Processes: systematic engineering processes supporting digital evidence management which are sound on scientific, technical and legal grounds
    • Legal/technical aspects of admissibility and evidence tests
    • Examination environments for digital data
    • Courtroom expert witness and case presentation
    • Case studies illustrating privacy, legal and legislative issues
    • Forensic tool validation: legal implications and issues
    • Legal and privacy implications for digital and computational forensic analysis
    • Handling increasing volumes of digital discovery
    • New Evidence Decisions, e.g., United States v. Jones, _ U.S._ (2012) and United States v. Kotterman, _ F.3d _ (9th Cir. 2013)
    • Computational Forensics and Validation
    • Transnational Investigations/Case Integration under the Convention on Cybercrime of the Council of Europe
    • Issues in Forensic Authentication and Validation.
  • Legal, Ethical and Technical Challenges
    • The forensic, policy and ethical implications of The Internet of Things, The “Smart City,” “Big Data” or Cloud systems

Important dates: 

Extended Paper Due Date: July 14th, 2015 (no more extensions will be granted)

Acceptance Notification Date: August 25th, 2015

Final Paper: September 8th, 2015

Conference: September 30th – October 2nd, 2015

Publication

SADFE-2015 papers will be published in the Journal of Digital Forensics, Security and Law (JDFSL) and will undergo a double-blind review process.

Best paper award

A Best Paper Award will be made for the final papers.

Submission Instructions

Manuscripts submitted are expected to be:

  • new and original,
  • well organized and clearly written,
  • of interest to the academic and research communities,
  • not published previously, and
  • not under consideration for publication in any other journal or book

PLEASE NOTE: To be published an author of an accepted paper is required to register for the conference. Non-refundable registration fees must be paid prior to uploading the final JDFSL formatted, publication-ready version of the paper.

All submissions should be written in English with a maximum paper length of six (6) printed pages (minimum 10-point font) including figures, without incurring additional page charges.

To ensure a blinded review process, the following information should be excluded from the submission:

  • Authors Names section
  • Biography section
  • Acknowledgments section (if it contains information identifying the authors).

If an article is accepted, author(s) must provide a version in either Microsoft Word or LaTeX with graphics (figures) in GIF, TIF, or PowerPoint formats. Permissions for reprinted material are the sole responsibility of the author(s) and must be obtained in writing prior to publication.

Templates are available for

Microsoft Word: www.jdfsl.org/files/JDFSL-Template-2014.docx

LaTeX: http://www.jdfsl.org/files/jdfsl-template-unzip-first.zip

Only PDF files will be accepted for the review process, and all submissions must be done through Easychair. The submission site is already open. Visit the SADFE 2015 EasyChair submission page to submit your manuscripts.

Organization


General Chair: Antonio Maña (University of Malaga) 


Program Committee Co-Chairs:
Carsten Rudolph (Huawei European Research Center)
Nicolai Kuntze (Huawei European Research Center)
Barbara Endicott-Popovsky (University of Washington)


Publication Chair: Ibrahim Baggili (University of New Haven)


Publicity Chair Europe: Joe Cannataci (University of Malta)
Publicity Chair North-America: Dave Dampier (Mississippi State University)
Publicity Chair Asia: Ricci Ieong (University of Hong Kong)


Steering Committee:
Deborah Frincke, Co-Chair (Department of Defense)
Ming-Yuh Huang, Co-Chair (Northwest Security Institute)
Michael Losavio (University of Louisville)
Alec Yasinsac (University of South Alabama)
Robert F. Erbacher (Army Research Laboratory)
Wenke Lee (George Institute of Technology)
Barbara Endicott-Popovsky (University of Washington)
Roy Campbell (University of Illinois, Urbana/Champaign)
Yong Guan (Iowa State University)


 

Program Committee

SudhirAggarwalFlorida State Universitysudhir@cs.fsu.edu
GalinaBorisevitchPerm State University kafedra-upik-pgniu@yandex.ru
FrankBreitingerUniversity of New HavenFBreitinger@newhaven.edu
JosephCannatacciUniversity of Groningenj.a.cannataci@rug.nl
LongChenChongqing University of Posts and Telecommunicationschenlong@cqupt.edu.cn
RaymondChooUniversity of South AustraliaRaymond.Choo@unisa.edu.au
K.P.ChowUniversity of Hong Kongchow@cs.hku.hk
DavidDampierMississippi State Universitydampier@cse.msstate.edu
HervéDebarFrance Telecom R&Dherve.debar@telecom-sudparis.eu
BarbaraEndicott-PopovskyUniversity of Washingtonendicott@u.washington.edu
RobertErbacherNorthwest Security Instituterobert.erbacher@gmail.com
XinwenFuUMass Lowellxinwenfu@cs.uml.edu
SimsonGarfinkelNaval Postgraduate Schoolslgarfin@nps.edu
BradGlissonUniversity of GlasgowBrad.Glisson@glasgow.ac.uk
LambertGroßkopfUniversität Bremengrosskopf@uni-bremen.de
YongGuanIowa State Universityguan@iastate.edu
BarbaraGuttmanNational Institute for Standards and Technology (USA)Barbara.guttman@nist.gov
BrianHayUniversity of Alaska, Fairbanksbrian.hay@alaska.edu
JeremyJohnBritish LibraryJeremy.john@bl.uk
PingJiJohn Jay College Of Criminal Justicepji@jjay.cuny.edu; pj.ping@gmail.com
Andrina Y.L.LinMinistry of Justice Investigation Bureau, Taiwanandrinalin@gmail.com
PinxinLiuRenmin University of China Law Schoolliupinxin@263.net
MichaelLosavioUniversity of Louisvillemichael.losavio@louisville.edu
DavidManzPNNLDavid.Manz@pnnl.gov
NasirMemonPolytechnic Institute of NYUmemon@nyu.edu
MariofannaMilanovaUniversity of Arkansas at Little Rockmgmilanova@ualr.edu
CarstenMomsenLeibniz Universität Hannovercarsten.momsen@jura.uni-hannover.de
KaraNanceUniversity of Alaska, Fairbanksklnance@alaska.edu
MingOuyangUniversity of Louisville 
GilbertPetersonAir Force Institute of TechnologyGilbert.Peterson@afit.edu
SlimRekhisUniversity of CarthageSlim.rekhis@gmail.com
GoldenRichardUniversity of New Orleansgolden@cs.uno.edu
CorinneRogersUniversity of British ColumbiaCorinne.rogers@gmail.com
AhmedSalemHood Collegesalem@hood.edu
ViolaSchmidTechnische Universität Darmstadtschmid@jus.tu-darmstadt.de
ClayShieldsGeorgetown Universityclay@cs.georgetown.edu
VrizlynnThingInstitute for Infocomm Research, Singaporevriz@i2r.a-star.edu.sg
SeanThorpeUniversity  of  Technology, JamaicaThorpe.sean@gmail.com
William (Bill)UnderwoodGeorgia TechWilliam.Underwood@gtri.gatech.edu
WietseVenemaIBM Researchwietse@porcupine.org
HeinVenterUniversity of Pretoriaheinventer@gmail.com
Xinyuan (Frank)WangGeorge Mason Universityxwangc@gmu.edu
KamWoodsUniversity of North Carolinakamwoods@email.unc.edu
YangXiangDeakin University, Australiayang@deakin.edu.au
FeiXuInst. of Information Eng., Chinese Academy of Sciencesxufei@iie.ac.cn
AlecYasinsacUniversity of South Alabamayasinsac@gmail.com
SMYiuHong Kong Universitysmyiu@cs.hku.hk
WeiYuTowson Universityyuwei123@yahoo.com
NanZhangGeorge Washington Universitynzhang10@gwu.edu

 

Contact Information:


Antonio Maña, University of Malaga,
amg@lcc.uma.es
+34 951 952 940


Michael Losavio, University of Louisville,
michael.losavio@louisville.edu
+1 502 852 3509