All Stories

  1. Systematic Literature Review of EM-SCA Attacks on Encryption
  2. ChatGPT for digital forensic investigation: The good, the bad, and the unknown
  3. Offloading Network Forensic Analytics to Programmable Data Plane Switches
  4. Digital forensic investigation in the age of ChatGPT
  5. Harder, better, faster, stronger: Optimising the performance of context-based password cracking dictionaries
  6. Data Exfiltration through Electromagnetic Covert Channel of Wired Industrial Control Systems
  7. A Novel Dictionary Generation Methodology for Contextual-Based Password Cracking
  8. Application of Artificial Intelligence to Network Forensics: Survey, Challenges and Future Directions
  9. PCWQ: A Framework for Evaluating Password Cracking Wordlist Quality
  10. Identifying Internet of Things software activities using deep learning-based electromagnetic side-channel analysis
  11. TraceGen: User activity emulation for digital forensic test image generation
  12. How viable is password cracking in digital forensic investigation? Analyzing the guessability of over 3.9 billion real-world accounts
  13. Vec2UAge: Enhancing underage age estimation performance through facial embeddings
  14. A comparative study of support vector machine and neural networks for file type identification using n-gram analysis
  15. Retracing the Flow of the Stream: Investigating Kodi Streaming Services
  16. A survey exploring open source Intelligence for smarter password cracking
  17. SoK
  18. Facilitating Electromagnetic Side-Channel Analysis for IoT Investigation: Evaluating the EMvidence Framework
  19. Assessing the Influencing Factors on the Accuracy of Underage Facial Age Estimation
  20. Automated Artefact Relevancy Determination from Artefact Metadata and Associated Timeline Events
  21. Smarter Password Guessing Techniques Leveraging Contextual Information and OSINT
  22. Cutting Through the Emissions: Feature Selection from Electromagnetic Side-Channel Data for Activity Detection
  23. EMvidence: A Framework for Digital Evidence Acquisition from IoT Devices through Electromagnetic Side-Channel Analysis
  24. DeepUAge: Improving Underage Age Estimation Accuracy to Aid CSEM Investigation
  25. Improving Borderline Adulthood Facial Age Estimation through Ensemble Learning
  26. Methodology for the Automated Metadata-Based Classification of Incriminating Digital Forensic Artefacts
  27. Leveraging Electromagnetic Side-Channel Analysis for the Investigation of IoT Devices
  28. A survey of electromagnetic side-channel attacks and discussion on their case-progressing potential for digital forensics
  29. Improving the accuracy of automated facial age estimation to aid CSEM investigations
  30. Shining a light on Spotlight: Leveraging Apple's desktop search utility to recover deleted file metadata on macOS
  31. Solid State Drive Forensics: Where Do We Stand?
  32. Accuracy Enhancement of Electromagnetic Side-Channel Attacks on Computer Monitors
  33. Deduplicated Disk Image Evidence Acquisition and Forensically-Sound Reconstruction
  34. Electromagnetic side-channel attacks
  35. Deep learning at the shallow end: Malware classification for non-domain experts
  36. Digital forensic investigation of two-way radio communication equipment and services
  37. Evaluating Automated Facial Age Estimation Techniques for Digital Forensics
  38. Hierarchical Bloom Filter Trees for Approximate Matching
  39. Enabling Non-Expert Analysis OF Large Volumes OF Intercepted Network Traffic
  40. Expediting MRSH-v2 Approximate Matching with Hierarchical Bloom Filter Trees
  41. Privileged Data Within Digital Evidence
  42. Message from the WCSF 2017 Workshop Chairs
  43. EviPlant: An efficient digital forensic challenge creation, manipulation and distribution solution
  44. Behavioral Service Graphs: A formal data-driven approach for prompt investigation of enterprise and internet-wide infections
  45. Towards the Leveraging of Data Deduplication to Break the Disk Acquisition Speed Limit
  46. Behavioral Service Graphs: A Big Data Approach for Prompt Investigation of Internet-Wide Infections
  47. IPv6 security and forensics
  48. Battling the digital forensic backlog through data deduplication
  49. Increasing digital investigator availability through efficient workflow management and automation
  50. Tiered forensic methodology model for Digital Field Triage by non-digital evidence specialists
  51. On the Benefits of Information Retrieval and Information Extraction Techniques Applied to Digital Forensics
  52. Network investigation methodology for BitTorrent Sync: A Peer-to-Peer based file synchronisation service
  53. Overview of the Forensic Investigation of Cloud Services
  54. Towards the Forensic Identification and Investigation of Cloud Hosted Servers through Non-Invasive Wiretaps
  55. Welcome Message from the WCSF 2015 Workshop Organizers
  56. Project Maelstrom: Forensic Analysis of the BitTorrent-Powered Browser
  57. Forensic Analysis and Remote Evidence Recovery from Syncthing: An Open Source Decentralised File Synchronisation Utility
  58. BitTorrent Sync: Network Investigation Methodology
  59. An analysis of BitTorrent cross-swarm peer participation and geolocational distribution
  60. BitTorrent Sync: First Impressions and Digital Forensic Implications
  61. Leveraging Decentralization to Extend the Digital Evidence Acquisition Window: Case Study on Bittorrent Sync
  62. Digital Evidence Bag Selection for P2P Network Investigation
  63. Universal Peer-to-Peer Network Investigation Framework
  64. Peer-to-Peer Botnet Investigation: A Review
  65. Online Acquisition of Digital Forensic Evidence
  66. Investigating Cybercrimes that Occur on Documented P2P Networks