Hi, my name is Jens-Petter Sandvik and I’m a PhD student at Norwegian University of Science and Technology (NTNU for short). In addition to trying to finish a PhD, I’m working for the Norwegian police in the national cyber crime … Read more
Hello, and welcome to our talk on Time Well-Spent: Precision Timing, Monotonic Clocks, and the PowerLogs Database for iOS.
As you might’ve guessed, we both work for Magnet Forensics, and this is the story of our research journey through PowerLogs … Read more
Human complexity lies at the heart of so much of digital forensics – both the artifacts that offer insights into people’s motives, means, and opportunity to commit wrongdoing, and the investigations that reveal them.
Our research roundup for the end … Read more
Matthew: Welcome to our presentation. I’m Matthew Piscitelli.
Tyler: And I’m Tyler Thomas.
Matthew: And we performed memory forensics on USB attack platforms. This work was supported by National Science Foundation Grant number 1921813. We looked at two USB … Read more
This month’s roundup features an eclectic assortment of research on mobile, IoT, and vehicular devices, as well as file forensics, image forensics, and threat detection. Much of this research explores novel acquisition techniques for newer technologies, although new methods for … Read more
Hello everyone. Wei Yichen from the University of Hong Kong. Today I’m going to introduce our paper about insider threat prediction based on Unsupervised Anomaly Detection Scheme for Proactive Forensic Investigation.
Let’s start with the motivation of our research. According … Read more
The Forensic Aspects of Analysis of Deepfake Videos Based on AI Algorithms
Zeno Geradts: Good morning. I would like to present Forensic Aspects of deepfakes. So this is a short presentation of five minutes and I will shortly go through … Read more
Digital forensics research last month fell fairly neatly into two categories, each of which sought to solve bigger problems in the field. In the first category is ensuring quality via frameworks such as service levels, better supporting first responders, reporting, … Read more
The month of May saw a robust, diverse set of academic papers published. Tools and techniques are as present as ever — focusing that month on Windows 10 and mobile malware — but so are discussions about how to ensure … Read more
Our brief roundup this month looks at seven recent papers, which look at improving malware detection and acquisition, analyzing instant messaging apps and the Zoom platform, the future of digital forensics tools and practice, and finally, a framework for forensic … Read more
Digital forensics research often depends on casework: specific problems with a device, operating system, app, or artifact that a forensic examiner needs to solve.
That isn’t always the case, though. Sometimes the problem has a broader scope, or the examiner … Read more
First published June 2010
by Dr Chris Hargreaves, lecturer at the Centre for Forensic Computing at Cranfield University in Shrivenham, UK