กก |
Program
-
Full paper presentation:30 min (20 min for talk, 10 min for Q & A), we purposely include more time for Q & A to stimulate the discussion of the speaker and the audience.
- Oral presentation: 20 min (15min for talk, 5 min for Q & A).
- Single track
-
Three international well-known speakers, one from US, one from Europe, and one from Hong Kong.
-
A panel discussion on "What is next for Digital Forensics in China?" will be chaired by Prof. Liping Ding with members from local and international forensics experts.
The First International Conference on Digital Forensics and Investigation (ICDFI, Beijing, China 2012) Programme Schedule
| Friday, 21 Sept., 2012 |
| 05:30pm - 07:00pm | |
Conference Registration |
| 06:30pm - 08:30pm | |
Dinner |
| Saturday, 22 Sept., 2012 |
| 08:00am - 08:30am | |
Conference Registration |
| 08:30am - 09:15am | |
Opening Ceremony
Chair: Prof. Liping Ding
Welcome speech: Prof. Lin Cheng (President of CPPSU)
Opening speech: Dr K.P. Chow
|
| 09:15am - 10:15am | |
Keynote Speech 1
Chair: Dr K.P. Chow
Speaker: Dr Fred Cohen
"The Future of Automated Analysis (Tools and Methods) for Digital Forensics"
[paper]
[slides]
|
| 10:15am - 10:35am | |
Coffee Break |
|
10:35am - 11:35am | |
Keynote Speech 2
Chair: Prof. Xu Rongsheng
Speaker: Mr Raoul Chiesa
"Digital Forensics: Experiences from the Past, Issues from the Present and Challenges from the Future"
[paper]
[slides]
|
| 11:35am - 01:15pm | |
Lunch |
| 01:15pm - 03:15pm | |
Paper Session 1 (4 full papers, 30 min each)
Chair: Dr Overill Richard
Voice over IP and Forensics: A review of recent australian work
Jill Slay, Matthew Simon, David Irwin
[paper]
[slides]
The development of computer forensic legal system in Mainland China
Yonghao Mai, K.P. Chow, Rongsheng Xu, Bo Long, Zhou Gang
[paper]
[slides]
Digital forensic on MTK-based Shanzhai mobile phone with NAND
Mengfei He, Junbin Fang, Zoe L. Jiang, S.M. Yiu, K.P. Chow, Xiamu Niu
[paper]
[slides]
Geo-Location forensics on mobile devices
Yi Sun
[paper]
[slides]
|
| 03:15pm - 03:35pm | | Coffee Break |
| 03:35pm - 04:55pm | |
Paper Session 2 (2 full papers, 30 min each; 1 short paper, 20 min each)
Chair: Dr Zhou Gang
From TCT to the adaptability of computer forensic tools
Haohao Zhai, Wenchang Shi, Bin Liang, Liang Wan
[paper]
[slides]
An electronic judicial identification model based on evidence chain
MA Guo-fu, Wang Zi-xian, Wang Kui-peng
[paper]
Effect of electronic evidence captured by honeypots
Yi Wang
[paper]
[slides]
|
| 04:55pm - 05:55pm | |
Panel Discussion
Chair: Prof. Liping Ding
"What is next for digital forensics in China?"
[slides1]
[slides2]
|
| 06:30pm - 09:00pm | |
Banquet |
| Sunday, 23 Sept., 2012 |
| 09:00am - 10:00am | |
Keynote Speech 3
Chair: Prof. Liping Ding
Speaker: Dr Michael Kwan
"Is Digital Forensic a Science?"
[slides]
|
| 10:00am - 10:15am | |
Coffee Break |
| 10:15am - 12:15pm | |
Paper Session 3 (4 full papers, 30 min each)
Chair: Prof. Jill Slay
Forensic analysis of web browser with dual layout engine
Linda Zhong
[slides]
A measurement study for understanding wireless forensic monitoring
Yongjie Cai. Ping Ji Slides_Linda_ICDFI2012
[paper]
[slides]
Enhanced monitoring rule through direct node query for Foxy network investigation
Ricci S.C. Ieong, K.P. Chow
[slides]
Quantitative plausibility of the Trojan Horse Defence against possession of child pornography
RE Overill, JAM Silomon, KP Chow, YW Law
[paper]
[slides]
|
| 12:15pm - 01:15pm | |
Lunch |
| 01:15pm - 02:15pm | |
Paper Session 4 (2 full papers, 30 min each)
Chair: Dr Michael Kwan
Extracting text from windows XP memory image
Chen Long, Kang Lei, Dong Zhenxing
[paper]
[slides]
Temporal analysis of HFS+ and Mac OS X in digital investigations
M.M. Wang, K.P. Chow
[slides]
|
| 02:15pm - 02:30pm | |
Coffee Break |
| 02:30pm - 03:50pm | |
Paper Session 5 (4 short papers, 20 min each)
Chair: Dr Zoe Jiang Lin
Proxy signature scheme based on McEliece public key cryptosystem
Zhao Cheng-cheng, Yang Ya-tao, Li Zi-chen
[paper]
[slides]
Research on Digital Forensics Based on Private Cloud Computing
Zeng Gang
[paper]
[slides]
The security system of obtaining evidence and analyzing SaaS cloud and the research on key technology
He Yue, Chen Ming, Zhao Xianwei
Thoughts and Countermeasures to the Security Issues Caused by Things of Internet
Lu Baohua
[paper]
[slides]
|
| 03:50pm - 04:05pm | |
Closing Remarks
Conference Chairs
|
|