กก

Program       

  • Full paper presentation:30 min (20 min for talk, 10 min for Q & A), we purposely include more time for Q & A to stimulate the discussion of the speaker and the audience.
  • Oral presentation: 20 min (15min for talk, 5 min for Q & A).
  • Single track
  • Three international well-known speakers, one from US, one from Europe, and one from Hong Kong.
  • A panel discussion on "What is next for Digital Forensics in China?" will be chaired by Prof. Liping Ding with members from local and international forensics experts.

The First International Conference on Digital Forensics and Investigation
(ICDFI, Beijing, China 2012)
Programme Schedule

 

Friday, 21 Sept., 2012

 
05:30pm - 07:00pm 
 
Conference Registration
 
06:30pm - 08:30pm 
 
Dinner
 

Saturday, 22 Sept., 2012

 
08:00am - 08:30am 
  Conference Registration
 
08:30am - 09:15am 
  Opening Ceremony
Chair: Prof. Liping Ding
Welcome speech: Prof. Lin Cheng (President of CPPSU)
Opening speech: Dr K.P. Chow
 
09:15am - 10:15am
  Keynote Speech 1
Chair: Dr K.P. Chow
Speaker: Dr Fred Cohen
"The Future of Automated Analysis (Tools and Methods) for Digital Forensics" [paper] [slides]
 
10:15am - 10:35am
  Coffee Break
10:35am - 11:35am
  Keynote Speech 2
Chair: Prof. Xu Rongsheng
Speaker: Mr Raoul Chiesa
"Digital Forensics: Experiences from the Past, Issues from the Present and Challenges from the Future" [paper] [slides]
11:35am - 01:15pm
  Lunch
 
01:15pm - 03:15pm
  Paper Session 1 (4 full papers, 30 min each)
Chair: Dr Overill Richard
  • Voice over IP and Forensics: A review of recent australian work
      Jill Slay, Matthew Simon, David Irwin [paper] [slides]
  • The development of computer forensic legal system in Mainland China
      Yonghao Mai, K.P. Chow, Rongsheng Xu, Bo Long, Zhou Gang
        [paper] [slides]
  • Digital forensic on MTK-based Shanzhai mobile phone with NAND
      Mengfei He, Junbin Fang, Zoe L. Jiang, S.M. Yiu, K.P. Chow, Xiamu Niu
        [paper] [slides]
  • Geo-Location forensics on mobile devices
      Yi Sun [paper] [slides]
  • 03:15pm - 03:35pm
     Coffee Break
    03:35pm - 04:55pm
      Paper Session 2 (2 full papers, 30 min each; 1 short paper, 20 min each)
    Chair: Dr Zhou Gang
  • From TCT to the adaptability of computer forensic tools
      Haohao Zhai, Wenchang Shi, Bin Liang, Liang Wan [paper] [slides]
  • An electronic judicial identification model based on evidence chain
      MA Guo-fu, Wang Zi-xian, Wang Kui-peng [paper]
  • Effect of electronic evidence captured by honeypots
      Yi Wang [paper] [slides]
  • 04:55pm - 05:55pm
      Panel Discussion
    Chair: Prof. Liping Ding
    "What is next for digital forensics in China?" [slides1] [slides2]
    06:30pm - 09:00pm
      Banquet
     

    Sunday, 23 Sept., 2012

    09:00am - 10:00am
      Keynote Speech 3
    Chair: Prof. Liping Ding
    Speaker: Dr Michael Kwan
    "Is Digital Forensic a Science?" [slides]
    10:00am - 10:15am
      Coffee Break
    10:15am - 12:15pm
      Paper Session 3 (4 full papers, 30 min each)
    Chair: Prof. Jill Slay
  • Forensic analysis of web browser with dual layout engine
      Linda Zhong [slides]
  • A measurement study for understanding wireless forensic monitoring
      Yongjie Cai. Ping Ji Slides_Linda_ICDFI2012 [paper] [slides]
  • Enhanced monitoring rule through direct node query for Foxy network investigation
      Ricci S.C. Ieong, K.P. Chow [slides]
  • Quantitative plausibility of the Trojan Horse Defence against possession of child pornography
      RE Overill, JAM Silomon, KP Chow, YW Law [paper] [slides]
  • 12:15pm - 01:15pm
      Lunch
    01:15pm - 02:15pm
      Paper Session 4 (2 full papers, 30 min each)
    Chair: Dr Michael Kwan
  • Extracting text from windows XP memory image
      Chen Long, Kang Lei, Dong Zhenxing [paper] [slides]
  • Temporal analysis of HFS+ and Mac OS X in digital investigations
      M.M. Wang, K.P. Chow [slides]
  • 02:15pm - 02:30pm
      Coffee Break
    02:30pm - 03:50pm
      Paper Session 5 (4 short papers, 20 min each)
    Chair: Dr Zoe Jiang Lin
  • Proxy signature scheme based on McEliece public key cryptosystem
      Zhao Cheng-cheng, Yang Ya-tao, Li Zi-chen [paper] [slides]
  • Research on Digital Forensics Based on Private Cloud Computing
      Zeng Gang [paper] [slides]
  • The security system of obtaining evidence and analyzing SaaS cloud and the research on key technology
      He Yue, Chen Ming, Zhao Xianwei
  • Thoughts and Countermeasures to the Security Issues Caused by Things of Internet
      Lu Baohua [paper] [slides]
  • 03:50pm - 04:05pm
      Closing Remarks
    Conference Chairs