No abstract available.
Proceeding Downloads
Building forensics in: supporting the investigation of digital criminal activities (invited talk)
Logging mechanisms that capture detailed traces of user activity, including creating, reading, updating, and deleting (CRUD) data, facilitate meaningful forensic analysis following a security or privacy breach. However, software requirements often ...
Use of organisational topologies for forensic investigations
In today's highly regulated business environment, it is becoming increasingly important that organisations implement forensic-ready systems and architectures to aid the investigation of security incidents and data breaches. Previously, different ...
Sustainable automated data recovery: a research roadmap
Digital devices contain increasingly more data and applications. This means more data to handle and a larger amount of different types of traces to recover and consider in digital forensic investigations. Both present a challenge to data recovery ...
Snap forensics: a tradeoff between ephemeral intelligence and persistent evidence collection
Digital evidence needs to be made persistent so that it can be used later. For citizen forensics, sometimes intelligence cannot or should not be made persistent forever. In this position paper, we propose a form of snap forensics by defining an elastic ...
Index Terms
- Proceedings of the 1st ACM SIGSOFT International Workshop on Software Engineering and Digital Forensics