Difference between pages "Java" and "Upcoming events"

From ForensicsWiki
(Difference between pages)
Jump to: navigation, search
(External Links)
 
(Conferences)
 
Line 1: Line 1:
{{Expand}}
+
<b>PLEASE READ BEFORE YOU EDIT THE LISTS BELOW</b><br>
 +
When events begin the same day, events of a longer length should be listed first.  New postings of events with the same date(s) as other events should be added after events already in the list. Please use three-letter month abbreviations (i.e. Sep, NOT Sept. or September), use two digit dates (i.e. Jan 01 NOT Jan 1), and use date ranges rather than listing every date during an event(i.e. Jan 02-05, NOT Jan 02, 03, 04, 05).<br>
 +
<i>Some events may be <u>limited</u> to <b>Law Enforcement Only</b> or to a specific audience.  Such restrictions should be noted when known.</i>
  
== Java WebStart Cache ==
+
This is a BY DATE listing of upcoming events relevant to [[digital forensics]].  It is not an all inclusive list, but includes most well-known activities.  Some events may duplicate events on the generic [[conferences]] page, but entries in this list have specific dates and locations for the upcoming event.
As of Java version 6 the Java WebStart Cache can be found in the following locations.
+
  
On Linux for user accounts:
+
This listing is divided into three sections (described as follows):<br>
<pre>
+
<ol><li><b><u>[[Upcoming_events#Calls_For_Papers|Calls For Papers]]</u></b> - Calls for papers for either Journals or for Conferences, relevant to Digital Forensics (Name, Closing Date, URL)</li><br>
/home/$USER/.java/deployment/cache/
+
<li><b><u>[[Upcoming_events#Conferences|Conferences]]</u></b> - Conferences relevant for Digital Forensics (Name, Date, Location, URL)</li><br>
</pre>
+
<li><b><u>[[Training Courses and Providers]]</u></b> - Training </li><br></ol>
  
On MacOS-X for user accounts:
+
== Calls For Papers ==
<pre>
+
Please help us keep this up-to-date with deadlines for upcoming conferences that would be appropriate for forensic research.
/Users/$USER/Library/Caches/Java/cache/
+
</pre>
+
  
On Windows XP  for user accounts:
+
{| border="0" cellpadding="2" cellspacing="2" align="top"
<pre>
+
|- style="background:#bfbfbf; font-weight: bold"
C:\Documents and Settings\%USERNAME%\Application Data\Sun\Java\Deployment\cache\
+
! width="30%|Title
</pre>
+
! width="15%"|Due Date
 
+
! width="15%"|Notification Date
On Windows Vista and later for user accounts:
+
! width="40%"|Website
<pre>
+
C:\Users\%USERNAME%\AppData\LocalLow\Sun\Java\Deployment\cache\
+
</pre>
+
 
+
On Windows Vista and later for system accounts:
+
<pre>
+
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Sun\Java\Deployment\cache\
+
</pre>
+
 
+
On Windows Vista and later for system accounts using SysWOW64:
+
<pre>
+
C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Sun\Java\Deployment\cache\
+
</pre>
+
 
+
Note: there also can be an additional SystemCache directory e.g. on Windows Vista and later for user accounts:
+
<pre>
+
C:\Users\%USERNAME%\AppData\LocalLow\Sun\Java\Deployment\SystemCache\
+
</pre>
+
 
+
Note that if JAR files are cached it does not imply that they have been executed. The behavior seen with Microsoft Internet Explorer in combination with JRE 1.7 in high security mode is that it will download the JAR file and then prompt the user if he/she want to execute the Java applet.
+
 
+
== IDX file format ==
+
Caveat: The following information is based on analysis of several dozen *.idx files from different Windows 7 systems.  As such, the following information should not be considered to have been exhaustively researched.
+
 
+
Values are in big-endian.
+
 
+
<pre>
+
00000000  01 00 00 00 02 5b 00 00  00 00 1d c7 b4 00 00 01  |.....[..........|
+
00000010  1f 81 29 fe b8 00 00 00  00 00 00 00 00 00 00 01  |..).............|
+
00000020  2b 24 4a cb dd 01 00 00  00 00 00 00 00 00 00 00  |+$J.............|
+
00000030  00 00 00 00 00 00 00 00  01 2b 24 4a a4 cd 00 00  |.........+$J....|
+
00000040  01 2e 45 83 f4 18 00 00  00 00 00 00 00 00 00 01  |..E.............|
+
00000050  01 00 00 00 00 00 00 00  00 00 00 00 01 2b 24 4a  |.............+$J|
+
00000060  a4 cd 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
+
00000070  00 00 00 00 00 00 00 00  00 00 00 00 00 00 00 00  |................|
+
</pre>
+
 
+
The header (or section 1) is 128 bytes in size and contains:
+
{| class="wikitable"
+
! align="left"| Offset
+
! Size
+
! Value
+
! Description
+
 
|-
 
|-
| 0
+
|CyberPatterns 2014
| 1
+
|Jan 03, 2014
|
+
|Jan 17, 2014
| Busy (flag byte)
+
|http://tech.brookes.ac.uk/CyberPatterns2014/CFPCyberpatterns2014.pdf
 
|-
 
|-
| 1
+
|12th International Conference on Applied Cryptography and Network Security
| 1
+
|Jan 10, 2014
|
+
|Mar 14, 2014
| Incomplete (flag byte)
+
|http://acns2014.epfl.ch/callpapers.php
 
|-
 
|-
| 2
+
|9th Annual Conference on Digital Forensics, Security and Law
| 4
+
|Jan 15, 2014
| 00 00 02 5b (603)
+
| Format version
+
|-
+
| 6
+
| 1
+
|
+
| Force update (flag byte)
+
|-
+
| 7
+
| 1
+
|
+
| No-href (flag byte)
+
|-
+
| 8
+
| 1
+
 
|
 
|
| Is shortcut image (flag byte)
+
|http://www.digitalforensics-conference.org/callforpapers.htm
 
|-
 
|-
| 9
+
|2nd ACM Workshop on Information Hiding and Multimedia Security
| 4
+
|Jan 17, 2014
|
+
|Mar 31, 2014
| Content-Length
+
|http://www.ihmmsec.org/index.php/cfp
 
|-
 
|-
| 13
+
|USENIX Annual Technical Conference
| 8
+
|Jan 28, 2014
| 00 00 01 1f 81 29 fe b8
+
|Apr 07, 2014
| Last modification date (Number of milli seconds since Jan 1, 1970 00:00:00)
+
|https://www.usenix.org/conference/atc14/call-for-papers
 
|-
 
|-
| 21
+
|Audio Engineering Society (AES) Conference on Audio Forensics
| 8
+
|Jan 31, 2014
|
+
|Mar 15, 2014
| expiration date (Number of milli seconds since Jan 1, 1970 00:00:00) 0 if not expires?
+
|http://www.aes.org/conferences/54/downloads/54thCallForContributions.pdf
 
|-
 
|-
| 29
+
|DFRWS - USA 2014
| 8
+
|Feb 13, 2014
| 00 00 01 2b 24 4a cb dd
+
|Apr 07, 2014
| Validation timestamp (Number of milli seconds since Jan 1, 1970 00:00:00)
+
|http://dfrws.org/2014/cfp.shtml
 
|-
 
|-
| 37
+
|Symposium On Usable Privacy and Security
| 1
+
|Feb 28, 2014 (Register) / Mar 06, 2014 (Submit)
|
+
|May 05, 2014
| Known to be signed (flag byte)
+
|http://cups.cs.cmu.edu/soups/2014/cfp.html
 
|-
 
|-
| 38
+
|6th International Conference on Digital Forensics & Cyber Crime
| 4
+
|May 16, 2014
|
+
|Jul 30, 2014
| Size of section 2
+
|http://d-forensics.org/2014/show/cf-calls
 
|-
 
|-
| 42
+
|}
| 4
+
 
|
+
See also [http://www.wikicfp.com/cfp/servlet/tool.search?q=forensics WikiCFP 'Forensics']
| Size of section 3
+
 
 +
== Conferences ==
 +
{| border="0" cellpadding="2" cellspacing="2" align="top"
 +
|- style="background:#bfbfbf; font-weight: bold"
 +
! width="40%"|Title
 +
! width="20%"|Date/Location
 +
! width="40%"|Website
 
|-
 
|-
| 46
+
|IFIP WG 11.9 International Conference on Digital Forensics
| 4
+
|Jan 08-10<br>Vienna, Austria
|
+
|http://www.ifip119.org/Conferences/
| Size of section 4
+
 
|-
 
|-
| 50
+
|AAFS 66th Annual Scientific Meeting
| 4
+
|Feb 17-22<br>Seattle, WA, USA
|
+
|http://www.aafs.org/aafs-66th-annual-scientific-meeting
| Size of section 5
+
 
|-
 
|-
| 54
+
|21st Network & Distributed System Security Symposium
| 8
+
|Feb 23-26<br>San Diego, CA, USA
| 00 00 01 2b 24 4a a4 cd
+
|http://www.internetsociety.org/events/ndss-symposium
| Blacklist validation time (Number of milli seconds since Jan 1, 1970 00:00:00)
+
 
|-
 
|-
| 62
+
|Fourth ACM Conference on Data and Application Security and Privacy 2014
| 8
+
|Mar 03-05<br>San Antonio, TX, USA
| 00 00 01 2e 45 83 f4 18
+
|http://www1.it.utsa.edu/codaspy/
| Certificate expiration date (Number of milli seconds since Jan 1, 1970 00:00:00)
+
 
|-
 
|-
| 70
+
|9th International Conference on Cyber Warfare and Security (ICCWS-2014)
| 1
+
|Mar 24-25<br>West Lafayette, IN, USA
|
+
|http://academic-conferences.org/iciw/iciw2014/iciw14-home.htm
| Class verification status
+
 
|-
 
|-
| 71
+
|CyberPatterns 2014
| 4
+
|Apr 11<br>Oxford, United Kingdom
|
+
|http://tech.brookes.ac.uk/CyberPatterns2014/
| Reduced manifest size
+
 
|-
 
|-
| 75
+
|US Cyber Crime Conference 2014
| 4
+
|Apr 29-May 02<br>Leesburg, VA
|
+
|http://www.usacybercrime.com/
| section4Pre15Length?
+
 
|-
 
|-
| 79
+
|DFRWS-Europe 2014
| 1
+
|May 07-09<br>Amsterdam, Netherlands
|
+
|http://dfrws.org/2014eu/index.shtml
| Has only signed entries (flag byte)
+
 
|-
 
|-
| 80
+
|8th International Conference on IT Security Incident Management & IT Forensics
| 1
+
|May 12-14<br>Muenster, Germany
|
+
|http://www1.gi-ev.de/fachbereiche/sicherheit/fg/sidar/imf/imf2014/
| Has single code source (flag byte)
+
 
|-
 
|-
| 81
+
|2014 IEEE Symposium on Security and Privacy
| 4
+
|May 16-23<br>Berkley, CA, USA
|
+
|http://www.ieee.org/conferences_events/conferences/conferencedetails/index.html?Conf_ID=16517
| section4CertsLength?
+
 
|-
 
|-
| 85
+
|9th ADFSL Conference on Digital Forensics, Security and Law
| 4
+
|May 28-29<br>Richmond, VA
|
+
|http://www.digitalforensics-conference.org/
| section4SignersLength?
+
 
|-
 
|-
| 89
+
|Techno-Security and Forensics Conference
| 1
+
|Jun 01-04<br>Myrtle Beach, SC, USA
|
+
|http://www.techsec.com/html/Security%20Conference%202014.html
| Has missing signed entries (flag byte)
+
 
|-
 
|-
| 90
+
|Mobile Forensics World
| 8
+
|Jun 01-04<br>Myrtle Beach, SC, USA
| 00 00 01 2b 24 4a a4 cd
+
|http://www.techsec.com/html/MFC-2014-Spring.html
| Trusted libraries validation time (Number of milli seconds since Jan 1, 1970 00:00:00)
+
 
|-
 
|-
| 98
+
|12th International Conference on Applied Cryptography and Network Security
| 4
+
|Jun 10-13<br>Lausanne, Switzerland
|
+
|http://acns2014.epfl.ch/
| reducedManifest2Length?
+
 
|-
 
|-
| 102
+
|2nd ACM Workshop on Information Hiding and Multimedia Security
| 26
+
|Jun 11-13<br>Salzburg, Austria
|
+
|http://www.ihmmsec.org/
| Unknown, empty values (likely reserved for future expansion of the header)
+
|}
+
 
+
The values present in the header are dependent on the version. The definition above is based on version 603 and intended as an example check the [https://github.com/woanware/javaidx/blob/master/Documents/Java.IDX.Format.pdf Java IDX Format Specification] for more current information.
+
 
+
To convert a timestamp in e.g. Python
+
<pre>
+
print datetime.datetime(1970, 1, 1) + datetime.timedelta(milliseconds=0x011f8129feb8)
+
2009-02-16 22:17:07
+
</pre>
+
 
+
<pre>
+
00000080  00 00 00 39 68 74 74 70  3a 2f 2f 77 77 77 2e 74  |...9http://www.t|
+
00000090  6f 70 63 6f 64 65 72 2e  63 6f 6d 2f 63 6f 6e 74  |opcoder.com/cont|
+
000000a0  65 73 74 2f 63 6c 61 73  73 65 73 2f 43 6f 6e 74  |est/classes/Cont|
+
000000b0  65 73 74 41 70 70 6c 65  74 2e 6a 61 72          |estApplet.jar  |
+
</pre>
+
 
+
{| class="wikitable"
+
! align="left"| Offset
+
! Size
+
! Value
+
! Description
+
 
|-
 
|-
| 128
+
|54th Conference on Audio Forensics
| 2
+
|Jun 12-14<br>London, England
| 00 00
+
|http://www.aes.org/conferences/54/
| Version string size
+
 
|-
 
|-
| 130
+
|2014 USENIX Annual Technical Conference
| 2
+
|Jun 19-20<br>Philadelphia, PA, USA
| 00 39
+
|https://www.usenix.org/conference/atc14
| Original URL string size
+
 
|-
 
|-
| 132
+
|44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks
| size
+
|Jun 23-26<br>Atlanta, GA, USA
|
+
|http://www.dsn.org/
| Original URL string (UTF-8 without an end-of-string character?)
+
|}
+
 
+
<pre>
+
000000b0                                          00 00 00  |             ...|
+
000000c0  0c 36 36 2e 33 37 2e 32  31 30 2e 38 36 00 00 00  |.66.37.210.86  |
+
</pre>
+
 
+
{| class="wikitable"
+
! align="left"| Offset
+
! Size
+
! Value
+
! Description
+
 
|-
 
|-
| ...
+
|Symposium On Usable Privacy and Security (SOUPS) 2014
| 2
+
|Jul 09-11<br>Menlo Park, CA, USA
| 00 00
+
|http://cups.cs.cmu.edu/soups/2014/
| Namespace string size
+
 
|-
 
|-
| ...
+
|Black Hat USA 2014
| 2
+
|Aug 02-07<br>Las Vegas, NV, USA
| 00 0c
+
|https://www.blackhat.com
| IP string size
+
 
|-
 
|-
| ...
+
|DFRWS 2014
| size
+
|Aug 03-06<br>Denver, CO, USA
|
+
|http://dfrws.org/2014/index.shtml
| IP string (UTF-8 without an end-of-string character?)
+
|}
+
 
+
<pre>
+
000000c0                                          00 00 00  |            ...|
+
000000d0  07 00 06 3c 6e 75 6c 6c  3e 00 0f 48 54 54 50 2f  |...<null>..HTTP/|
+
000000e0  31 2e 31 20 32 30 30 20  4f 4b 00 0e 63 6f 6e 74  |1.1 200 OK..cont|
+
000000f0  65 6e 74 2d 6c 65 6e 67  74 68 00 07 31 39 35 31  |ent-length..1951|
+
00000100  36 36 38 00 0d 6c 61 73  74 2d 6d 6f 64 69 66 69  |668..last-modifi|
+
00000110  65 64 00 1d 4d 6f 6e 2c  20 31 36 20 46 65 62 20  |ed..Mon, 16 Feb |
+
00000120  32 30 30 39 20 32 32 3a  31 37 3a 30 37 20 47 4d  |2009 22:17:07 GM|
+
00000130  54 00 0c 63 6f 6e 74 65  6e 74 2d 74 79 70 65 00  |T..content-type.|
+
00000140  18 61 70 70 6c 69 63 61  74 69 6f 6e 2f 6a 61 76  |.application/jav|
+
00000150  61 2d 61 72 63 68 69 76  65 00 04 64 61 74 65 00  |a-archive..date.|
+
00000160  1d 53 61 74 2c 20 31 38  20 53 65 70 20 32 30 31  |.Sat, 18 Sep 201|
+
00000170  30 20 31 30 3a 30 31 3a  30 36 20 47 4d 54 00 06  |0 10:01:06 GMT..|
+
00000180  73 65 72 76 65 72 00 06  41 70 61 63 68 65 00 1b  |server..Apache..|
+
00000190  64 65 70 6c 6f 79 2d 72  65 71 75 65 73 74 2d 63  |deploy-request-c|
+
000001a0  6f 6e 74 65 6e 74 2d 74  79 70 65 00 1a 61 70 70  |ontent-type..app|
+
000001b0  6c 69 63 61 74 69 6f 6e  2f 78 2d 6a 61 76 61 2d  |lication/x-java-|
+
000001c0  61 72 63 68 69 76 65 1f  8b 08 00 00 00 00 00 00  |archive.........|
+
...
+
</pre>
+
 
+
{| class="wikitable"
+
! align="left"| Offset
+
! Size
+
! Value
+
! Description
+
 
|-
 
|-
| ...
+
|RCFG GMU 2014
| 4
+
|Aug 04-08<br>Fairfax, VA, USA
|
+
|http://www.rcfg.org/gmu/
| Number of header value pairs
+
 
|-
 
|-
| ...
+
|23rd USENIX Security Symposium
| ...
+
|Aug 20-22<br>San Diego, CA, USA
|
+
|https://www.usenix.org/conferences
| Array of header value pairs
+
|}
+
 
+
A value pair is variable of size and consists of:
+
{| class="wikitable"
+
! align="left"| Offset
+
! Size
+
! Value
+
! Description
+
 
|-
 
|-
| 0
+
|2014 HTCIA International Conference & Training Expo
| 2
+
|Aug 25-27<br>Austin, TX
|
+
|http://www.htcia.org/2013/11/2014-htcia-international-conference-training-expo/
| Header value identifier string size
+
 
|-
 
|-
| 2
+
|6th International Conference on Digital Forensics & Cyber Crime
| size
+
|Sep 18-20<br>New Haven, CT
|
+
|http://d-forensics.org/2014/show/home
| Header value identifier string
+
 
|-
 
|-
| ...
+
|25th Annual Conference & Digital Multimedia Evidence Training Symposium
| 2
+
|Oct 06-10<br>Coeur d’Alene, ID, USA
|
+
|http://www.leva.org/annual-training-conference/
| Header value string size
+
 
|-
 
|-
| ...
 
| size
 
|
 
| Header value string
 
 
|}
 
|}
  
For the example above the size of the URL string can be found at offset 130 (0x82). The first 4 string values to extract from this data are prefaced with their lengths (or sizes) as 16-bit big-endian values. E.g. to retrieve the original URL string, read the WORD at offset 0x82, and translate it as a big-endian value (e.g. using Perl, <i>unpack("n",$data)</i>). Beginning at offset 0x84, the string is 57 (0x39) bytes long. At the end of that string, the next WORD is the length of the third string, also in big-endian format.
+
==See Also==
 
+
* [[Training Courses and Providers]]
Once you've completed reading the initial 4 strings, there is a DWORD value which can be interpreted as the number of header values, followed by the individual header value definitions. Each header value definition consists of an identifier and a value string. Both strings are prefaced by a 16-bit big-endian (2-byte) value, containing the length of the string.
+
==References==
 
+
* [http://faculty.cs.tamu.edu/guofei/sec_conf_stat.htm Computer Security Conference Ranking and Statistic]
In many cases, the first header value contains the HTTP Response code of 302. Other header values (that have been observed so far) include a response of 200, as well as additional data (including time stamps), and the *.idx files themselves appear to contain certificate (and perhaps other) information.
+
* [http://www.kdnuggets.com/meetings/ Meetings and Conferences in Data Mining and Discovery]
 
+
* http://www.conferencealerts.com/data.htm Data Mining Conferences World-Wide]
== External Links ==
+
* [http://docs.oracle.com/javase/6/docs/technotes/guides/deployment/deployment-guide/tracing_logging.html Tracing and Logging], by [[Oracle]]
+
* [http://sploited.blogspot.ch/2012/08/java-forensics-using-tln-timelines.html Java Forensics using TLN Timelines]
+
* [http://journeyintoir.blogspot.com/2011/02/almost-cooked-up-some-java.html Almost Cooked UP Some Java]
+
* [http://journeyintoir.blogspot.com/2011/11/finding-initial-infection-vector.html Finding Initial Infection Vector]
+
* [https://github.com/woanware/javaidx/blob/master/Documents/Java.IDX.Format.pdf Java IDX Format Specification], by [[Mark Woan]], January 2013
+
* [http://www.thebaskins.com/main/component/content/article/15-work/59-java-malware-identification-and-analysis Java Malware - Identification and Analysis], by [[Brian Baskin]], January 12, 2013
+
* [http://tojoswalls.blogspot.ch/2013/05/java-web-vulnerability-mitigation-on.html Java Web Vulnerability Mitigation on Windows], by Tim Johnson, May 23, 2013
+
* [http://www.ghettoforensics.com/2013/09/malware-analysis-state-of-java-analysis.html The State of Java Reversing Tools], by Brian Baskin, September 3, 2013
+
 
+
=== Java source code ===
+
* [http://javasourcecode.org/html/open-source/jdk/jdk-6u23/com/sun/deploy/cache/Cache.java.html Cache.java]
+
* [http://javasourcecode.org/html/open-source/jdk/jdk-6u23/com/sun/deploy/cache/CacheEntry.java.html CacheEntry.java]
+
 
+
[[Category:Analysis]]
+

Revision as of 08:29, 23 January 2014

PLEASE READ BEFORE YOU EDIT THE LISTS BELOW
When events begin the same day, events of a longer length should be listed first. New postings of events with the same date(s) as other events should be added after events already in the list. Please use three-letter month abbreviations (i.e. Sep, NOT Sept. or September), use two digit dates (i.e. Jan 01 NOT Jan 1), and use date ranges rather than listing every date during an event(i.e. Jan 02-05, NOT Jan 02, 03, 04, 05).
Some events may be limited to Law Enforcement Only or to a specific audience. Such restrictions should be noted when known.

This is a BY DATE listing of upcoming events relevant to digital forensics. It is not an all inclusive list, but includes most well-known activities. Some events may duplicate events on the generic conferences page, but entries in this list have specific dates and locations for the upcoming event.

This listing is divided into three sections (described as follows):

  1. Calls For Papers - Calls for papers for either Journals or for Conferences, relevant to Digital Forensics (Name, Closing Date, URL)

  2. Conferences - Conferences relevant for Digital Forensics (Name, Date, Location, URL)

  3. Training Courses and Providers - Training

Calls For Papers

Please help us keep this up-to-date with deadlines for upcoming conferences that would be appropriate for forensic research.

Title Due Date Notification Date Website
CyberPatterns 2014 Jan 03, 2014 Jan 17, 2014 http://tech.brookes.ac.uk/CyberPatterns2014/CFPCyberpatterns2014.pdf
12th International Conference on Applied Cryptography and Network Security Jan 10, 2014 Mar 14, 2014 http://acns2014.epfl.ch/callpapers.php
9th Annual Conference on Digital Forensics, Security and Law Jan 15, 2014 http://www.digitalforensics-conference.org/callforpapers.htm
2nd ACM Workshop on Information Hiding and Multimedia Security Jan 17, 2014 Mar 31, 2014 http://www.ihmmsec.org/index.php/cfp
USENIX Annual Technical Conference Jan 28, 2014 Apr 07, 2014 https://www.usenix.org/conference/atc14/call-for-papers
Audio Engineering Society (AES) Conference on Audio Forensics Jan 31, 2014 Mar 15, 2014 http://www.aes.org/conferences/54/downloads/54thCallForContributions.pdf
DFRWS - USA 2014 Feb 13, 2014 Apr 07, 2014 http://dfrws.org/2014/cfp.shtml
Symposium On Usable Privacy and Security Feb 28, 2014 (Register) / Mar 06, 2014 (Submit) May 05, 2014 http://cups.cs.cmu.edu/soups/2014/cfp.html
6th International Conference on Digital Forensics & Cyber Crime May 16, 2014 Jul 30, 2014 http://d-forensics.org/2014/show/cf-calls

See also WikiCFP 'Forensics'

Conferences

Title Date/Location Website
IFIP WG 11.9 International Conference on Digital Forensics Jan 08-10
Vienna, Austria
http://www.ifip119.org/Conferences/
AAFS 66th Annual Scientific Meeting Feb 17-22
Seattle, WA, USA
http://www.aafs.org/aafs-66th-annual-scientific-meeting
21st Network & Distributed System Security Symposium Feb 23-26
San Diego, CA, USA
http://www.internetsociety.org/events/ndss-symposium
Fourth ACM Conference on Data and Application Security and Privacy 2014 Mar 03-05
San Antonio, TX, USA
http://www1.it.utsa.edu/codaspy/
9th International Conference on Cyber Warfare and Security (ICCWS-2014) Mar 24-25
West Lafayette, IN, USA
http://academic-conferences.org/iciw/iciw2014/iciw14-home.htm
CyberPatterns 2014 Apr 11
Oxford, United Kingdom
http://tech.brookes.ac.uk/CyberPatterns2014/
US Cyber Crime Conference 2014 Apr 29-May 02
Leesburg, VA
http://www.usacybercrime.com/
DFRWS-Europe 2014 May 07-09
Amsterdam, Netherlands
http://dfrws.org/2014eu/index.shtml
8th International Conference on IT Security Incident Management & IT Forensics May 12-14
Muenster, Germany
http://www1.gi-ev.de/fachbereiche/sicherheit/fg/sidar/imf/imf2014/
2014 IEEE Symposium on Security and Privacy May 16-23
Berkley, CA, USA
http://www.ieee.org/conferences_events/conferences/conferencedetails/index.html?Conf_ID=16517
9th ADFSL Conference on Digital Forensics, Security and Law May 28-29
Richmond, VA
http://www.digitalforensics-conference.org/
Techno-Security and Forensics Conference Jun 01-04
Myrtle Beach, SC, USA
http://www.techsec.com/html/Security%20Conference%202014.html
Mobile Forensics World Jun 01-04
Myrtle Beach, SC, USA
http://www.techsec.com/html/MFC-2014-Spring.html
12th International Conference on Applied Cryptography and Network Security Jun 10-13
Lausanne, Switzerland
http://acns2014.epfl.ch/
2nd ACM Workshop on Information Hiding and Multimedia Security Jun 11-13
Salzburg, Austria
http://www.ihmmsec.org/
54th Conference on Audio Forensics Jun 12-14
London, England
http://www.aes.org/conferences/54/
2014 USENIX Annual Technical Conference Jun 19-20
Philadelphia, PA, USA
https://www.usenix.org/conference/atc14
44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Jun 23-26
Atlanta, GA, USA
http://www.dsn.org/
Symposium On Usable Privacy and Security (SOUPS) 2014 Jul 09-11
Menlo Park, CA, USA
http://cups.cs.cmu.edu/soups/2014/
Black Hat USA 2014 Aug 02-07
Las Vegas, NV, USA
https://www.blackhat.com
DFRWS 2014 Aug 03-06
Denver, CO, USA
http://dfrws.org/2014/index.shtml
RCFG GMU 2014 Aug 04-08
Fairfax, VA, USA
http://www.rcfg.org/gmu/
23rd USENIX Security Symposium Aug 20-22
San Diego, CA, USA
https://www.usenix.org/conferences
2014 HTCIA International Conference & Training Expo Aug 25-27
Austin, TX
http://www.htcia.org/2013/11/2014-htcia-international-conference-training-expo/
6th International Conference on Digital Forensics & Cyber Crime Sep 18-20
New Haven, CT
http://d-forensics.org/2014/show/home
25th Annual Conference & Digital Multimedia Evidence Training Symposium Oct 06-10
Coeur d’Alene, ID, USA
http://www.leva.org/annual-training-conference/

See Also

References