Difference between revisions of "Main Page"

From ForensicsWiki
Jump to: navigation, search
m
m
Line 8: Line 8:
  
 
<div style="margin-top:0.5em; border:2px solid #ff0000; padding:0.5em 0.5em 0.5em 0.5em; background-color:#ffff99; align:center; border:1px solid #ddccff;">
 
<div style="margin-top:0.5em; border:2px solid #ff0000; padding:0.5em 0.5em 0.5em 0.5em; background-color:#ffff99; align:center; border:1px solid #ddccff;">
<h2 style="margin:0; background-color:#ffff33; font-size:120%; font-weight:bold; border:1px solid #afa3bf; text-align:left; color:#000; padding-left:0.4em; padding-top:0.2em; padding-bottom:0.2em;">Selected Forensics Research</h2>
+
<h2 style="margin:0; background-color:#ffff33; font-size:120%; font-weight:bold; border:1px solid #afa3bf; text-align:left; color:#000; padding-left:0.4em; padding-top:0.2em; padding-bottom:0.2em;"> Sleuth Kit and Open Source Digital Forensics Conference </h2>
  
 
<!-- ARTICLE GOES HERE -->
 
<!-- ARTICLE GOES HERE -->
<small>MARCH-2010</small>
+
The first ever Sleuth Kit and Open Source Digital Forensics Conference will be held on June 9, 2010 in Chantilly, Virginia (USA) and feature talks by leading digital forensics tool developers. Participants can learn about using open source tools, how to integrate them into automated analysis systems, and join in open discussions about the strengths and weaknesses of existing tools. The conference will be of interest to existing open source users and to investigators who want to learn more about using open source tools.  
;[http://portal.acm.org/citation.cfm?id=1592451.1592455  Internet geolocation: Evasion and counterevasion]
+
; ACM Computing Surveys (CSUR), Volume 42 , Issue 1  (December 2009)
+
<blockquote>
+
Internet geolocation technology aims to determine the physical (geographic) location of Internet users and devices. It is currently proposed or in use for a wide variety of purposes, including targeted marketing, restricting digital content sales to authorized jurisdictions, and security applications such as reducing credit card fraud. This raises questions about the veracity of claims of accurate and reliable geolocation. We provide a survey of Internet geolocation technologies with an emphasis on adversarial contexts; that is, we consider how this technology performs against a knowledgeable adversary whose goal is to evade geolocation. We do so by examining first the limitations of existing techniques, and then, from this base, determining how best to evade existing geolocation techniques. We also consider two further geolocation techniques which may be of use even against adversarial targets: (1) the extraction of client IP addresses using functionality introduced in the 1.5 Java API, and (2) the collection of round-trip times using HTTP refreshes. These techniques illustrate that the seemingly straightforward technique of evading geolocation by relaying traffic through a proxy server (or network of proxy servers) is not as straightforward as many end-users might expect. We give a demonstration of this for users of the popular Tor anonymizing network.</blockquote>
+
  
 +
Some of the scheduled talks include:
 +
* Brian Carrier speaking about The Sleuth Kit (TSK) and its new features.
 +
* Jamie Butler speaking about using TSK in the MANDIANT software.
 +
* Dario Forte speaking about the PTK interface to TSK.
 +
* Rob Joyce speaking about using TSK in the Mac Marshall software.
 +
* Simson Garfinkel speaking about AFFLib.
 +
* Harlan Carvey speaking about making time lines of system activity with open source tools.
  
 +
For more information about the conference, visit:
  
<!--END OF ARTICLE-->
+
http://www.basistech.com/conference/2010/digital-forensics-overview.html
  
 +
Program details and online registration will be available soon. Registration will be free to government employees. The conference is being held in conjunction with the Basis Technology Government Users Conference.
  
 +
<!--END OF ARTICLE-->
 
(Past selected articles [[Past Selected Articles|are archived here]].)
 
(Past selected articles [[Past Selected Articles|are archived here]].)
  

Revision as of 12:15, 2 April 2010

This is the Forensics Wiki, a Creative Commons-licensed wiki devoted to information about digital forensics (also known as computer forensics). We currently list a total of 712 pages.

Much of computer forensics is focused on the tools and techniques used by investigators, but there are also a number of important papers, people, and organizations involved. Many of those organizations sponsor conferences throughout the year and around the world. You may also wish to examine the popular journals and some special reports.


Sleuth Kit and Open Source Digital Forensics Conference

The first ever Sleuth Kit and Open Source Digital Forensics Conference will be held on June 9, 2010 in Chantilly, Virginia (USA) and feature talks by leading digital forensics tool developers. Participants can learn about using open source tools, how to integrate them into automated analysis systems, and join in open discussions about the strengths and weaknesses of existing tools. The conference will be of interest to existing open source users and to investigators who want to learn more about using open source tools.

Some of the scheduled talks include:

  • Brian Carrier speaking about The Sleuth Kit (TSK) and its new features.
  • Jamie Butler speaking about using TSK in the MANDIANT software.
  • Dario Forte speaking about the PTK interface to TSK.
  • Rob Joyce speaking about using TSK in the Mac Marshall software.
  • Simson Garfinkel speaking about AFFLib.
  • Harlan Carvey speaking about making time lines of system activity with open source tools.

For more information about the conference, visit:

http://www.basistech.com/conference/2010/digital-forensics-overview.html

Program details and online registration will be available soon. Registration will be free to government employees. The conference is being held in conjunction with the Basis Technology Government Users Conference.

(Past selected articles are archived here.)


Topics



You can help! We have a list of articles that need to be expanded. If you know anything about any of these topics, please feel free to chip in.