Difference between pages "Upcoming events" and "Windows Job File Format"

From ForensicsWiki
(Difference between pages)
Jump to: navigation, search
(Calls For Papers)
 
(fixed-length section)
 
Line 1: Line 1:
<b>PLEASE READ BEFORE YOU EDIT THE LISTS BELOW</b><br>
+
{{expand}}
When events begin the same day, events of a longer length should be listed first.  New postings of events with the same date(s) as other events should be added after events already in the list. Please use three-letter month abbreviations (i.e. Sep, NOT Sept. or September), use two digit dates (i.e. Jan 01 NOT Jan 1), and use date ranges rather than listing every date during an event(i.e. Jan 02-05, NOT Jan 02, 03, 04, 05).<br>
+
<i>Some events may be <u>limited</u> to <b>Law Enforcement Only</b> or to a specific audience.  Such restrictions should be noted when known.</i>
+
  
This is a BY DATE listing of upcoming events relevant to [[digital forensics]]. It is not an all inclusive list, but includes most well-known activities.  Some events may duplicate events on the generic [[conferences]] page, but entries in this list have specific dates and locations for the upcoming event.
+
== Overview ==
 +
On [[Windows]] a .JOB file specifies task configuration. A .JOB file consists of two main sections, fixed-length and variable-length.
  
This listing is divided into three sections (described as follows):<br>
+
=== fixed-length section ===
<ol><li><b><u>[[Upcoming_events#Calls_For_Papers|Calls For Papers]]</u></b> - Calls for papers for either Journals or for Conferences, relevant to Digital Forensics (Name, Closing Date, URL)</li><br>
+
<li><b><u>[[Upcoming_events#Conferences|Conferences]]</u></b> - Conferences relevant for Digital Forensics (Name, Date, Location, URL)</li><br>
+
<li><b><u>[[Training Courses and Providers]]</u></b> - Training </li><br></ol>
+
  
== Calls For Papers ==
+
The fixed-length section is 68 bytes in size and consists of:
Please help us keep this up-to-date with deadlines for upcoming conferences that would be appropriate for forensic research.
+
{| class="wikitable"
 
+
{| border="0" cellpadding="2" cellspacing="2" align="top"
+
|- style="background:#bfbfbf; font-weight: bold"
+
! width="30%|Title
+
! width="15%"|Due Date
+
! width="15%"|Notification Date
+
! width="40%"|Website
+
 
|-
 
|-
|CyberPatterns 2014
+
! offset
|Jan 03, 2014
+
! size
|Jan 17, 2014
+
! value
|http://tech.brookes.ac.uk/CyberPatterns2014/CFPCyberpatterns2014.pdf
+
! description
 
|-
 
|-
|12th International Conference on Applied Cryptography and Network Security
+
| 0
|Jan 10, 2014
+
| 2
|Mar 14, 2014
+
|
|http://acns2014.epfl.ch/callpapers.php
+
| Product version
 
|-
 
|-
|9th Annual Conference on Digital Forensics, Security and Law
+
| 2
|Jan 15, 2014
+
| 2
 
|
 
|
|http://www.digitalforensics-conference.org/callforpapers.htm
+
| File version
 
|-
 
|-
|2nd ACM Workshop on Information Hiding and Multimedia Security
+
| 4
|Jan 17, 2014
+
| 16
|Mar 31, 2014
+
|
|http://www.ihmmsec.org/index.php/cfp
+
| Job UUID (or GUID)
 
|-
 
|-
|USENIX Annual Technical Conference
+
| 20
|Jan 28, 2014
+
| 2
|Apr 07, 2014
+
|
|https://www.usenix.org/conference/atc14/call-for-papers
+
| Application name size offset <br> The offset is relative from the start of the file.
 
|-
 
|-
|Audio Engineering Society (AES) Conference on Audio Forensics
+
| 22
|Jan 31, 2014
+
| 2
|Mar 15, 2014
+
|
|http://www.aes.org/conferences/54/downloads/54thCallForContributions.pdf
+
| Trigger offset <br> The offset is relative from the start of the file.
 
|-
 
|-
|DFRWS - USA 2014
+
| 24
|Feb 13, 2014
+
| 2
|Apr 07, 2014
+
|
|http://dfrws.org/2014/cfp.shtml
+
| Error Retry Count
 
|-
 
|-
|Symposium On Usable Privacy and Security
+
| 26
|Feb 28, 2014 (Register) / Mar 06, 2014 (Submit)
+
| 2
|May 05, 2014
+
|
|http://cups.cs.cmu.edu/soups/2014/cfp.html
+
| Error Retry Interval
 
|-
 
|-
|6th International Conference on Digital Forensics & Cyber Crime
+
| 28
|May 16, 2014
+
| 2
|Jul 30, 2014
+
|
|http://d-forensics.org/2014/show/cf-calls
+
| Idle Deadline
 
|-
 
|-
|}
+
| 30
 
+
| 2
See also [http://www.wikicfp.com/cfp/servlet/tool.search?q=forensics WikiCFP 'Forensics']
+
|
 
+
| Idle Wait
== Conferences ==
+
{| border="0" cellpadding="2" cellspacing="2" align="top"
+
|- style="background:#bfbfbf; font-weight: bold"
+
! width="40%"|Title
+
! width="20%"|Date/Location
+
! width="40%"|Website
+
 
|-
 
|-
|IFIP WG 11.9 International Conference on Digital Forensics
+
| 32
|Jan 08-10<br>Vienna, Austria
+
| 4
|http://www.ifip119.org/Conferences/
+
|
 +
| Priority
 
|-
 
|-
|AAFS 66th Annual Scientific Meeting
+
| 36
|Feb 17-22<br>Seattle, WA, USA
+
| 4
|http://www.aafs.org/aafs-66th-annual-scientific-meeting
+
|
 +
| Maximum Run Time
 
|-
 
|-
|21st Network & Distributed System Security Symposium
+
| 40
|Feb 23-26<br>San Diego, CA, USA
+
| 4
|http://www.internetsociety.org/events/ndss-symposium
+
|
 +
| Exit Code
 
|-
 
|-
|Fourth ACM Conference on Data and Application Security and Privacy 2014
+
| 44
|Mar 03-05<br>San Antonio, TX, USA
+
| 4
|http://www1.it.utsa.edu/codaspy/
+
|
 +
| Status
 
|-
 
|-
|9th International Conference on Cyber Warfare and Security (ICCWS-2014)
+
| 48
|Mar 24-25<br>West Lafayette, IN, USA
+
| 4
|http://academic-conferences.org/iciw/iciw2014/iciw14-home.htm
+
|
 +
| Flags
 
|-
 
|-
|CyberPatterns 2014
+
| 52
|Apr 11<br>Oxford, United Kingdom
+
| 16
|http://tech.brookes.ac.uk/CyberPatterns2014/
+
|
 +
| Last run time <br> Consists of a SYSTEMTIME
 +
|}
 +
 
 +
==== SYSTEMTIME ====
 +
{| class="wikitable"
 
|-
 
|-
|US Cyber Crime Conference 2014
+
! offset
|Apr 29-May 02<br>Leesburg, VA
+
! size
|http://www.usacybercrime.com/
+
! value
 +
! description
 
|-
 
|-
|DFRWS-Europe 2014
+
| 0
|May 07-09<br>Amsterdam, Netherlands
+
| 2
|http://dfrws.org/2014eu/index.shtml
+
|
 +
| Year
 
|-
 
|-
|8th International Conference on IT Security Incident Management & IT Forensics
+
| 2
|May 12-14<br>Muenster, Germany
+
| 2
|http://www1.gi-ev.de/fachbereiche/sicherheit/fg/sidar/imf/imf2014/
+
|
 +
| Month
 
|-
 
|-
|2014 IEEE Symposium on Security and Privacy
+
| 4
|May 16-23<br>Berkley, CA, USA
+
| 2
|http://www.ieee.org/conferences_events/conferences/conferencedetails/index.html?Conf_ID=16517
+
|
 +
| Weekday
 
|-
 
|-
|9th ADFSL Conference on Digital Forensics, Security and Law
+
| 6
|May 28-29<br>Richmond, VA
+
| 2
|http://www.digitalforensics-conference.org/
+
|
 +
| Day
 
|-
 
|-
|Techno-Security and Forensics Conference
+
| 8
|Jun 01-04<br>Myrtle Beach, SC, USA
+
| 2
|http://www.techsec.com/html/Security%20Conference%202014.html
+
|
 +
| Hour
 
|-
 
|-
|Mobile Forensics World
+
| 10
|Jun 01-04<br>Myrtle Beach, SC, USA
+
| 2
|http://www.techsec.com/html/MFC-2014-Spring.html
+
|
 +
| Minute
 
|-
 
|-
|12th International Conference on Applied Cryptography and Network Security
+
| 12
|Jun 10-13<br>Lausanne, Switzerland
+
| 2
|http://acns2014.epfl.ch/
+
|
 +
| Second
 
|-
 
|-
|2nd ACM Workshop on Information Hiding and Multimedia Security
+
| 14
|Jun 11-13<br>Salzburg, Austria
+
| 2
|http://www.ihmmsec.org/
+
|
 +
| Milli second
 +
|}
 +
 
 +
==== Priority ====
 +
{| class="wikitable"
 
|-
 
|-
|54th Conference on Audio Forensics
+
! Value
|Jun 12-14<br>London, England
+
! Identifier
|http://www.aes.org/conferences/54/
+
! Description
 
|-
 
|-
|2014 USENIX Annual Technical Conference
+
| 0x00800000
|Jun 19-20<br>Philadelphia, PA, USA
+
| REALTIME_PRIORITY_CLASS
|https://www.usenix.org/conference/atc14
+
| The task can run at the highest possible priority. The threads of a real-time priority class process preempt the threads of all other processes, including operating system processes performing important tasks.
 
|-
 
|-
|44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks
+
| 0x01000000
|Jun 23-26<br>Atlanta, GA, USA
+
| HIGH_PRIORITY_CLASS
|http://www.dsn.org/
+
| The task performs time-critical tasks that can be executed immediately for it to run correctly. The threads of a high-priority class process preempt the threads of normal or idle priority class processes.
 
|-
 
|-
|Symposium On Usable Privacy and Security (SOUPS) 2014
+
| 0x02000000
|Jul 09-11<br>Menlo Park, CA, USA
+
| IDLE_PRIORITY_CLASS
|http://cups.cs.cmu.edu/soups/2014/
+
| The task can run in a process whose threads run only when the machine is idle, and are preempted by the threads of any process running in a higher priority class.
|-
+
|Black Hat USA 2014
+
|Aug 02-07<br>Las Vegas, NV, USA
+
|https://www.blackhat.com
+
|-
+
|DFRWS 2014
+
|Aug 03-06<br>Denver, CO, USA
+
|http://dfrws.org/2014/index.shtml
+
|-
+
|RCFG GMU 2014
+
|Aug 04-08<br>Fairfax, VA, USA
+
|http://www.rcfg.org/gmu/
+
|-
+
|23rd USENIX Security Symposium
+
|Aug 20-22<br>San Diego, CA, USA
+
|https://www.usenix.org/conferences
+
|-
+
|2014 HTCIA International Conference & Training Expo
+
|Aug 25-27<br>Austin, TX
+
|http://www.htcia.org/2013/11/2014-htcia-international-conference-training-expo/
+
|-
+
|25th Annual Conference & Digital Multimedia Evidence Training Symposium
+
|Oct 06-10<br>Coeur d’Alene, ID, USA
+
|http://www.leva.org/annual-training-conference/
+
 
|-
 
|-
 +
| 0x04000000
 +
| NORMAL_PRIORITY_CLASS
 +
| The task has no special scheduling requirements.
 
|}
 
|}
  
==See Also==
+
=== variable-length section ===
* [[Training Courses and Providers]]
+
 
==References==
+
== See Also ==
* [http://faculty.cs.tamu.edu/guofei/sec_conf_stat.htm Computer Security Conference Ranking and Statistic]
+
* [[Windows]]
* [http://www.kdnuggets.com/meetings/ Meetings and Conferences in Data Mining and Discovery]
+
 
* http://www.conferencealerts.com/data.htm Data Mining Conferences World-Wide]
+
== External Links ==
 +
* [http://msdn.microsoft.com/en-us/library/cc248285.aspx .JOB File Format], by [[Microsoft]],
 +
 
 +
[[Category:File Formats]]

Revision as of 11:37, 5 July 2014

Information icon.png

Please help to improve this article by expanding it.
Further information might be found on the discussion page.

Overview

On Windows a .JOB file specifies task configuration. A .JOB file consists of two main sections, fixed-length and variable-length.

fixed-length section

The fixed-length section is 68 bytes in size and consists of:

offset size value description
0 2 Product version
2 2 File version
4 16 Job UUID (or GUID)
20 2 Application name size offset
The offset is relative from the start of the file.
22 2 Trigger offset
The offset is relative from the start of the file.
24 2 Error Retry Count
26 2 Error Retry Interval
28 2 Idle Deadline
30 2 Idle Wait
32 4 Priority
36 4 Maximum Run Time
40 4 Exit Code
44 4 Status
48 4 Flags
52 16 Last run time
Consists of a SYSTEMTIME

SYSTEMTIME

offset size value description
0 2 Year
2 2 Month
4 2 Weekday
6 2 Day
8 2 Hour
10 2 Minute
12 2 Second
14 2 Milli second

Priority

Value Identifier Description
0x00800000 REALTIME_PRIORITY_CLASS The task can run at the highest possible priority. The threads of a real-time priority class process preempt the threads of all other processes, including operating system processes performing important tasks.
0x01000000 HIGH_PRIORITY_CLASS The task performs time-critical tasks that can be executed immediately for it to run correctly. The threads of a high-priority class process preempt the threads of normal or idle priority class processes.
0x02000000 IDLE_PRIORITY_CLASS The task can run in a process whose threads run only when the machine is idle, and are preempted by the threads of any process running in a higher priority class.
0x04000000 NORMAL_PRIORITY_CLASS The task has no special scheduling requirements.

variable-length section

See Also

External Links