Accepted papers

Full papers:

A Partial Approach to Intrusion Detection
John Sheppard, Waterford Institute of Technology

Modelling GOP structure effects on ENF-based video forensics
Pasquale Ferrara, European Commission – Joint Research Centre
Gerard Draper Gil, European Commission – Joint Research Centre
Ignacio Sanchez, European Commission – Joint Research Centre
Henrik Junklewitz, European Commission – Joint Research Centre
Laurent Beslay, European Commission – Joint Research Centre

A Digital Forensic Approach for Optimizing the Investigation of Hit-And-Run Accidents
Marian Waltereit, University of Duisburg-Essen
Maximilian Uphoff,  RheinByteSystems GmbH
Peter Zdankin, University of Duisburg-Essen
Viktor Matkovic, University of Duisburg-Essen
Torben Weis, University of Duisburg-Essen

On Reliability of JA3 Hashes for Fingerprinting Mobile Applications
Petr Matousek, Brno University of Technology
Ondrej Rysavy, Brno University of Technology
Ivana Burgetova, Brno University of Technology
Malombe Victor, Strathmore Univeristy

Make Remote Forensic Investigations Forensic Again: Increasing the Evidential Value of Remote Forensic Investigations
Marcel Busch, Friedrich-Alexander-University Erlangen-Nuremberg
Nicolai Florian, Friedrich-Alexander-University Erlangen-Nuremberg
Fabian Fleischer, Friedrich-Alexander-University Erlangen-Nuremberg
Christian Rueckert, Friedrich-Alexander-University Erlangen-Nuremberg
Christoph Safferling, Friedrich-Alexander-University Erlangen-Nuremberg
Felix Freiling, Friedrich-Alexander-University Erlangen-Nuremberg

Evidence gathering in IoT criminal investigation
Francois Bouchaud, IRCGN – Forensic science laboratory, Gendarmerie Nationale
Thomas Vantroys, Univ. Lille, CNRS
Gilles Grimaud, Univ. Lille, CNRS

Adapting to local conditions: Similarities and differences in anonymous online market between Chinese and English Speaking Communities
Gengqian Zhou, Tsinghua University
Jianwei Zhuge, Tsinghua University

Efficient Fingerprint Matching for Forensic Event Reconstruction
Tobias Latzo, Friedrich-Alexander-University Erlangen-Nuremberg

Content-aware Anomaly Detection with Network Representation Learning
Zhong Li, Institute of Computing Technology Chinese Academy of Sciences
Chuanzhi Zhuang, Institute of Computing Technology Chinese Academy of Sciences
Xiaolong Jin, Institute of Computing Technology Chinese Academy of Sciences
Zhi Sun, Institute of Computing Technology Chinese Academy of Sciences

Android Dumpsys Analysis to Indicate Driver Distraction
Lukas Bortnik, NATO CCDCOE
Arturs Lavrenovs, NATO CCDCOE

Remote air-gap Live forensics
Tom Van der Mussele, DFIRe Lab, School of Computer Science, University College Dublin
Babak Habibnia, DFIRe Lab, School of Computer Science, University College Dublin
Pavel Gladyshev, DFIRe Lab, School of Computer Science, University College Dublin

Effective Medical Image Copy-Move Forgery Localization Based on Texture Descriptor
Shi Jiaqi, Nankai University
Wang Gang, Nankai University
Su Ming, Nankai University
Liu Xiaoguang, Nankai University

Short Papers

Retracing the Flow of the Stream: Investigating Kodi Streaming Services
Samuel Todd Bromley, Royal Canadian Mounted Police
John Sheppard, Waterford Institute of Technology
Mark Scanlon, Univeristy College Dublin
Nhien-An Le-Khac, University College Dublin

Neural Representation Learning Based Binary Code Authorship Attribution
Min Zhong Wang, Xi’an University of Posts and Telecommunications
Zhan Feng, Xi’an University of Posts and Telecommunications
Zhou Zhen Tian, Xi’an University of Posts and Telecommunications

An Intelligence Criminal Tracker for Industrial Espionage: Applying Digital Data Acquired Onsite to Target Criminals
Jieun Dokko, The Supreme Prosecutors’ Office in South Korea
Michael Shin, Texas Tech
Sooyoung Park, The Supreme Prosecutors’ Office in South Korea

Cybersecurity Methodology for Specialized Behavior Analysis
Edgar Padilla, The University of Texas at El Paso
Jamie C Acosta, CCDC Army Research Laboratory

Christopher D Kiekintveld, The University of Texas at El Paso