All Stories

  1. Fine-Tuning Large Language Models for Digital Forensics: Case Study and General Recommendations
  2. Systematic Literature Review of EM-SCA Attacks on Encryption
  3. ChatGPT for digital forensic investigation: The good, the bad, and the unknown
  4. Offloading Network Forensic Analytics to Programmable Data Plane Switches
  5. Digital forensic investigation in the age of ChatGPT
  6. Harder, better, faster, stronger: Optimising the performance of context-based password cracking dictionaries
  7. Data Exfiltration through Electromagnetic Covert Channel of Wired Industrial Control Systems
  8. A Novel Dictionary Generation Methodology for Contextual-Based Password Cracking
  9. Application of Artificial Intelligence to Network Forensics: Survey, Challenges and Future Directions
  10. PCWQ: A Framework for Evaluating Password Cracking Wordlist Quality
  11. Identifying Internet of Things software activities using deep learning-based electromagnetic side-channel analysis
  12. TraceGen: User activity emulation for digital forensic test image generation
  13. How viable is password cracking in digital forensic investigation? Analyzing the guessability of over 3.9 billion real-world accounts
  14. Vec2UAge: Enhancing underage age estimation performance through facial embeddings
  15. A comparative study of support vector machine and neural networks for file type identification using n-gram analysis
  16. Retracing the Flow of the Stream: Investigating Kodi Streaming Services
  17. A survey exploring open source Intelligence for smarter password cracking
  18. SoK
  19. Facilitating Electromagnetic Side-Channel Analysis for IoT Investigation: Evaluating the EMvidence Framework
  20. Assessing the Influencing Factors on the Accuracy of Underage Facial Age Estimation
  21. Automated Artefact Relevancy Determination from Artefact Metadata and Associated Timeline Events
  22. Smarter Password Guessing Techniques Leveraging Contextual Information and OSINT
  23. Cutting Through the Emissions: Feature Selection from Electromagnetic Side-Channel Data for Activity Detection
  24. EMvidence: A Framework for Digital Evidence Acquisition from IoT Devices through Electromagnetic Side-Channel Analysis
  25. DeepUAge: Improving Underage Age Estimation Accuracy to Aid CSEM Investigation
  26. Improving Borderline Adulthood Facial Age Estimation through Ensemble Learning
  27. Methodology for the Automated Metadata-Based Classification of Incriminating Digital Forensic Artefacts
  28. Leveraging Electromagnetic Side-Channel Analysis for the Investigation of IoT Devices
  29. A survey of electromagnetic side-channel attacks and discussion on their case-progressing potential for digital forensics
  30. Improving the accuracy of automated facial age estimation to aid CSEM investigations
  31. Shining a light on Spotlight: Leveraging Apple's desktop search utility to recover deleted file metadata on macOS
  32. Solid State Drive Forensics: Where Do We Stand?
  33. Accuracy Enhancement of Electromagnetic Side-Channel Attacks on Computer Monitors
  34. Deduplicated Disk Image Evidence Acquisition and Forensically-Sound Reconstruction
  35. Electromagnetic side-channel attacks
  36. Deep learning at the shallow end: Malware classification for non-domain experts
  37. Digital forensic investigation of two-way radio communication equipment and services
  38. Evaluating Automated Facial Age Estimation Techniques for Digital Forensics
  39. Hierarchical Bloom Filter Trees for Approximate Matching
  40. Enabling Non-Expert Analysis OF Large Volumes OF Intercepted Network Traffic
  41. Expediting MRSH-v2 Approximate Matching with Hierarchical Bloom Filter Trees
  42. Privileged Data Within Digital Evidence
  43. Message from the WCSF 2017 Workshop Chairs
  44. EviPlant: An efficient digital forensic challenge creation, manipulation and distribution solution
  45. Behavioral Service Graphs: A formal data-driven approach for prompt investigation of enterprise and internet-wide infections
  46. Towards the Leveraging of Data Deduplication to Break the Disk Acquisition Speed Limit
  47. Behavioral Service Graphs: A Big Data Approach for Prompt Investigation of Internet-Wide Infections
  48. IPv6 security and forensics
  49. Battling the digital forensic backlog through data deduplication
  50. Increasing digital investigator availability through efficient workflow management and automation
  51. Tiered forensic methodology model for Digital Field Triage by non-digital evidence specialists
  52. On the Benefits of Information Retrieval and Information Extraction Techniques Applied to Digital Forensics
  53. Network investigation methodology for BitTorrent Sync: A Peer-to-Peer based file synchronisation service
  54. Overview of the Forensic Investigation of Cloud Services
  55. Towards the Forensic Identification and Investigation of Cloud Hosted Servers through Non-Invasive Wiretaps
  56. Welcome Message from the WCSF 2015 Workshop Organizers
  57. Project Maelstrom: Forensic Analysis of the BitTorrent-Powered Browser
  58. Forensic Analysis and Remote Evidence Recovery from Syncthing: An Open Source Decentralised File Synchronisation Utility
  59. BitTorrent Sync: Network Investigation Methodology
  60. An analysis of BitTorrent cross-swarm peer participation and geolocational distribution
  61. BitTorrent Sync: First Impressions and Digital Forensic Implications
  62. Leveraging Decentralization to Extend the Digital Evidence Acquisition Window: Case Study on Bittorrent Sync
  63. Digital Evidence Bag Selection for P2P Network Investigation
  64. Universal Peer-to-Peer Network Investigation Framework
  65. Peer-to-Peer Botnet Investigation: A Review
  66. Online Acquisition of Digital Forensic Evidence
  67. Investigating Cybercrimes that Occur on Documented P2P Networks