John the Ripper shared library error path fix on Linux

If you are using John the Ripper with CUDA, and you start to see errors like:
<blockquote class="tr_bq">./unshadow: error while loading shared libraries: libcudart.so.6.5: cannot open shared object file: No such file or directory</blockquote><div>First, check your paths. An example .bashrc might look like (64bit system):</div><div>
export CUDA_HOME=/usr/local/cuda
export LD_LIBRARY_PATH=${CUDA_HOME}/lib64:$LD_LIBRARY_PATH
PATH=${CUDA_HOME}/bin:${PATH}
export PATH

<div>
If you are still getting the shared library error, then check /etc/ld.so.conf.
Add the path to your cuda library: /usr/local/cuda/lib64
Then run sudo ldconfig</div>
Now try running unshadow again, and the problem should be fixed.

<div class="separator" style="clear: both; text-align: center;">
</div><div class="separator" style="clear: both; text-align: center;"></div>
</div>

~1 min read

[CFP] SADFE-2015



Call for Papers
SADFE-2015
Tenth International Conference on
Systematic Approaches to Digital Forensics Engineering
September 30 – October 2, 2015, Malaga, Spain


Important dates

  • Paper Due Date: June 24, 2015 (anywhere in the world)
  • Acceptance Notification Date: August 15, 2015
  • Final Paper: September 1, 2015
  • Conference: September 30 – October 2, 2015
Invitation to submit
We invite you to SADFE-2015, the tenth international conference on Systematic Approaches to Digital Forensic Engineering to be held in Malaga, Spain, September 30 – October 2, 2015.

Digital forensics engineering and the curation of digital collections in cultural institutions face pressing and overlapping challenges related to provenance, chain of custody, authenticity, integrity, and identity. The generation, analysis and sustainability of digital evidence require innovative methods, systems and practices, grounded in solid research and understanding of user needs. The term digital forensic readiness describes systems that are build to satisfy the needs for secure digital evidence.

SADFE-2015 investigates requirements for digital forensic readiness and methods, technologies, and building blocks for digital forensic engineering. Digital forensic at SADFE focuses on variety of goals, including criminal and corporate investigations, data records produced by calibrated devices, as well as documentation of individual and organizational activities. Another focus is on challenges brought in by globalization and cross-legislation digital applications. We believe digital forensic engineering is vital to security, the administration of justice and the evolution of culture.

Topics
We welcome previously unpublished papers on engineering approaches for digital forensics, forensic readiness, technical building blocks for secure digital evidence and digital forensics and preservation as to civil, criminal and national security investigations for use within a court of law, the execution of national policy or to aid in understanding the past and digital knowledge in general.

We discuss digital forensic principles in new areas of the information society. We hope you consider submission for this international conference.

Potential topics to be addressed by submissions include, but are not limited to:

  • Digital Data and Evidence Management: advanced digital evidence discovery, collection, management, storage and preservation
    • Identification, authentication and collection of digital evidence
    • Extraction and management of forensic data/metadata
    • Identification and redaction of personally identifying information and other forms of sensitive information
    • Post-acquisition handling of evidence and the preservation of data integrity and admissibility
    • Evidence and digital memory preservation, curation and storage
    • Architectures and processes (including network processes) that comply with forensic requirements
    • Managing geographically, politically and/or jurisdictionally dispersed data artifacts
    • Data, digital knowledge, and web mining systems for identification and authentication of relevant data
    • Botnet forensics
  • Digital Evidence, Data Integrity and Analytics: advanced digital evidence and digitized data analysis, correlation, and presentation
    • Advanced search, analysis, and presentation of digital evidence
    • Cybercrime scenario analysis and reconstruction technologies
    • Legal case construction and digital evidence support
    • Cyber-crime strategy analysis and modeling
    • Combining digital and non-digital evidence
    • Supporting both qualitative and statistical evidence
    • Computational systems and computational forensic analysis
    • Digital evidence in the face of encryption
    • Forensic-support technologies: forensic-enabled and proactive monitoring/response
• Forensics of embedded or non-traditional devices (e.g.
   digicams, cell phones, SCADA, obsolete storage media)
- Innovative forensic engineering tools and applications
- Proactive forensic-enabled support for incident response
- Forensic tool validation: methodologies and principles
- Legal and technical collaboration
- Digital forensics surveillance technology and procedures
- “Honeypot” and other target systems for data collection and
   monitoring
- Quantitative attack impact assessment
- Comprehensive fault analysis, including, but not limited
   to, DFE study of broad realistic system and digital knowledge
   failures, criminal and non-criminal, with comprehensive DFE
   (malicious/non-malicious) analysis in theory, methods, and
   practices.

• Forensic and digital data integrity issues for digital
   preservation and recovery, including
- Technological challenges
- Legal and ethical challenges
- Economic challenges
- Institutional arrangements and workflows
- Political challenges and
- Cultural and professional challenges

• Scientific Principle-Based Digital Forensic Processes:
   systematic engineering processes supporting digital evidence
   management which are sound on scientific, technical and legal
   grounds
- Legal/technical aspects of admissibility and evidence tests
- Examination environments for digital data
- Courtroom expert witness and case presentation
- Case studies illustrating privacy, legal and legislative issues
- Forensic tool validation: legal implications and issues
- Legal and privacy implications for digital and computational
   forensic analysis
- Handling increasing volumes of digital discovery
- New Evidence Decisions, e.g., United States v. Jones, _ U.S._
   (2012) and United States v. Kotterman, _ F.3d _ (9th Cir. 2013)
- Computational Forensics and Validation
- Transnational Investigations/Case Integration under the
   Convention on Cybercrime of the Council of Europe
- Issues in Forensic Authentication and Validation.

• Legal, Ethical and Technical Challenges
- forensic, policy and ethical implications of The Internet of
   Things, The “Smart City,” “Big Data” or Cloud systems

Important dates
- Paper Due Date: June 24, 2015 (anywhere in the world)
- Acceptance Notification Date: August 15, 2015
- Final Paper: September 1, 2015
- Conference: September 30 – October 2, 2015

Publication
SADFE-2015 papers will be published in the Journal of Digital Forensics, Security and Law (JDFSL) and will undergo a double-blind review process.

Best paper award
A Best Paper Award will be made for the final papers.

Submission Instructions
Manuscripts submitted are expected to be:
- new and original,
- well organized and clearly written,
- of interest to the academic and research communities,
- not published previously, and
- not under consideration for publication in any other journal or book

PLEASE NOTE: To be published an author of an accepted paper is required to register for the conference. Non-refundable registration fees must be paid prior to uploading the final JDFSL formatted, publication-ready version of the paper.

All submissions should be written in English with a maximum paper length of six (6) printed pages (minimum 10-point font) including figures, without incurring additional page charges.

To ensure a blinded review process, the following information should be excluded from the submission:

- Authors Names section
- Biography section
- Acknowledgments section (if it contains information identifying
   the authors).

If an article is accepted, author(s) must provide a version in either Microsoft Word or LaTeX with graphics (figures) in GIF, TIF, or PowerPoint formats. Permissions for reprinted material are the sole responsibility of the author(s) and must be obtained in writing prior to publication.

Templates are available for:
Microsoft Word: www.jdfsl.org/files/JDFSL-Template-2014.docx

Only PDF files will be accepted for the review process, and all 
submissions must be done through Easychair. The submission site is 
already open. Visit the SADFE 2015 EasyChair submission page to submit 
your manuscripts.


Organization
General Chair: Antonio Maña (University of Malaga)

Program Committee Co-Chairs:
Carsten Rudolph (Huawei European Research Center)
Nicolai Kuntze (Huawei European Research Center)
Barbara Endicott-Popovsky (University of Washington)

Publication Chair: Ibrahim Baggili (University of New Haven)

Publicity Chair Europe: Joe Cannataci (University of Malta)
Publicity Chair North-America: Dave Dampier (Mississippi State University)
Publicity Chair Asia: Ricci Ieong (University of Hong Kong)

Steering Committee
Deborah Frincke, Co-Chair (Department of Defense)
Ming-Yuh Huang, Co-Chair (Northwest Security Institute)
Michael Losavio (University of Louisville)
Alec Yasinsac (University of South Alabama)
Robert F. Erbacher (Army Research Laboratory)
Wenke Lee (George Institute of Technology)
Barbara Endicott-Popovsky (University of Washington)
Roy Campbell (University of Illinois, Urbana/Champaign)
Yong Guan (Iowa State University)

Program Committee
Sudhir Aggarwal, Florida State University
Galina Borisevitch, Perm State University
Frank Breitinger, University of New Haven
Joseph Cannatacci, University of Groningen
Long Chen, Chongqing University of Posts and Telecommunications
Raymond Choo, University of South Australia
K.P. Chow, University of Hong Kong
David Dampier, Mississippi State University
Hervé Debar, France Telecom R&D
Barbara Endicott-Popovsky, University of Washington
Robert Erbacher, Northwest Security Institute
Xinwen Fu, UMass Lowell
Simson Garfinkel, Naval Postgraduate School
Brad Glisson, University of Glasgow
Lambert Großkopf, Universität Bremen
Yong Guan, Iowa State University
Barbara Guttman, National Institute for Standards and Technology
Brian Hay, University of Alaska, Fairbanks
Jeremy John, British Library
Ping Ji, John Jay College Of Criminal Justice
Andrina Y.L. Lin, Ministry of Justice Investigation Bureau
Pinxin Liu, Renmin University of China Law School
Michael Losavio, University of Louisville
David Manz, PNNL
Nasir Memon, Polytechnic Institute of NYU
Mariofanna Milanova, University of Arkansas at Little Rock
Carsten Momsen, Leibniz Universität Hannover
Kara Nance, University of Alaska, Fairbanks
Ming Ouyang, University of Louisville
Gilbert Peterson, Air Force Institute of Technology
Slim Rekhis, University of Carthage
Golden Richard, University of New Orleans
Corinne Rogers, University of British Columbia
Ahmed Salem, Hood College
Viola Schmid, Technische Universität Darmstadt
Clay Shields, Georgetown University
Vrizlynn Thing, Institute for Infocomm Research, Singapore
Sean Thorpe, University of Technology, Jamaica
William Underwood, Georgia Tech
Wietse Venema, IBM Research
Hein Venter, University of Pretoria
Xinyuan Wang, George Mason University
Kam Woods, University of North Carolina
Yang Xiang, Deakin University, Australia
Fei Xu, Inst. of Information Eng., Chinese Academy of Sciences
Alec Yasinsac, University of South Alabama
SM Yiu, Hong Kong University
Wei Yu, Towson University
Nan Zhang, George Washington University

Contact Information
Antonio Maña, University of Malaga,
+34 951 952 940

Michael Losavio, University of Louisville,
+1 502 852 3509
6 min read

[CFP] WSDF 2015: The 8th International Workshop on Digital Forensics

WSDF 2015: The 8th International Workshop on Digital Forensics

August 24-28, 2015
Toulouse, France

Important Dates
Submission Deadline        April 1, 2015
Author Notification          May 11, 2015
Proceedings Version        June 8, 2015

Digital forensics is a rapidly evolving field primarily focused on the extraction, preservation and analysis of digital evidence obtained from electronic devices in a manner that is legally acceptable. Research into new methodologies tools and techniques within this domain is necessitated by an ever-increasing dependency on tightly interconnected, complex and pervasive computer systems and networks. The ubiquitous nature of our digital lifestyle presents many avenues for the potential misuse of electronic devices in crimes that directly involve, or are facilitated by, these technologies. The aim of digital forensics is to produce outputs that can help investigators ascertain the overall state of a system. This includes any events that have occurred within the system and entities that have interacted with that system. Due care has to be taken in the identification, collection, archiving, maintenance, handling and analysis of digital evidence in order to prevent damage to data integrity. Such issues combined with the constant evolution of technology provide a large scope of digital forensic research. WSDF aims to bring together experts from academia, industry, government and law enforcement who are interested in advancing the state of the art in digital forensics by exchanging their knowledge, results, ideas and experiences.

The aim of the workshop is to provide a relaxed atmosphere that promotes discussion and free exchange of ideas while providing a sound academic backing. The focus of this workshop is not only restricted to digital forensics in the investigation of crime. It also addresses security applications such as automated log analysis, forensic aspects of fraud prevention and investigation, policy and governance.

Topics of interest comprise but are not limited to:
Digital Evidence
Network Forensics
Anti Forensics
Physical Memory Acquisition and Analysis
Digital Forensic Information Visualisation
Fraud Investigations Involving Technology
Portable Devices
Cyber Terrorism                              
Log Analysis
Risk and Incident Management
Investigative Case Studies
Data Hiding Techniques and Steganography
Novel Data Recovery Techniques
Cyber Criminal Profiling
Big Data in Digital Forensics
Cyber Crime

Workshop Chairs
Richard Overill
King’s College London, UK
richard.overill[at]kcl.ac.uk

Virginia N. L. Franqueira
University of Derby, UK
v.franqueira[at]derby.ac.uk

Martin Mulazzani
SBA Research, Austria
mmulazzani[at]sba-research.org

Program Committee
Aswami Ariffin, CyberSecurity Malaysia and University of South Australia
Harjinder Singh Lallie, University of Warwick, UK
Max Huber, Vienna University of Technology, Austria
Werner Schneider, University of Regensburg, Germany
Olga Angelopoulou, University of Derby, UK
Andrew Marrington, Zayed University, United Arab Emirates
Joanne Bryce, University of Central Lancashire, UK
Yijun Yu, Open University, UK
Joshua James, Soon Chun Hyang University, Korea
Ibrahim Baggili, University of New Haven, USA
Frank Breitinger, University of New Haven, USA
Kim-Kwang Raymond Choo, University of South Australia, Australia
Aniello Castiglione, University of Salerno, Italy
Kam-Pui Chow, Hong Kong University, China
Chris Hargreaves, Cranfield University, United Kingdom
Katharina Krombholz, SBA Research, Austria
Grant Osborne, iiNet, Australia
Vassil Roussev, University of New Orleans, United States
Vrizlynn Thing, Institute for Infocomm Research, Singapore
Simon Tjoa, St. Pölten University of Applied Sciences, Austria
Stefano Zanero, Politecnico di Milano, Italy
Antonio Colella, Italian Army, Italy

Submission
The proceedings of ARES (including workshops) have been published by Conference Publishing Services (CPS) of IEEE.

The submission guidelines valid for the WSDF workshop are the same as for the ARES conference.
Authors of selected papers accepted for WSDF will be invited to produce extended and updated versions of their papers (with at least 30% of new material) for review and publication in the Journal of Digital Forensics, Science and Law (JDFSL), http://www.jdfsl.org/, the official journal of the Association of Digital Forensics, Science and Law (ADFSL).
2 min read

2015 국제디지털포렌식 및 사이버범죄 컨퍼런스 · 한국디지털포렌식학회논문 모집 공고

2015 국제디지털포렌식 및 사이버범죄 컨퍼런스 · 한국디지털포렌식학회논문 모집 공고

Please note: all submissions and presentations must be in English.
국제디지털포렌식 및 사이버범죄 컨퍼런스(International Conference on Digital Forensics and Cyber Crime, ICDF2C)는 디지털포렌식과 사이버범죄 수사의 발전을 위해 전세계의 연구자, 실무자, 교관들 간 교류를 촉진하는 국제 연례학술행사입니다. ICDF2C의 국제적, 협력적 기조를 이어가고자 ICDF2C 2015 행사는 한국 디지털포렌식학회 연례 학술대회 (KDFS2015) 와 공동으로 주최될 예정입니다.
ICDF2C 2015는 대한민국, 서울에서 2015년 10월 6일부터 8일까지 개최되며, 완성된 연구논문, 연구 진행중인 논문, 산업분야발표, 패널 및 튜토리얼, 그리고 패널 토론 등 참가신청을 받습니다. 논문은 이중은폐 (double-blind) 방식 및 동료검토 (peer-review) 절차를 통해 평가되며, 채택된 연구논문은 Springer- Verlag社에서 인쇄된 책자(proceeding) 형태로 발표될 예정이며, 이 중 엄선된 논문은 SCI저널인 “Digital Investigation”誌에 게재될 예정입니다.
※ 본 컨퍼런스의 공식 진행언어는 영어로, 투고논문은 영어로 작성되어야 하며, 기타 유형의 참가 또한 모두 영어로 진행됨을 알려 드립니다
1. 특별테마
올해 ICDF2C에서는 두 가지 특별 테마주제를 중심으로 회의를 진행할 계획입니다. 다음 주제들과 관련된 논문을 투고하는 것을 권장합니다.
  • “DarkWeb”의 활용, 시사점(implication), 수사(investigation)
  • 암호화된 가상화폐(cryptocurrency)에 관한 사례연구 및 수사기법
2. 연구주제
인터넷의 등장으로 범죄자들은 보다 손쉽게 익명으로 범죄를 저지를 수 있게 되었습니다. 글로벌통신 및 네트워킹 기반시설, 장비가 복잡해짐에 따라 그만큼 사이버범죄 수사도 어려워지고 있습니다. 특히 대부분 범행의 단서나 증거는 대량의 데이터 속에 파묻혀 있어 찾아내기 어렵고, 범죄를 탐지하고 증거를 수집하기 위해서는 대량의 데이터 중 불필요한 데이터를 걸러낼 수 있는 기술이 절실히 필요해지고 있습니다. 디지털포렌식과 사이버범죄 수사는 법집행, 국가안보, 정보보호에 있어 매우 중요한 분야가 되었으며, 이는 법학, 컴퓨터공학, 금융, 전기통신, 데이터분석학, 경찰학 등의 수많은 영역을 아우르는 학제적 영역이라고 할 수 있습니다. ICDF2C는 다양한 분야의 실무자와 연구자들을 초청하여 이들 간 학술적 교류를 촉진시키고 새로운 사업 기회를 만들어낼 수 있는 창조적 화합의 장입니다.
컨퍼런스 주제
  • 안티포렌식 및 안티-안티포렌식 (Anti Forensics and Anti-Anti Forensics)
  • 빅데이터와 디지털포렌식 (Big Data and Digital Forensics)
  • 디지털포렌식의 비즈니스 응용 (Business Applications of Digital Forensics)
  • 민사소송지원 (Civil Litigation Support)
  • 클라우드 포렌식 (Cloud Forensics)
  • 사이버범죄수사 (CyberCrime Investigations)
  • 사이버범죄자 심리학 및 프로파일링 (Cyber Criminal Psychology and Profiling)
  • 사이버문화 및 사이버 테러리즘 (Cyber Culture & Cyber Terrorism)
  • 데이터은닉 및 스테가노그라피 (Data hiding and steganography)
  • 데이터베이스포렌식 (Database Forensics)
  • 디지털포렌식공학 (DigitalForensic Science)
  • 디지털포렌식 툴 테스트 및 검증 (Digital Forensic Tool Testing and validation)
  • 디지털포렌식 동향(Digital Forensic Trends)
  • 디지털포렌식과 법 (Digital Forensics & Law)
  • 디지털포렌식과 오차율 (Digital Forensics and Error rates)
  • 디지털포렌식 신종 알고리즘 (Digital Forensics novel algorithms)
  • 디지털포렌식 과정 및 절차 (Digital Forensics Process & Procedures)
  • 디지털포렌식 표준화 및 인증 (Digital Forensics Standardization & Accreditation)
  • 디지털포렌식 기법 및 툴 (Digital Forensics Techniques and Tools)
  • 디지털포렌식 정보 분류 (Digital Forensics Triage)
  • 전자증거개시 (e-Discovery)
  • 해킹 (Hacking)
  • 침해사고대응 (Incident Response)
  • 정보전 및 주요기반시설 보호 (Information Warfare & Critical Infrastructure Protection)
  • 법집행과 디지털포렌식 (Law Enforcement and Digital Forensics)
  • 기계학습과 디지털포렌식 (Machine learning and Digital Forensics)
  • 악성소프트웨어 및 봇넷 (Malware & Botnets)
  • 모바일/소형기기 및 멀티미디어 포렌식 (Mobile/Handheld Device & Multimedia
Forensics)
  • 돈세탁 (Money Laundering)
  • 네트워크 포렌식 (Network forensics)
  • 최신 chip-off 기법 (New chip-off techniques)
  • 최신 디지털포렌식 훈련 프로그램 (Novel Digital Forensics Training programs)
  • 온라인 사기 (Online Fraud)
  • 프로그래밍언어 및 디지털포렌식 (Programming Languages and Digital Forensics)
  • SCADA (supervisory control and data acquisition, 감시제어 데이터 수집 시스템)
Forensics
  • 인터넷 아동 성학대 (Sexual Abuse of Children on Internet)
  • 소프트웨어 및 미디어 저작권 침해 (Software & Media Piracy)
  • 디지털포렌식의 이론적 기반 (Theoretical Foundations of Digital Forensics)
  • 전통 범죄학의 디지털포렌식에의 적용 (Traditional Criminology applied to Digital 
Forensics)
  • 사이버범죄 및 디지털포렌식에 관한 철학적 해석 (Philosophical accounts for 
Cyber Crime and Digital Forensics) 
 3. 연구논문 (Research Papers)
연구논문의 경우 독창적이고 기존에 발표되지 않은 연구에 관한 것이어야 합니다. 본 회의가 아닌 다른 회의, 학술지 및 기타 다른 통로로 검토되고 있는 논문은 투고 대상에서 제외됩니다. 위에 제시된 주제 분야의 논문이 권장되나, 그 밖의 주제를 다룬 논문도 투고 가능합니다. 투고와 관련하여 문의사항이 있으면 언제든지 컨퍼런스 개최 담당자에게 연락 바랍니다.

4. 기타 참가신청
본 컨퍼런스는 완성된 연구논문, 연구진행중인 논문, 산업분야 발표, 패널토론 등 다양한 방식으로 참여가 가능합니다. 각 해당 참가유형에 따라 아래 지침에 따라 신청해주시기 바랍니다.
  • 완성된 연구논문 (Completed Research Papers) : 10매이내 (초록, 그림,표 및 참고문헌 포함)
  • 연구 진행중인 논문 (Research in Progress Papers) : 6매이내 (초록, 그림, 표 및 참고문헌 포함)
  • 산업분야 발표 (Industrial Talk) : 발표내용 요약문 (1,000자 이내) 모든 발표는 기업 중립적이어야 함.
  • 패널토론 (Round Table Discussion) : 주제에 관한 요약문 (1,000자 이내)
  • 패널신청서 (Panel Proposals) : 참여할 토론자에 대한 설명 및 요약문 (1,000자이내)
  • 튜토리얼 신청서 (Tutorial Proposals) : 주제, 발표자, 프로그램 분량, 참석자 등에 대한 설명문 (1,000자 이내) 및 제안자의 이력서 포함
5. 투고절차 안내
자세한 투고절차는 홈페이지(http://d-forensics.org/)를 참조해주시기 바랍니다.
6. 발간 (publications)
채택된 원고는 ICDF2C 2015 컨퍼런스 프로시딩 (proceedings) 및 Springer-Verlag社의 LNICST (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering) 시리즈에 게재될 예정입니다.
프로시딩은 책자형태뿐만 아니라 Springer의 디지털 도서관인 Springerlink를 통해 디지털 형태로도 제작될 예정입니다. 또한, 프로시딩의 내용은 DBLP, Google Scholar, ISI Proceedings, EI, CrossRef, Zentralblatt Math, EU Digital Library (EUDL) 등 주요 인용색인 서비스에도 포함될 예정입니다. 또한 Elsevier와 제휴하여 제출된 논문 중 우수한 논문을 엄선하여 SCI저널인"Digital Investigation: The International Journal of Digital Forensics & Incident Response"에 특별호로 게재할 예정입니다.
7. 원고마감시한 및 주요 기일
논문접수 : 2015년 3월 30일까지

원고 채택여부 통지 : 2015년 6월 1일
최종 인쇄본 : 2015년 7월 1일
3 min read

2015 デジタル・フォレンジックとサイバー犯罪に係る国際会議・韓国デジタル・フォレンジック学会年次大会 論文募集

2015 デジタル・フォレンジックとサイバー犯罪に係る国際会議・韓国デジタル・フォレンジック学会年次大会 論文募集

Please note: all submissions and presentations must be in English.
デジタル・フォレンジックとサイバー犯罪に係る国際会議(The International Conference on Digital Forensics and Cyber Crime、以下ICDF2C)は、デジタル・フォレンジックとサイバー犯罪捜査の発展を目指し、世界中の優秀な研究者・実務者・教育者たちが一堂に会する国際学術会議です。ICDF2Cのグローバルかつ協力的精神を続けていくということで、今年の会議は韓国デジタル・フォレンジック学会年次大会(KDFS2015)との共催となります。
ICDF2C2015は、2015年10月6日から8日まで韓国のソウルで開かれます。ICDF2Cでは完成もしくは現在進行中の研究論文、産業分野発表、パネル及びチュートリアル、パネル・ディスカッションなど、様々な形での参加をお待ちしています。研究論文は二重盲査読(Double-Blind Review)システムによって検討され、採択された場合は「Springer-Verlag社」を通じて出版されます。なお、優秀な論文はSCI級ジャーナル「Digital Investigation」に掲載される予定です。
※ 本会議の公式言語は英語であり、全ての投稿論文は英語で作成されなければなりません。なお、その他の参加項目も全て英語で行われます。
1. 特別テーマ
今年のICDF2Cでは二つのテーマが中心となります。以下のようなテーマに関する論文の投稿をお待ちしています。
  • 「ダークウェブ(Dark Web)」の扱い方、影響、捜査について
  • 「暗号通貨(crypto currency)」に関するケース研究及び捜査手法
2. 研究の範囲
インターネットが登場し、犯罪者が匿名で犯罪を起こすことがより簡単になりました。グローバル通信やネットワークインフラ及び装備が複雑化し、サイバー犯罪捜査の難しさも増しています。違法行為を証明する手がかりは膨大なデートに埋もれている場合が多く、犯罪の検知や証拠の収集においては不要なデータを排除する作業が求められます。デジタル・フォレンジックとサイバー犯罪捜査は、法の執行や国の安全保障、情報の保護に欠かせない分野となり、法学、コンピュータ工学、金融、情報通信、データの解析、警察活動など、あらゆる分野と密接に関わっています。ICDF2Cでは、各分野の実務者及び研究者を一堂に集め、参加者間の学術交流を促すとともに、新たなビジネスチャンスを生み出します。
会議のテーマ
  • アンチ・フォレンジックとアンチ・アンチフォレンジック(Anti Forensics and Anti-Anti Forensics)
  • ビックデータとデジタル・フォレンジック(Big Data and Digital Forensics)
  • デジタル・フォレンジックのビジネスへの応用 (Business Applications of Digital Forensics)
  • 民事訴訟への支援(Civil Litigation Support)
  • クラウド・フォレンジック(Cloud Forensics)
  • サイバー犯罪捜査(CyberCrime Investigations)
  • サイバー犯罪者心理学とプロファイリング(Cyber Criminal Psychology and Profiling)
  • サイバー文化とサイバーテロリズム(Cyber Culture & Cyber Terrorism)
  • データ隠蔽とステガノグラフィ(Data hiding and steganography)
  • データベース・フォレンジック(Database Forensics)
  • デジタル・フォレンジック・サイエンス(Digital Forensic Science)
  • デジタル・フォレンジック・ツールのテスト及び認定(Digital Forensic Tool Testing and validation)
  • デジタル・フォレンジックの動向(Digital Forensic Trends)
  • デジタル・フォレンジックと法律(Digital Forensics & Law)
  • デジタル・フォレンジックと誤り率(Digital Forensics and Error rates)
  • デジタル・フォレンジックに関する新たなアルゴリズム(Digital Forensics novel algorithms)
  • デジタル・フォレンジックの処理過程及び手続き(Digital Forensics Process & Procedures)
  • デジタル・フォレンジックの標準化及び承認(Digital Forensics Standardization & Accreditation)
  • デジタル・フォレンジックの手法及びツール(Digital Forensics Techniques and Tools)
  • デジタル・フォレンジックの分類(Digital Forensics Triage)
  • 電子証拠開示制度(e-Discovery)
  • ハッキング(Hacking)
  • 侵害への対応(Incident Response)
  • 情報戦とコアインフラの保護(Information Warfare & Critical Infrastructure Protection)
  • 法の執行とデジタル・フォレンジック(Law Enforcement and Digital Forensics)
  • 機械学習とデジタル・フォレンジック(Machine learning and Digital Forensics)
  • マルウェアととボットネット(Malware & Botnets)
  • モバイル/携帯装置とマルチメディア・フォレンジック(Mobile/Handheld Device & Multimedia Forensics)
  • マネーロンダリング(Money Laundering)
  • ネットワーク・フォレンジック(Network forensics)
  • 最新のチップ・オフ手法(New chip-off techniques)
  • 新たなデジタル・フォレンジック訓練プログラム(Novel Digital Forensics Training programs)
  • オンライン詐欺(Online Fraud)
  • プログラミング言語とデジタル・フォレンジック(Programming Languages and Digital Forensics)
  • SCADA(Supervisory Control And Data Acquisition、監視制御データ収集システム)・フォレンジック
  • インターネット上における児童性的虐待(Sexual Abuse of Children on Internet)
  • ソフトウェア及びメディアにおける著作権侵害(Software & Media Piracy)
  • デジタル・フォレンジックの理論的基盤(Theoretical Foundations of Digital Forensics)
  • デジタル・フォレンジックに適用される伝統的犯罪学(Traditional Criminology applied to Digital Forensics)
  • サイバー犯罪とデジタル・フォレンジックに対する哲学的解釈(Philosophical accounts for Cyber Crime and Digital Forensics)
3. 研究論文
未発表かつ独創的な研究論文を募集しています。他の会議や学術誌、その他別のルートで検討されている論文は投稿対象外となります。上記のテーマの論文が優先されますが、他のテーマの論文も検討対象に含まれます。論文の提出について不明な点がありましたら、担当者にご遠慮なくお問い合わせください。
4. その他の参加項目
会議には、完成もしくは現在進行中の研究論文、産業分野の発表、パネルディスカッションなど、様々な形でご参加いただけます。各項目のお申し込みについては、以下のガイドラインに従ってください。
  • 完成した研究論文:10枚以内(要旨、グラフ、表、参考文献を含む)
  • 現在進行中の研究論文:6枚以内(要旨、グラフ、表、参考文献を含む)
  • 産業分野発表(Industrial Talk):1,000字以内で説明;全ての発表はベンダー中立(vendor neutral)でなければならない
  • パネル・ディスカッション(Round Table Discussion):テーマに関する概要を1,000字以内で説明
  • パネルの申し込み:1,000字以内で説明;予め参加するパネリストを特定
  • チュートリアルの申し込み:テーマ、講師、講義の分量、参加者などを1,000字以内で説明;申請者の履歴書も添付
5. 投稿指針
投稿指針の詳細はホームページ(http://d-forensics.org/)でご確認いただけます。
6.出版
採択された原稿は「ICDF2C2015プロシーディング(proceedings)」及びSpringer-Verlag社の「LNICST(Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering)」に掲載される予定です。
プロシーディングは冊子とともに、Springer社のデジタル図書館「Springerlink」を通じてデジタル本も製作されます。また、プロシーディングの内容は DBLP, Google Scholar, ISI Proceedings, EI, CrossRef, Zentralblatt Math, EU Digital Library (EUDL)など、主な引用索引サービスにも含まれる予定です。
なお、Elsevier社と提携し、提出された論文のうち優秀なものを厳選してSCI級ジャーナル「Digital Investigation: The International Journal of Digital Forensics & Incident Response」に特別号として掲載する予定です。
7.主要日程
論文受付の締め切り:2015年3月30日
採択結果の通知:2015年6月1日
完全版下原稿(Camera-ready Version):2015年7月1日
~1 min read

ICDF2C, KDFS 2015 论文征文公告

Please note: all submissions and presentations must be in English.
国际数字取证、网络犯罪会议(ICDF2C)是旨在促进数字取证及网络犯罪侦查的发展,推动全世界的优秀研究人员、实务人员、教育者间互相交流的国际性学术会议,每年举办一届。为延续ICDF2C的国际合作传统,今年的ICDF2C将与韩国数字取证协会年会共同召开。
ICDF2C 2015拟定于2015年 10月 6日至8日在韩国首尔召开。ICDF2C包括已完成的研究论文、研究中的论文、 分组讨论、实务人员发言等多种参与形式。提交的研究论文在经过“双盲评审”(double-blind peer review)方式的审核过程后,被接收的论文将通过 Springer-Verlag进行出版。其中,优秀论文将刊登在SCI级的期刊—— Digital investigation
特别计划
今年的ICDF2C将围绕以下两个中心主题进行。我们期待着与以下两个中心相关的论文投稿。   暗网(dark web)的使用、启示及侦查 加密货币(crypto currency)的相关事例研究及侦查方法   随着互联网的登场,犯罪分子们能够更容易的通过匿名进行犯罪。随着全球通信和网络基础设施设备日趋复杂,网络犯罪的侦查难度也变得越来越高。能够证明不法行为的证据大都被大量的数据所掩盖,探知犯罪行为并搜集证据迫切需要过滤掉大批的无关数据。数字取证和网络犯罪的调查已成为执法及国家安全和信息保护的一个非常重要的部分。数字取证和网络犯罪侦查与法律、计算机技术、金融、信息通信、数据分析、警察活动等多领域密切相关。ICDF2C是能够汇集各领域的实务人员及研究人员,促进与会人员间学术交流并能够创造全新商业机会的创新型合作平台。
此次会议的主要议题如下。
  • 反数字取证及反-反数字取证
  • 大数据和数字取证
  • 数字取证技术的商业应用
  • 民事诉讼支援
  • 云取证
  • 网络犯罪侦查
  • 网络犯罪心里及画像
  • 网络文化及网络恐怖主义
  • 数据隐藏及隐写术
  • 数字取证科学
  • 数字取证工具检测及确认
  • 数字取证趋向
  • 数字取证及法律
  • 数字取证的出错率
  • 有关数字取证的新算法
  • 数字取证的流程及程序
  • 数字取证标准化及认可
  • 数字取证分类
  • 电子披露制度
  • 黑客入侵
  • 事件(入侵)响应
  • 信息战及关键设施保护
  • 法律执行及数字取证
  • 机器学习及数字取证
  • 恶意软件及僵尸网络
  • 移动设备和手持设备及多媒体取证
  • 洗钱
  • 网络取证
  • new chip-off techniques
  • 数字取证的培训计划新方式
  • 网络诈骗
  • 编程语言及数字取证
  • SCADA取证
  • 网络性虐儿童
  • 软件及媒体版权盗窃
  • 数字取证的理论基础
  • 适应在数字取证的传统犯罪学
  • 对网络犯罪和数字取证的哲学解释
研究论文
征集之前未经发表的具有独创性的研究论文,但,已在其他学术会议、学术期刊或已通过其他渠道进行审稿的论文除外。 我们期待收到与上文已罗列出的主题相关的论文,除此之外,也欢迎其他领域的论文接受审核。如有任何疑问请联系会议议长。
其他参加项目
本次学术会议包含已完成的研究论文、研究中的论文及分组讨论、圆桌讨论、实务人员发言等多种项目。各项目相关事项,见下文。
  • 已完成的研究论文 : 10张以内(包括序文、图表、表格、参考文献)
  • 研究中的论文 : 6张以内(包括序文、图表、表格、参考文献)
  • 实务人员发言 : 须准备1000字以内的内容说明, 记录发言的所有内容(vendor neutral)。
  • 圆桌讨论 : 须提交讨论主题概要说明,限1000字以内。
  • 分组讨论 : 须提交内容说明,限1000字以内;特定的参加者(panellist)名单。   讲座(Tutorial)提案 : 须提交讲座主题、主讲人、讲座长度、讲座对象的说明以及提案人的简历,限1000字以内。
投稿指南
~1 min read