Conference Program

Conference Program

17.09.2024

09:00 - 09:30  Registration

09:30 - 12:00  Workshop I: Introduction to ForTrace++: A digital forensics data synthesis framework (Wolf, Dennis, Zentrale Stelle für Informationstechnik im Sicherheitsbereich (ZITiS)) Information

12:00 - 13:00  Lunch

13:00 - 13:10 Opening of the Conference

13:10 - 14:00  Opening Keynote:
‚Zeitenwende‘ in IT Forensics: Artificial and Human Intelligence in Digital Law Enforcement
(Hartmann, Markus, Senior Prosecutor, Head of ZAC NRW)

14:00 - 15:00  Session 1: Practitioners I

InvesTEE: A TEE-supported Framework for Lawful Remote Forensic Investigations
(Lindenmeier, Christian; Gruber, Jan; Freiling, Felix)

 

The Hidden Threat: Analysis of Linux Rootkit Techniques and Limitations of Current Detection Tools
(Hilgert, Jan-Niclas; Stühn, Jakob; Lambertz, Martin)

15:00 - 15:30  Coffee Break

15:30 - 16:30  Session 2: Digital Forensic Theory and Data Generation                                  

Fit for Forensics: Taxonomy and Common Model for Forensic Analysis of Fitness Trackers
(Hammer, Andreas; Geus, Julian; Nicolai, Florian; Schütz, Philip; Fein, Christofer; Freiling, Felix)                            

Data Synthesis is Going Mobile – On Community-driven Dataset Generation for Android Devices
(Demmel, Markus; Göbel, Thomas; Gonçalves, Patrik; Baier, Harald)

17:00              Departure to Social Event at Völklingen Ironworks (UNESCO World Heritage Site) and Conference Dinner

 

18.09.2024

09:20 - 09:30  Morning Coffee

09:30 - 10:30  Session 3: Practitioners II

Causal Inconsistencies are Normal in Windows Memory Dumps (too)
(Rzepka, Lisa; Ottmann, Jenny; Freiling, Felix; Baier, Harald)

Increasing Street Credibility: Cartography-aware Forensic Analysis of GNSS Trace Validity
(Hammer, Andreas; Cerny, Christian; Jung, Christoph; Eichenmüller, Christian; Freiling, Felix)

10:30 - 11:00  Coffee Break

11:00 - 12:00  Session 4: Incident Response

On NVD Users' Attitudes, Experiences, Hopes and Hurdles
(Wunder, Julia; Corona, Alan; Hammer, Andreas; Benenson, Zinaida)

Requirements for Playbook-Assisted Cyber Incident Response, Reporting and Automation
(Akbari Gurabi, Mehdi; Nitz, Lasse; Bregar, Andrej; Popanda, Jan; Siemers, Christian; Matzutt, Roman; Mandal, Avikarsha)

12:00 - 13:00  Closing Keynote:
Yet Another Protocol!? Building Robust Parsers for Network Traffic Monitoring, Easily and Safely!
(Sommer, Robin, Corelight Inc.)

13:00 - 14:00  Lunch

14:00 - 17:00  Workshop II: Legal Challenges to IT Security Incident Management & IT Forensics (Sorge, Christoph; Brodowski, Dominik)

 

Download

 


 

 

In Cooperation with:

 


 

 

Media Partner