posted by organizer: MarcosArjona || 2749 views || tracked by 9 users: [display]

SADFE 2015 : 10th International Conference on Systematic Approaches to Digital Forensic Engineering


Conference Series : Systematic Approaches to Digital Forensic Engineering
When Sep 30, 2015 - Oct 2, 2015
Where Malaga
Submission Deadline Jul 14, 2015
Notification Due Aug 15, 2015
Final Version Due Sep 1, 2015
Categories    forensics   security   evidence management   privacy

Call For Papers

Digital forensics engineering and the curation of digital collections in cultural institutions face pressing and overlapping challenges related to provenance, chain of custody, authenticity, integrity, and identity. The generation, analysis and sustainability of digital evidence require innovative methods, systems and practices, grounded in solid research and understanding of user needs. The term digital forensic readiness describes systems that are build to satisfy the needs for secure digital evidence.

SADFE-2015 investigates requirements for digital forensic readiness and methods, technologies, and building blocks for digital forensic engineering. Digital forensic at SADFE focuses on variety of goals, including criminal and corporate investigations, data records produced by calibrated devices, as well as documentation of individual and organizational activities. Another focus is on challenges brought in by globalization and cross-legislation digital applications. We believe digital forensic engineering is vital to security, the administration of justice and the evolution of culture.

Conference Topics
Potential topics to be addressed by submissions include, but are not limited to:

• Digital Data and Evidence Management: advanced digital evidence discovery,collection, management, storage and preservation

− Identification, authentication and collection of digital evidence
− Extraction and management of forensic data/metadata
− Identification and redaction of personally identifying information and other forms of sensitive information
− Post-acquisition handling of evidence and the preservation of data integrity and admissibility
− Evidence and digital memory preservation, curation and storage
− Architectures and processes (including network processes) that comply with forensic requirements
− Managing geographically, politically and/or jurisdictionally dispersed data artifacts
− Data, digital knowledge, and web mining systems for identification and authentication of relevant data
− Botnet forensics

• Digital Evidence, Data Integrity and Analytics: advanced digital evidence and digitized data analysis, correlation, and presentation

− Advanced search, analysis, and presentation of digital evidence
− Cybercrime scenario analysis and reconstruction technologies
− Legal case construction and digital evidence support
− Cyber-crime strategy analysis and modeling
− Combining digital and non-digital evidence
− Supporting both qualitative and statistical evidence
− Computational systems and computational forensic analysis
− Digital evidence in the face of encryption
− Forensic-support technologies: forensic enabled and proactive monitoring/response

• Forensics of embedded or non-traditional devices (e.g. digicams, cell phones, SCADA, obsolete storage media)
− Innovative forensic engineering tools and applications
− Proactive forensic-enabled support for incident response
− Forensic tool validation: methodologies and principles
− Legal and technical collaboration
− Digital forensics surveillance technology and procedures
− “Honeypot” and other target systems for data collection and monitoring
− Quantitative attack impact assessment
− Comprehensive fault analysis, including, but not limited to, DFE study of broad realistic system and digital knowledge failures, criminal and non-criminal, with comprehensive DFE (malicious/nonmalicious) analysis in theory, methods, and practices.

• Forensic and digital data integrity issues for digital preservation and recovery, including
− Technological challenges
− Legal and ethical challenges
− Economic challenges
− Institutional arrangements and workflows
− Political challenges and
− Cultural and professional challenges

• Scientific Principle-Based Digital Forensic Processes: systematic engineering processes supporting digital evidence management which are sound on scientific, technical and legal grounds

Legal/technical aspects of admissibility and evidence tests
− Examination environments for digital data
− Courtroom expert witness and case presentation
− Case studies illustrating privacy, legal and legislative issues
− Forensic tool validation: legal implications and issues
− Legal and privacy implications for digital and computational forensic analysis
− Handling increasing volumes of digital discovery
− New Evidence Decisions, e.g., United States v. Jones, _ U.S._ (2012) and United States v. Kotterman, _ F.3d _(9th Cir. 2013)
− Computational Forensics and Validation
− Transnational Investigations/Case Integration under the Convention on Cybercrime of the Council of Europe
− Issues in Forensic Authentication and Validation.

• Legal, Ethical and Technical Challenges
− forensic, policy and ethical implications of The Internet of Things, The “Smart City,” “Big Data” or Cloud systems

Important Deadlines
Paper submission: June 24th, 2015
Accept/Reject Notification: August 15th, 2015
Camera-ready papers: September 1st, 2015
Conference: Sept. 30th – Oct. 2nd, 2015

SADFE-2015 papers will be published in the Journal of Digital Forensics, Security and Law (JDFSL) and will undergo a double-blind review process.

Best paper award
A Best Paper Award will be made for the final papers.

Contact Information
Detailed submission instructions and additional details about the workshop can be found at For any other question related to the submission please contact the SADFE 2015 PC chairs: Carsten Rudolph (; Nicolai Kuntze (; and Barbara Endicott-Popovsky (

For questions related to the organization of SADFE 2015 please use the following contacts:
Antonio Maña, University of Malaga
+34 951 952 940

Michael Losavio, University of Louisville
+1 502 852 3509

Related Resources

ICIEM 2016   International Conference on Integrated Environmental Management for Sustainable Development
ICISSP 2017   3rd International Conference on Information Systems Security and Privacy
CyberSec 2017   The Fifth International Conference on Cyber Security, Cyber Welfare and Digital Forensic
AsiaCCS 2017   Call for paper: ACM Asia Conference on Computer and Communications Security
ENASE 2017   12th International Conference on Evaluation of Novel Approaches to Software Engineering
SI: Digital Forensics 2017   Call for Papers for Special Issue on Digital Forensics for IEEE S&P magazine
IEEE TDSC Journal SI 2016   IEEE TDSC Special Issue on Data-Driven Dependability and Security
IEA/AIE NAAD 2017   Special Track on Novel Approaches to Anomaly Detection
IJMSA 2016   International Journal of Modelling, Simulation and Applications
QuASoQ 2016   4th International Workshop on Quantitative Approaches to Software Quality