SADFE 2020: Systematic Approaches to Digital Forensic Engineering City University of New York - John Jay College of Criminal Justice New York, NY, United States, May 15, 2020 |
Conference website | http://www.sadfe.org |
Submission link | https://easychair.org/conferences/?conf=sadfe2020 |
Panel proposal deadline | March 9, 2020 |
Submission deadline | March 9, 2020 |
Tutorial proposal deadline | March 9, 2020 |
Poster abstract deadline | March 27, 2020 |
This event is now a Virtual Conference on May 15, 2020 (via Zoom, with WebEx as a backup). Online registration available via the SADFE page www.sadfe.org. A Zoom link will be sent to all registrants shortly before the conference.
Call for Papers/Posters/Panels/Contributions
(To better support those whose travel plans may be uncertain, we are extending our paper submission deadline and simply encourage authors to let us know if their attendance might be dependent on world events)
Systematic Approaches to Digital Forensic Engineering (SADFE) 2020May (14-) 15, 2020, John Jay College of Criminal justice, City University of New York (CUNY), New York City
(We intend to apply for Technical Co-Sponsorship from the IEEE Computer Society and publish with IEEE CPS)
The 13th International Conference on Systematic Approaches to Digital Forensic Engineering (SADFE) is calling for paper, panel, poster, and tutorial submissions in the broad field of Digital Forensics from both practitioner and researcher’s perspectives. With the dynamic change and rapid expansion of the types of electronic devices, networked applications, and investigation challenges, systematic approaches for automating the process of gathering, analyzing and presenting digital evidence are in unprecedented demands. The SADFE conference aims at promoting solutions for related problems.
Past speakers and attendees of SADFE have included computer scientists, social scientists, forensic practitioners, lawyers and judges. The synthesis of hard technology and science with social science and practice forms the foundation of this conference. Papers focusing on any of the system, legal, or practical aspects of digital forensics are solicited.
Review Process
Papers will be double-blind reviewed using the EasyChair Submission system. Each paper will receive no less than three professional peer reviews with results used for acceptance determination.
Submission Guidelines:
Paper submissions:
All paper submissions must be original work; authors must dearly document any overlap with previously published or simultaneously submitted papers from any of the authors. We are looking for submissions of 5 to 10 pages, excluding references and supplementary materials using the IEEE transactions format. Papers must be formatted for US letter (not A4) size paper. The text must be formatted in a two-column layout, with columns no more than 9.5 in tall and 3.5 in wide. The text must be in Times font, 10-point or larger, with 11-point or larger line spacing. Authors are encouraged to use the IEEE conference proceedings templates. LaTeX submissions should use IEEEtran.cls version 1.8. All submissions will be automatically checked for conformance to these requirements. Failure to adhere to the page limit and formatting requirements are grounds for rejection without review.We encourage authors to submit papers of appropriate length for the research contribution. If your research contributions only requires 5-7 pages, please only submit 5-7 pages (plus references). Shorter papers with be reviewed like any other paper and not penalized. Papers shorter than 5 pages or longer than 10 pages {excluding references) will not be considered. Submitting supplementary material that adds depth to the contribution and/or contributes to the submission's replicability is strongly encouraged. Reviewing will be double blind. Papers must be submitted in a form suitable for anonymous review: no author names or affiliations may appear on the title page, and papers should avoid revealing their identity in the text. When referring to your previous work, do so in the third person, as though it were written by someone else. Only blind the reference itself in the (unusual) case that a third-person reference is infeasible. Publication as a technical report or in an online repository does not constitute a violation of this policy. Contact the program chairs if you have any questions. Papers that are not properly anonymized may be rejected without review.
Poster proposals:
We encourage submission of poster proposals for a chance to present your work in an interactive manner in front of an international audience of forensics security experts from industry, government, and academia. Posters can cover preliminary or exploratory work, smaller research projects, projects that are showing promising results but aren't quite ready for a full publication, or any other work that would benefit from discussion in this sort of an open forum. Topics of interest are the same as those for papers. We are looking for posters that address just about any current digital forensics topic. We are particularly interested in work that shares real-life experiences including actual system or product implementation, deployment, and lessons learned. Poster proposals should be at most 2 pages in length and should briefly describe the objectives of the current work, any accomplishments to date, and future plans. Poster proposal submissions should not be anonymized, so please make sure you include author information (name, affiliation, country) in your proposal. If accepted, you are expected to attend the poster session and stand by their poster (1-2 hours). Posters are not considered to be a prior publication.
Panel proposals:
We encourage submission of panels on the topics suggested below. A panel submission should be 1 page (US letter) in PDF format, listing the panel moderator and affiliation, as well as potential panelists and the panel topic. Length of a panel is typically 1 hour. Panel submissions should not be anonymized.Tutorial proposals:
We also encourage submission of tutorials on the topics below. A tutorial submission should be 1-2 pages (US letter) in PDF format. It should specify the tutorial title, subject area, leader(s), the intended audience, specify any needed lecture materials or books, and length (half-day or full-day). Submissions should focus on the topics below. Vendor-specific training sessions will be rejected. Tutorials requiring textbooks or copyrighted materials such as research papers should make sure permission can be granted by the copyright holders. Tutorials submissions should not be anonymized.
We are using EasyChair as the submission and review system. Over the past a few years, SADFE has had a great experience with EasyChair. Submissions should be made at:https://easychair.org/my/conference?conf=sadfe2020
Important Dates for SADFE 2020: • Deadline for full papers: January 31, 2020 February 14, 2020 11:59pm AoE (UTC-12) • Deadline for full papers (2nd submission round): March 9, 2020 11:59pm AoE (UTC-12) • Deadline for panel and tutorial proposals: February 28, 2020 March 9, 2020 11:59pm AoE (UTC-12) • Notification of paper acceptance or rejection: February 28, 2020 • Notification of paper acceptance or rejection (2nd round): March 22, 2020 • Deadline for final paper camera ready copy: March 27, 2020 • Deadline for poster session abstracts: March 27, 2020 • Notification for panel/tutorial acceptance or rejection: March 27, 2020 • Notification for poster acceptance or rejection: April 10, 2020 • SADFE 2020 symposium dates: May (14-) 15, 2020
Topics to be Addressed at the 13th International Conference on Systematic Approaches to Digital Forensic Engineering (SADFE)
Potential topics to be addressed by submissions include, but are not limited to: • Digital Data and Evidence Management: advanced digital evidence discovery, collection, management, storage and preservation ◦ Identification, authentication and collection of digital evidence ◦ Extraction and management of forensic data/metadata ◦ Identification and redaction of personally identifying information and other forms of sensitive information ◦ Post-acquisition handling of evidence and the preservation of data integrity and admissibility ◦ Evidence and digital memory preservation, curation and storage ◦ Architectures and processes (including network processes) that comply with forensic requirements ◦ Managing geographically, politically and/or jurisdictionally dispersed data artifacts ◦ Data, digital knowledge, and web mining systems for identification and authentication of relevant data ◦ Network forensics, including botnet forensics • Digital Evidence, Data Integrity and Analytics: advanced digital evidence and digitized data analysis, correlation, and presentation ◦ Advanced search, analysis, and presentation of digital evidence ◦ Cybercrime scenario analysis and reconstruction technologies ◦ Legal case construction and digital evidence support ◦ Cyber-crime strategy analysis and modeling ◦ Combining digital and non-digital evidence ◦ Supporting both qualitative and statistical evidence ◦ Computational systems and computational forensic analysis ◦ Digital evidence in the face of encryption ◦ Forensic-support technologies: forensic enabled and proactive monitoring/response ◦ Machine learning techniques, deep learning techniques for analytics and discovery • Forensics of embedded or non-traditional devices (e.g. IoT, cell phones, SCADA, broadband routers, obsolete storage media) ◦ Innovative forensic engineering tools and applications ◦ Proactive forensic-enabled support for incident response ◦ Forensic tool validation: methodologies and principles ◦ Legal and technical collaboration ◦ Digital forensics surveillance technology and procedures ◦ “Honeypot” and other target systems for data collection and monitoring ◦ Quantitative attack impact assessment ◦ Comprehensive fault analysis, including, but not limited to, DFE study of broad realistic system and digital knowledge failures, criminal and non-criminal, with comprehensive DFE (malicious/non-malicious) analysis in theory, methods, and practices. ◦ Machine learning techniques, deep learning techniques for analytics and discovery • Forensic and digital data integrity issues for digital preservation and recovery, including ◦ Technological challenges ◦ Legal and ethical challenges ◦ Economic challenges ◦ Institutional arrangements and workflows ◦ Political challenges and ◦ Cultural and professional challenges • Scientific Principle-Based Digital Forensic Processes: systematic engineering processes supporting digital evidence management which are sound on scientific, technical and legal grounds • Legal/technical aspects of admissibility and evidence tests ◦ Examination environments for digital data ◦ Courtroom expert witness and case presentation ◦ Case studies illustrating privacy, legal and legislative issues ◦ Forensic tool validation: legal implications and issues ◦ Legal and privacy implications for digital and computational forensic analysis ◦ Handling increasing volumes of digital discovery ◦ New Evidence Decisions, e.g., United States v. Jones, _ U.S._ (2012) and United States v. Kotterman, _ F.3d _(9th Cir. 2013) ◦ Computational Forensics and Validation ◦ Transnational Investigations/Case Integration under the Convention on Cybercrime of the Council of Europe ◦ Issues in Forensic Authentication and Validation. • Legal, Ethical and Technical Challenges ◦ forensic, policy and ethical implications of The Internet of Things, The “Smart City,” “Big Data” or Cloud systems
Contact:
Program Chair:Sven Dietrich, CUNY John Jay College of Criminal Justice, USA
General Chair: Matluba Khodjaeva, CUNY John Jay College of Criminal Justice, USA
Panel/tutorial Co-Chairs:
Patrick Duessel, CBS Corporation, USA
Ulrich Flegel, Infineon AG, Germany
Steering Committee:
Sven Dietrich, John Jay College of Criminal Justice at City University of New York, USADeborah Frincke, National Security Agency, USAYong Guan, Iowa State University, USAM Huang, Boeing Research and Technology (retired), USAMichael Losavio, University of Louisville, USAAlec Yasinsac, University of South Alabama, USA
Program Committee:Sudhir Aggarwal, Florida State University, USAFrank Breitinger, University of Liechtenstein, LiechtensteinL Jean Camp, Indiana University at Bloomington, USAK P Chow, The University of Hong Kong, Hong KongMarc Dacier, EURECOM, FranceHerve Debar, Telecom SudParis, FranceDavid Dittrich, University of Washington Tacoma, USAPatrick Duessel, CBS Corporation, USAFelix Freiling, Friedrich-Alexander Universitaet, GermanyDeborah Frincke, National Security Agency, USASimson Garfinkel, US Census Bureau, USALambert Grosskopf, Universitaet Bremen, GermanyYong Guan, Iowa State University, USABarbara Guttman, NIST, USAShweta Jain, CUNY John Jay College of Criminal Justice, USAYu-Li Lin, Chang Gung University, TaiwanMichael Losavio, University of Louisville, USADavid Manz, Pacific Northwest National Laboratory, USANasir Memon, New York University, USAMariofanna Milanova, University of Arkansas Little Rock, USACarsten Momsen, Freie Universitaet Berlin, GermanyKara Nance, University of Alaska, USAGilbert Peterson, Air Force Institute of Technology, USASlim Rekhis, University of Carthage, TunisiaPriyanka Samanta, CUNY Graduate Center, USAAngelos Stavrou, George Mason University, USAWietse Venema, Google, USAAlec Yasinsac, University of South Alabama, USA