Topic Seminars by Students


Aims

  • To achieve an in-depth understanding of a research paper about a particular topic on digital forensics. 
  • To be able to summarise and organise learnt concepts and ideas and convey them via a short oral presentation.

Format

There will be seven classes dedicated to the presentation of topic seminars by students. In each class, 2 or 3 seminars will be presented. Each seminar consists of 15-min paper presentation, followed by a discussion of 5 min. Seminars are presented individually. After each seminar, the slides must be submitted to the faculty through the Fenix system.

Registrations

Each student must present two seminars. The proposed line-up for the seminars' dates and speakers can be found in this table (http://www.slottr.com/sheets/687500).
You are expected to confirm that you can make your presentations in the pre-assigned dates. Please, make sure to fill out the table slots with references of the two papers you wish to present.
Below in this page you find a list of papers suggested by the faculty. You can pick two of these papers or select alternative ones of your choice. If you wish to present alternative papers, those papers must be approved by the faculty.

You must select the papers for the topic seminars no later than 17 March.


Grading

Each seminar represents 15% of the total score. A seminar will be evaluated individually according to the following criteria:
  • Quality of slides - structure of the slides, clarity and readability of each slide, conveying of the key ideas
  • Content - relevance of covered content, with appropriate highlight to the most important ideas
  • Depth - understanding of the topic that is presented
  • Originality - detachment from wording used in cited materials (i.e., use your own words)
  • Structure - the seminar should start with an introduction to the paper, present the main ideas, and provide a conclusion; it is also possible to point to related study materials, open problems and research topics for future work

Paper Assignment


DateSpeakerPaper
Thu, Mar 31Catarina Rego[Walker2008]
Thu, Mar 31Maria Santos[Grispos2012]
Thu, Apr  7Luís Pereira[Nikkel2006]
Thu, Apr  7Maria Gomes[Pal2009]
Thu, Apr 14Isabel Baptista[Bravo2006]
Thu, Apr 14Mariana Silva[Huber2011]
Thu, Apr 21Jorge Batalha[Verissimo2012]
Thu, Apr 21Seyedeh Razavi[IAFCI2013]
Thu, Apr 21Telma Tavares[Alva2012]
Thu, Apr 28Catarina Rego[Cormack2011]
Thu, Apr 28Maria Santos[Dias2012]
Thu, Apr 28Luís Pereira[Casey2011]
Thu, May  5Maria Gomes[Guo2009]
Thu, May  5Isabel Baptista[Mutawa2012]
Thu, May  5Mariana Silva[Garfinkel2010]
Thu, May 12Jorge Batalha[Piva2013]
Thu, May 12Seyedeh Razavi 
Thu, May 12Telma Tavares[Garfinkel2013]

Papers

Check the bottom of this page to download the papers.

Law

[Dias2012] Vera Marques Dias. “A problemática da investigação do cibercrime”. DataVenia. 2012

[Bravo2006] Rogério Bravo, “Da não equiparação do correio electrónico ao conceito tradicional de correspondência por carta”, Polícia e Justiça, nº 7, 3ª série (Jan.-Jun. 2006);

[Silva2015] Nuno Sousa e Silva. “A Internet — um objecto para o Direito Administrativo Global?”. Portuguese Catholic University - Porto, Law School. 2015


Forensic Tools

[Guo2009] Yinghua Guo, Jill Slay, Jason Beckett. “Validation and verification of computer forensic software tools - Searching Function”. Digital Investigation. Elsevier. 2009

[Ayers2009] Daniel Ayers. “A second generation computer forensic analysis system”. Digital Investigation. Elsevier. 2009


Insider Threats

[Walker2008] Terrence Walker. “Practical management of malicious insider threat – An enterprise CSIRT perspective”. Elsevier. 2009

[Garfinkel2013] Simson L. Garfinkel, Nicole Beebe, Lishu Liu, and Michele Maasberg. “Detecting Threatening Insiders with Lightweight Media Forensics”. 2013.


Network Forensics

[Nikkel2006] Bruce J. Nikkel. “Improving evidence acquisition from live network sources”. Digital Investigation. Elsevier. 2006.


File Carving

[Pal2009] Anandabrata Pal and Nasir Memon. “The evolution of file carving”. 2009 [paper]


Mobile Devices

[Casey2011] Eoghan Casey and Benjamin Turnbull. “Digital Evidence on Mobile Devices”. 2011

[Mislan2010] Richard P. Mislan, Eoghan Casey, Gary C. Kessler. The growing need for on-scene triage of mobile devices. Digital Investigation. 2010.

[Maus2014] Stefan Maus, Hans Höfken, Marko Schuba. Forensic Analysis of Geodata in Android Smartphones. 2014


Cloud Computing

[Grispos2012] George Grispos, Tim Storer, William Bradley Glisson. “Calm Before the Storm: The Challenges of Cloud Computing in Digital Forensics”. International Journal of Digital Crime and Forensics. 2012

[Dykstra2013] Josiah Dykstra, Alan T. Sherman - Digital Forensic Tools for the OpenStack Cloud Computing Platform, DFRWS 2013, 2013
[Martini2012] Ben Martini, Kim-Kwang Raymond Choo. An integrated conceptual digital forensic framework for cloud computing. Digital Investigation, 2012

[Alva2012] Aaron Alva, Scott David, Barbara Endicott-Popovsky - Forensic Barriers: Legal Implications of Storing and Processing Information in the Cloud. SADFE. 2012


Fraud Detection

[Bhusari2011] V. Bhusari, S. Patil. “Application of Hidden Markov Model in Credit Card Fraud Detection”. International Journal of Distributed and Parallel Systems. 2011 [paper]


Social Networks

[Huber2011] Markus Huber, Martin Mulazzani, Manuel Leithner, Sebastian Schrittwieser, Gilbert Wondracek, Edgar Weippl. “Social Snapshots: Digital Forensics for Online Social Networks”. Annual Computer Security Applications Conference. 2011.

[Verissimo2012] “Implicações Jurídicas das redes sociais na Internet: Um novo conceito de privacidade?”

[Mutawa2012] Noora Al Mutawa, Ibrahim Baggili, Andrew Marrington, "Forensic analysis of social networking applications on mobile devices". Digital Investigation. 2012.


Multimedia Forensics

[Bohme2009] Rainer Bohme, Felix C. Freiling, Thomas Gloe, and Matthias Kirchner. Multimedia Forensics Is Not Computer Forensics. IWCF. 2009.

[Milani2012] Simone Milani, Marco Fontani, Paolo Bestagini, Mauro Barni, Alessandro Piva, Marco Tagliasacchi and Stefano Tubaro. “An overview on video forensics”. APSIPA Transactions on Signal and Information Processing. 2012

[Piva2013] Alessandro Piva. “An Overview on Image Forensics”. ISRN Signal Processing. 2013.


Steganography and Watermarking

[Djebbar2012] Fatiha Djebbar, Beghdad Ayad, Karim Abed Meraim, Habib Hamam. “Comparative study of digital audio steganography techniques”. 2012.

[Rey2002] Christian Rey, Jean-Luc Dugelay. “A Survey of Watermarking Algorithms for Image Authentication”. EURASIP Journal on Applied Signal Processing. 2002.


Virtual Currency

[IAFCI2013] IAFCI. “Virtual Currency: Overview and Emerging Risks” 2013


Open Challenges in Digital Forensics

[Garfinkel2010] Simson L. Garfinkel. “Digital forensics research: The next 10 years”. Digital Investigation. Elsevier. 2010.


Attachments