Topic Seminars by Students


Aims

  • To achieve an in-depth understanding of a research paper about a particular topic on digital forensics. 
  • To be able to summarise and organise learnt concepts and ideas and convey them via a short oral presentation.

Format


There will be four classes dedicated to the presentation of topic seminars by students. In each class, 2 or 3 seminars will be presented. Each seminar consists of 15-min paper presentation, followed by a discussion of 5 min. Seminars are presented individually. After each seminar, the slides must be submitted to the faculty through the Fenix system.

Registrations


Each student must present one seminar. The proposed line-up for the seminars' dates and speakers will be agreed upon with the students.

Below in this page you find a list of suggested papers. You can pick one of these papers or select alternative one of your choice. If you wish to present alternative papers, those papers must be approved by the faculty.

You must select the papers for the topic seminars no later than 17 April.


Grading


Each seminar represents 20% of the total score. A seminar will be evaluated individually according to the following criteria:
  • Quality of slides - structure of the slides, clarity and readability of each slide, conveying of the key ideas
  • Content - relevance of covered content, with appropriate highlight to the most important ideas
  • Depth - understanding of the topic that is presented
  • Originality - detachment from wording used in cited materials (i.e., use your own words)
  • Structure - the seminar should start with an introduction to the paper, present the main ideas, and provide a conclusion; it is also possible to point to related study materials, open problems and research topics for future work

Paper Assignment


Selected papers:

  • [Nieto2016] presented by Graça Costa
  • [Ayers2009] presented by João Costa
  • [Djebbar2012] presented by António Carvalho
  • [IAFCI2013] presented by Manuel Torrinha
  • [Dias2012] presented by Liliana Santos
  • [Kirubavathi2014] presented by Cátia Dionísio
  • [Veríssimo2012] presented by Cláudia Sequeira
  • [Pal2009] presented by Angelo Velissaratos
  • [Walker2008] presented by Eunice Rodrigues
  • [Piva2003] presented by Luís Guerreiro

DateSpeaker
Thu, Apr 27       António, Cláudia
Thu, May 4Graça, Manuel
Thu, May 11Cátia, Angelo
Thu, May 18Liliana, João
Thu, May 25Eunice, Luís

Papers

Check the bottom of this page to download the papers.


Law

[Dias2012] Vera Marques Dias. “A problemática da investigação do cibercrime”. DataVenia. 2012

[Silva2015] Nuno Sousa e Silva. “A Internet — um objecto para o Direito Administrativo Global?”. Portuguese Catholic University - Porto, Law School. 2015

[Nieto2016] Ana Nieto, Rodrigo Roman, and Javier Lopez. Digital Witness: Safeguarding Digital Evidence by Using Secure Architectures in Personal Devices. IEEE Network. 2016


Forensic Tools

[Guo2009] Yinghua Guo, Jill Slay, Jason Beckett. “Validation and verification of computer forensic software tools - Searching Function”. Digital Investigation. Elsevier. 2009

[Ayers2009] Daniel Ayers. “A second generation computer forensic analysis system”. Digital Investigation. Elsevier. 2009


Insider Threats

[Walker2008] Terrence Walker. “Practical management of malicious insider threat – An enterprise CSIRT perspective”. Elsevier. 2009

[Garfinkel2013] Simson L. Garfinkel, Nicole Beebe, Lishu Liu, and Michele Maasberg. “Detecting Threatening Insiders with Lightweight Media Forensics”. 2013.


Network Forensics

[Nikkel2006] Bruce J. Nikkel. “Improving evidence acquisition from live network sources”. Digital Investigation. Elsevier. 2006.

[Kirubavathi] G. Kirubavathi. "Botnets: a study and analysis". Elsevier. 2014


File Carving

[Pal2009] Anandabrata Pal and Nasir Memon. “The evolution of file carving”. 2009 [paper]


Mobile Devices

[Casey2011] Eoghan Casey and Benjamin Turnbull. “Digital Evidence on Mobile Devices”. 2011

[Mislan2010] Richard P. Mislan, Eoghan Casey, Gary C. Kessler. The growing need for on-scene triage of mobile devices. Digital Investigation. 2010.

[Maus2014] Stefan Maus, Hans Höfken, Marko Schuba. Forensic Analysis of Geodata in Android Smartphones. 2014


Cloud Computing

[Grispos2012] George Grispos, Tim Storer, William Bradley Glisson. “Calm Before the Storm: The Challenges of Cloud Computing in Digital Forensics”. International Journal of Digital Crime and Forensics. 2012

[Dykstra2013] Josiah Dykstra, Alan T. Sherman - Digital Forensic Tools for the OpenStack Cloud Computing Platform, DFRWS 2013, 2013 
[Martini2012] Ben Martini, Kim-Kwang Raymond Choo. An integrated conceptual digital forensic framework for cloud computing. Digital Investigation, 2012

[Alva2012] Aaron Alva, Scott David, Barbara Endicott-Popovsky - Forensic Barriers: Legal Implications of Storing and Processing Information in the Cloud. SADFE. 2012


Fraud Detection

[Bhusari2011] V. Bhusari, S. Patil. “Application of Hidden Markov Model in Credit Card Fraud Detection”. International Journal of Distributed and Parallel Systems. 2011 [paper]


Social Networks

[Huber2011] Markus Huber, Martin Mulazzani, Manuel Leithner, Sebastian Schrittwieser, Gilbert Wondracek, Edgar Weippl. “Social Snapshots: Digital Forensics for Online Social Networks”. Annual Computer Security Applications Conference. 2011.

[Verissimo2012] “Implicações Jurídicas das redes sociais na Internet: Um novo conceito de privacidade?”

[Mutawa2012] Noora Al Mutawa, Ibrahim Baggili, Andrew Marrington, "Forensic analysis of social networking applications on mobile devices". Digital Investigation. 2012.


Multimedia Forensics

[Bohme2009] Rainer Bohme, Felix C. Freiling, Thomas Gloe, and Matthias Kirchner. Multimedia Forensics Is Not Computer Forensics. IWCF. 2009.

[Milani2012] Simone Milani, Marco Fontani, Paolo Bestagini, Mauro Barni, Alessandro Piva, Marco Tagliasacchi and Stefano Tubaro. “An overview on video forensics”. APSIPA Transactions on Signal and Information Processing. 2012

[Piva2013] Alessandro Piva. “An Overview on Image Forensics”. ISRN Signal Processing. 2013.


Steganography and Watermarking

[Djebbar2012] Fatiha Djebbar, Beghdad Ayad, Karim Abed Meraim, Habib Hamam. “Comparative study of digital audio steganography techniques”. 2012.

[Rey2002] Christian Rey, Jean-Luc Dugelay. “A Survey of Watermarking Algorithms for Image Authentication”. EURASIP Journal on Applied Signal Processing. 2002.


Virtual Currency

[IAFCI2013] IAFCI. “Virtual Currency: Overview and Emerging Risks” 2013


Open Challenges in Digital Forensics

[Garfinkel2010] Simson L. Garfinkel. “Digital forensics research: The next 10 years”. Digital Investigation. Elsevier. 2010.





Attachments