September 15th to 17th, 2009
Stuttgart, Germany
http://www.imf-conference.org/
mailto:2009@imf-conference.org
Conference of SIG SIDAR
of the German Informatics Society (GI).
Time | Presentation / Description | Speaker |
---|---|---|
10:00 | Registration/Coffee | |
11:00 | Greeting and Introduction | |
11:15 | Keynote: Overcast: Forensic Discovery in Cloud Environments (PDF) |
Stephen Wolthusen Royal Holloway, University of London, UK |
12:10 | Botnet Statistical Analysis Tool for Limited Resource Computer Emergency Response Team (PDF) | Nuttapong Sanglerdsinlapachai NECTEC, Thailand |
13:00 | Lunch | |
14:00 | Semi-Autonomous Link Layer Vulnerability Discovery and Mitigation Dissemination (PDF) | Ziyad Al-Salloum and Stephen Wolthusen Royal Holloway, University of London, UK |
14:50 | From the Incident Taxonomy to a Forensic Examination Taxonomy (PDF) | Stefan Kiltz Otto-von-Guericke-University Magdeburg, Germany |
15:40 | Break | |
16:15 | Fast user classifying to establish forensic analysis priorities (PDF) | Alessandro Lentini University of Rome Tor Vergata, Italy |
16:45 | SIG SIDAR meeting (PDF) | Michael Meier |
17:30 | End of Day One | |
19:00 | Social Event |
Time | Presentation / Description | Speaker |
---|---|---|
09:00 | Registration/Coffee | |
09:25 | Greeting and Introduction | |
09:30 | Safe-keeping Digital Evidence with Secure Logging Protocols: State of the Art and Challenges (PDF) | Rafael Accorsi University of Freiburg, Germany |
10:20 | Rump Session III (PDF 1) (PDF 2) | Cooperative Reseach: "Development of Analytical and Forensic Tools" |
11:10 | Break | |
11:40 | Experiences with an Advanced Honetnet Testbed to Detect new Internet Worms (PDF) | Jan Kohlrausch DFN-CERT, Germany |
12:30 | Rump Session I (PDF) | DUPE - The Depository of Universal Plagiarism Examples |
13:00 | Lunch | |
14:00 | The Forensic Image Generator Generator (PDF) | Felix Freiling and Christian Moch University of Mannheim, Germany |
14:50 | Rump Session II (PDF) | Curriculum "Digital Forensics" at the Technical University of Albstadt-Siegmaringen |
15:15 | KeyNote | Oliver Göbel, RUS-CERT, University of Stuttgart |
16:00 | End of Day Two |
Time | Presentation / Description | Speaker |
---|---|---|
08:00 | Registration/Coffee | |
08:45 | Greeting and Introduction | |
09:00 | Getting the full picture in mobile forensic investigation a practical workshop on physical extraction of data from mobile phones (PDF) |
Martin Westman Micro Systemation, Sweden |
10:30 | Break | |
11:00 | A forensic process model and its practical application during the investigation of an exemplary selected incident | Stefan Kiltz Otto-von-Guericke-University Magdeburg, Germany |
IT-Forensics at Fraunhofer SIT(PDF) | York Yannikos Frauhofer SIT, Darmstadt, Germany |
|
13:00 | Lunch | |
14:00 | Digital Discovery with Bootable CDs (PDF 1) (PDF 2) | Ralf Moll, Federal Police Baden-Wuerttemberg, Germany Michael Prokop, grml Solutions, Austria Holger Morgenstern, gutachten.info, Germany |
16:45 | End of Day Three |
The conference would qualify for CPE hours for ISACA
certifications (CISA, CISM and CGEIT) and (ISC)² certification
CISSP. Participants can earn up to 18 CPE for continuing their
professional education.