May 7th - 9th, 2018
Hamburg, Germany
http://www.imf-conference.org/
mailto:2018@imf-conference.org
Conference of SIG SIDAR
of the German Informatics Society (GI).
Time | Presentation / Description | Speaker/Author/Session Chair |
---|---|---|
From 11:30 - 13:10 | Registration and Lunch | |
13:10 - 13:30 | Welcome | Conference Chair Holger Morgenstern Albstadt-Sigmaringen University Peter Wirnsperger Deloitte |
13:30 - 14:30 | Keynote: What world do you want your children to live in? You can make the difference. | Don Stikvoort Open CSIRT Foundation, chair |
14:30 - 15:00 | Coffee Break | |
15:00 - 16:00 | Session 1: Network and Cloud Security (Presentation proposals) | Andreas Dewald |
DNS Firewall use cases and lessons learned |
Matthias Seitz |
|
Streamline AWS Security Incidents |
Asif Matadar |
|
16:00 - 16:40 | Session 2:Network and Cloud Security (Full paper) | Andreas Dewald |
On the Robustness of Random Walk Algorithms for the Detection of Unstructured P2P Botnets |
Dominik Muhs Steffen Haas Mathias Fischer |
|
16:40 - 17:10 | Coffee Break | |
17:10 - 18:10 | Panel: Incident Management and GDPR |
TBA |
Time | Presentation / Description | Speaker/Author/Session Chair |
---|---|---|
From 08:30 - 09:00 | Registration | |
09:00 - 10:00 | Keynote: Beware of the Ninjas | Felix Leder Symantec Honeynet Project |
10:00 - 10:30 | Coffee Break | |
10:30 - 12:30 | Session 3: Memory forensics and automotive (Full paper) |
Harald Baier |
Exploring the processing of personal data in modern vehicles - A Proposal of a testbed for explorative research to achieve transparency for privacy and security
|
Alexandra Koch Robert Altschaffel Mario Hildebrandt Stefan Kiltz Jana Dittmann |
|
Linux Memory Forensics: Expanding Rekall for Userland Investigation |
Johannes Stadlinger Frank Block Andreas Dewald |
|
mrsh-mem: Approximate matching on raw memory dumps |
Lorenz Liebler Frank Breitinger |
|
12:30 - 13:30 | Lunch Break | |
13:30 - 14:00 | Lightning Talks |
|
14:00 - 14:15 | Coffee Break | |
14:15 - 15:45 | Workshop: Accelerate the Hunt: Using Passive DNS To Connect the Dots in Digital Investigations |
Paul Vixie Farsight Security |
15:45 - 16:15 | Coffee Break | |
16:15 - 17:45 | Workshop: Accelerate the Hunt: Using Passive DNS To Connect the Dots in Digital Investigations |
Paul Vixie Farsight Security |
19:00 - 22:30 | Social Event: Harbour and Elbe boat tour with dinner, boat „Commodore“ leaving from Überseebrücke, 20459 Hamburg |
Time | Presentation / Description | Organisation |
---|---|---|
From 08:30 - 09:00 | Registration | |
09:00 - 11:00 | Session 4: Digital evidence and anti forensics (Full paper) |
Stefan Kiltz |
Principles of Secure Logging for Safekeeping Digital Evidence |
Felix Freiling Edita Bajramovic |
|
Defeating the Secrets of OTP Apps |
Michael Spreitzenbarth Philip Polleit |
|
Introducing Anti-Forensics to SQLite Corpora and Tool Testing |
Sven Schmitt | |
11:00 - 11:30 | Coffee Break | |
11:30 - 12:30 | Session 5: Social media and crypto currencies (Presentation proposals) |
Christian Keil |
Complexities in Investigating cases of Social Engineering: How reverse engineering and profiling can assist in the collection of evidence |
Christina Lekati | |
Swimming in the Monero pools |
Emilien Le Jamtel | |
12:30 - 13:10 | Session 6: Risk assessment (Full paper) |
Christian Keil |
The β -Time-to-Compromise Metric for Practical Cyber Security Risk Estimation |
Andrej Zieger Klaus-Peter Kossakowski Felix Freiling |
|
13:10 - 13:20 | Good bye |
Conference Chair Klaus-Peter Kossakowski Program Chairs Harald Baier Christian Keil |
13:20 - 14:10 | Lunch |