Digital Forensics


We will add references to the following list gradually. Refer to Introduction to Digital Forensics for classification of digital forensics.

Digital Forensics: Laws and Survey

  1. Robert J. Walls, Brian Neil Levine, Marc Liberatore, and Clay Shields. Effective Digital Forensics Research is Investigator-Centric. In Proceedings of USENIX Workshop on Hot Topics in Security (HotSec), August 2011.
  2. Al Rees, Cybercrime Laws of the United States, October 2006
  3. Digital Millennium Copyright Act
  4. Computer Fraud and Abuse Act
  5. Children’s Online Privacy Protection Act (COPPA)
  6. Child Online Protection Act (COPA)
  7. Privacy Act
  8. E-Government Act
  9. REAL ID Act
  10. Communications Assistance for Law Enforcement Act
  11. Safe Streets Act
  12. Omnibus Crime Control and Safe Streets Act
  13. The USA PATRIOT Act
  14. Surveillance Act of 1978 ( FISA)
  15. Gramm-Leach-Bliley Act of 1999
  16. The Ethics in Government Act
  17. The Security and Freedom through Encryption Act ( SAFE)
  18. Telecommunications Act
  19. Communications Decency Act (CDA)
  20. Children’s Internet Protection Act
  21. Freedom of Information Act
  22. Child Pornography Prevention Act
  23. Copyright Act
  24. No Electronic Theft Act
  25. Stop Online Piracy Act
  26. Unlawful Internet Gambling
    Enforcement Act
  27. SPEECH Act
  28. Electronic Communications Privacy Act (ECPA)

Computer Forensics

  1. Robert J. Walls, Erik Learned-Miller, and Brian Neil Levine. Forensic Triage for Mobile Phones with DEC0DE. In Proceedings of USENIX Security Symposium, August 2011.
  2. Cindy Murphy, Cellular Phone Evidence - Data Extraction and Documentation, Digital Forensics Magazine, 2011.
  3. Salvatore Fiorillo, Theory and practice of flash memory mobile forensics, in Proceedings of the 7th Australian Digital Forensics Conference, 2009
  4. Wayne Jansen, Aurélien Delaitre, and Ludovic Moenner, Overcoming Impediments to Cell Phone Forensics, in Proceedings of the 41st Hawaii International Conference on System Sciences, 2008
  5. Wayne Jansen and Rick Ayers, Guidelines on Cell Phone Forensics, National Institute of Standards and Technology, May 2007.
  6. Rick Ayers Wayne Jansen Nicolas Cilleros Ronan Daniellou, Cell Phone Forensic Tools: An Overview and Analysis, National Institute of Standards and Technology, October 2005.

Network Forensics

  1. Junwei Huang, Yinjie Chen, Zhen Ling, Kyungseok Choo, Xinwen Fu, A Framework of Network Forensics and its Application of Locating Suspects in Wireless Crime Scene Investigation, in Proceedings of the 7th International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE'12), Vancouver, Canada, September 28, 2012
  2. Swagatika Prusty, Brian Neil Levine, and Marc Liberatore. Forensic Investigation of the OneSwarm Anonymous Filesharing System. In Proc. ACM Conference on Computer and Communications Security (CCS), October 2011.

Software Forensics

  1. Efstathios Stamatatos, A Survey of Modern Authorship Attribution Methods, Journal of the American Society for Information Science and Technology, 60(3), pp. 538-556, 2009, Wiley.
  2. Moshe Koppel, Jonathan Schler and Shlomo Argamon, Computational Methods in Authorship Attribution, Journal of the American Society for Information Science and Technology, 60(1), Pages 9-26, January 2009
  3. Andrew Gray, Philip Sallis and Stephen MacDonell, Software Forensics: Extending Authorship Analysis Techniques to Computer Programs, The Information Science Discussion Paper Series, Number 97/14, December 1997

Database Forensics

  1. Martin S. Olivier, On metadata context in Database Forensics, Digital Investigation, 5, Page2 115 – 123, 2009
  2. Patrick Stahlberg, Gerome Miklau, and Brian Neil Levine, Threats to Privacy in the Forensic Analysis of Database Systems, In Proceedings of ACM International Conference on Management of Data (SIGMOD), pages 91--102, June 2007.
  3. Kevvie Fowler, A real world scenario of a SQL Server 2005 database forensics investigation, Black Hat USA 2007, [PPT in pdf]