scispace - formally typeset
Search or ask a question
Conference

International Workshop on Computational Forensics 

About: International Workshop on Computational Forensics is an academic conference. The conference publishes majorly in the area(s): Biometrics & Handwriting. Over the lifetime, 73 publications have been published by the conference receiving 936 citations.

Papers published on a yearly basis

Papers
More filters
Book ChapterDOI
11 Nov 2010
TL;DR: A methodology for mobile forensics analysis, to detect "malicious" applications, i.e., those that deceive users hiding some of their functionalities, specifically targeted for the Android mobile operating system.
Abstract: The paper presents a methodology for mobile forensics analysis, to detect "malicious" (or "malware") applications, i.e., those that deceive users hiding some of their functionalities. This methodology is specifically targeted for the Android mobile operating system, and relies on its security model features, namely the set of permissions exposed by each application. The methodology has been trained on more than 13,000 applications hosted on the Android Market, collected with AppAware. A case study is presented as a preliminary validation of the methodology.

84 citations

Book ChapterDOI
14 Aug 2009
TL;DR: Its inherent limitations in the case of short digital audio recordings are discussed, and a matching procedure based on the correlation coefficient is presented, as a more robust alternative to squared error matching.
Abstract: The Electric Network Frequency (ENF) Criterion is a recently developed forensic technique for determining the time of recording of digital audio recordings, by matching the ENF pattern from a questioned recording with an ENF pattern database. In this paper we discuss its inherent limitations in the case of short --- i.e., less than 10 minutes in duration --- digital audio recordings. We also present a matching procedure based on the correlation coefficient, as a more robust alternative to squared error matching.

66 citations

Book ChapterDOI
07 Aug 2008
TL;DR: An overview of computational forensics with a focus on those disciplines that involve pattern evidence, and a scientific basis for the expertise, is given.
Abstract: Cognitive abilities of human expertise modeled using computational methods offer several new possibilities for the forensic sciences. They include three areas: providing tools for use by the forensic examiner, establishing a scientific basis for the expertise, and providing an alternate opinion on a case. This paper gives a brief overview of computational forensics with a focus on those disciplines that involve pattern evidence.

55 citations

Book ChapterDOI
14 Aug 2009
TL;DR: This paper devises an ontology that structures forensic disciplines by their primary domain of evidence, and concludes that while perfect concealment of traces is possible for computer forensics, this level of certainty cannot be expected for manipulations of sensor data.
Abstract: The recent popularity of research on topics of multimedia forensics justifies reflections on the definition of the field. This paper devises an ontology that structures forensic disciplines by their primary domain of evidence. In this sense, both multimedia forensics and computer forensics belong to the class of digital forensics, but they differ notably in the underlying observer model that defines the forensic investigator's view on (parts of) reality, which itself is not fully cognizable. Important consequences on the reliability of probative facts emerge with regard to available counter-forensic techniques: while perfect concealment of traces is possible for computer forensics, this level of certainty cannot be expected for manipulations of sensor data. We cite concrete examples and refer to established techniques to support our arguments.

48 citations

Book ChapterDOI
14 Aug 2009
TL;DR: This paper proposes a method to identify authors of short informal messages solely based on the text content that uses compression distances between texts as features and clearly outperformed the other methods.
Abstract: In several situations authors prefer to hide their identity. In forensic applications, one can think of extortion and threats in emails and forum messages. These types of messages can easily be adjusted, such that meta data referring to names and addresses is at least unreliable. In this paper, we propose a method to identify authors of short informal messages solely based on the text content. The method uses compression distances between texts as features. Using these features a supervised classifier is learned on a training set of known authors. For the experiments, we prepared a dataset from Dutch newsgroup texts. We compared several state-of-the-art methods to our proposed method for the identification of messages from up to 50 authors. Our method clearly outperformed the other methods. In 65% of the cases the author could be correctly identified, while in 88% of the cases the true author was in the top 5 of the produced ranked list.

40 citations

Performance
Metrics
No. of papers from the Conference in previous years
YearPapers
20156
20141
201210
201018
200916
200821