CFSE 2013 - The 5th IEEE International Workshop on Computer Forensics in Software Engineering
Topics/Call fo Papers
Computer forensics has been an emerging research area for IT-related professionals, researchers, and practitioners since the turn of the century. However, the majority of the research has focused on “after the fact” issues, namely how to collect and analyze digital evidence in an existing software/hardware environment. In this workshop, we encourage the discussion and study on the “built-in” issues, namely how to build software applications for critical infrastructures that better serve the purpose of computer forensics. Software forensics that analyzes crime-ware code and behavior is also included.
Theme and Scope of the Workshop
The theme of the workshop is to advance research on a legal-activity-enforced cyber environment. We need to build forensics into software so that evidence of cybercrime can be collected more efficiently, cyber attacks on critical infrastructures can be prevented more effectively, and anonymity and privacy can be preserved more confidently. In addition to the study of “after the fact” issues on collection, examination, and analysis of digital evidence, paying attention to computer forensics issues in an early stage of software development has become an urgent need as our society relies more and more on the Internet. In this workshop, we will turn our focus to the foundations of cyberspace to investigate “built-in” issues, such as how to build a software environment that better serves the purpose of computer forensics. The effort to build forensics “by design” will make cyberspace more friendly in a later forensic search and investigation. Topics of interest include, but are not limited to:
? Anti-Plagiarism Technology
? Anti-Software Forensics
? Cloud Forensics
? Code Authorship Analysis or Code-theft Detection
? Compiler Forensics / Formal Methods in Forensic Computing
? Computer Forensics in Education
? Cyber Crime Simulation
? Electronic Voting Forensics
? Forensic Programming and Software Development
? Forensic Testing
? Forensics in Embedded Systems
? Image forensics
? Information hiding technology
? Legal, Ethical, and Privacy Issues in Computing
? Next Generation of Forensic Software
? Social Networking Forensics
? Software Application Forensics (Medical, Financial, Governmental, etc.)
? Software Forensics and Profiling
? Source Code Forensic Recovering
? System Software Forensics (Operating Systems, Browsers, Email systems, etc.)
? Ubiquitous/Mobile Forensic Computing
? Web Services/SOA/XML Forensics
? Workflow/business process forensics
Submission
Papers must be submitted electronically via the CFSE 2013 Submission Page once it becomes available.
Follow the IEEE Computer Society Press Proceedings Author Guidelines to prepare your papers: http://www.computer.org/portal/web/cscps/submissio....
All papers will be carefully reviewed by at least three reviewers. Papers can be submitted as regular papers (six pages), and the acceptance will depend on reviewer feedback. Accepted papers will be published in the workshop proceedings of the IEEE Computer Software and Applications Conference (COMPSAC 2013) by the IEEE CS Press. At least one of the authors of each accepted paper or fast abstract must register as a full participant of the workshop to have the paper or fast abstract published in the proceedings. Each accepted paper must be presented in person by an author.
Theme and Scope of the Workshop
The theme of the workshop is to advance research on a legal-activity-enforced cyber environment. We need to build forensics into software so that evidence of cybercrime can be collected more efficiently, cyber attacks on critical infrastructures can be prevented more effectively, and anonymity and privacy can be preserved more confidently. In addition to the study of “after the fact” issues on collection, examination, and analysis of digital evidence, paying attention to computer forensics issues in an early stage of software development has become an urgent need as our society relies more and more on the Internet. In this workshop, we will turn our focus to the foundations of cyberspace to investigate “built-in” issues, such as how to build a software environment that better serves the purpose of computer forensics. The effort to build forensics “by design” will make cyberspace more friendly in a later forensic search and investigation. Topics of interest include, but are not limited to:
? Anti-Plagiarism Technology
? Anti-Software Forensics
? Cloud Forensics
? Code Authorship Analysis or Code-theft Detection
? Compiler Forensics / Formal Methods in Forensic Computing
? Computer Forensics in Education
? Cyber Crime Simulation
? Electronic Voting Forensics
? Forensic Programming and Software Development
? Forensic Testing
? Forensics in Embedded Systems
? Image forensics
? Information hiding technology
? Legal, Ethical, and Privacy Issues in Computing
? Next Generation of Forensic Software
? Social Networking Forensics
? Software Application Forensics (Medical, Financial, Governmental, etc.)
? Software Forensics and Profiling
? Source Code Forensic Recovering
? System Software Forensics (Operating Systems, Browsers, Email systems, etc.)
? Ubiquitous/Mobile Forensic Computing
? Web Services/SOA/XML Forensics
? Workflow/business process forensics
Submission
Papers must be submitted electronically via the CFSE 2013 Submission Page once it becomes available.
Follow the IEEE Computer Society Press Proceedings Author Guidelines to prepare your papers: http://www.computer.org/portal/web/cscps/submissio....
All papers will be carefully reviewed by at least three reviewers. Papers can be submitted as regular papers (six pages), and the acceptance will depend on reviewer feedback. Accepted papers will be published in the workshop proceedings of the IEEE Computer Software and Applications Conference (COMPSAC 2013) by the IEEE CS Press. At least one of the authors of each accepted paper or fast abstract must register as a full participant of the workshop to have the paper or fast abstract published in the proceedings. Each accepted paper must be presented in person by an author.
Other CFPs
- The 3rd IEEE International Workshop on Complex Information Flows
- The 1st IEEE International Workshop on Consumer Devices and Systems
- The 1st IEEE International Workshop on Architecture, Design, Deployment and Management of Networks and Applications
- The Seventh IEEE International Workshop on Quality Oriented Reuse of Software
- The 8th International Conference on Wireless Algorithms, Systems, and Applications (WASA 2013)
Last modified: 2013-01-09 23:08:50