CFSE 2014 - 6th Workshop on Computer forensics in software Engineering
Topics/Call fo Papers
The theme of the workshop is to advance research on a legal-activity-enforced cyber environment. We need to build forensics into software so that evidence of cybercrime can be collected more efficiently, cyber attacks on critical infrastructures can be prevented more effectively, and anonymity and privacy can be preserved more confidently. In addition to the study of “after the fact” issues on collection, examination, and analysis of digital evidence, paying attention to computer forensics issues in an early stage of software development has become an urgent need as our society relies more and more on the Internet. In this workshop, we will turn our focus to the foundations of cyberspace to investigate “built-in” issues, such as how to build a software environment that better serves the purpose of computer forensics. The effort to build forensics “by design” will make cyberspace more friendly in a later forensic search and investigation. Topics of interest include, but are not limited to:
? Anti-Plagiarism Technology
? Anti-Software Forensics
? Cloud Forensics
? Code Authorship Analysis or Code-theft Detection
? Compiler Forensics / Formal Methods in Forensic Computing
? Computer Forensics in Education
? Cyber Crime Simulation
? Electronic Voting Forensics
? Forensic Programming and Software Development
? Forensic Testing
? Forensics in Embedded Systems
? Image forensics
? Information hiding technology
? Legal, Ethical, and Privacy Issues in Computing
? Next Generation of Forensic Software
? Social Networking Forensics
? Software Application Forensics (Medical, Financial, Governmental, etc.)
? Software Forensics and Profiling
? Source Code Forensic Recovering
? System Software Forensics (Operating Systems, Browsers, Email systems, etc.)
? Ubiquitous/Mobile Forensic Computing
? Web Services/SOA/XML Forensics
? Workflow/business process forensics
? Anti-Plagiarism Technology
? Anti-Software Forensics
? Cloud Forensics
? Code Authorship Analysis or Code-theft Detection
? Compiler Forensics / Formal Methods in Forensic Computing
? Computer Forensics in Education
? Cyber Crime Simulation
? Electronic Voting Forensics
? Forensic Programming and Software Development
? Forensic Testing
? Forensics in Embedded Systems
? Image forensics
? Information hiding technology
? Legal, Ethical, and Privacy Issues in Computing
? Next Generation of Forensic Software
? Social Networking Forensics
? Software Application Forensics (Medical, Financial, Governmental, etc.)
? Software Forensics and Profiling
? Source Code Forensic Recovering
? System Software Forensics (Operating Systems, Browsers, Email systems, etc.)
? Ubiquitous/Mobile Forensic Computing
? Web Services/SOA/XML Forensics
? Workflow/business process forensics
Other CFPs
- 4th International Workshop on Complex Information Flows
- 5th IEEE International Workshop on Component-Based Design of Resource-Constrained Systems
- 1st IEEE International Workshop on User Centered Design and Adaptive Systems
- 2nd International Workshop on Architecture, Design, Deployment and Management of Networks and Applications
- 6th Industrial Experience in Embedded Systems Design
Last modified: 2014-01-10 00:21:06