CFSE 2012 - The 4th IEEE International Workshop on Computer Forensics in Software Engineering
Topics/Call fo Papers
Computer forensics has been an emerging research area for IT-related professionals, researchers, and practitioners since the turn of the century. However, the majority of the research has focused on “after the fact” issues, namely how to collect and analyze digital evidence in an existing software/hardware environment. In this workshop, we encourage the discussion and study on the “built-in” issues, namely how to build software applications for critical infrastructures that better serve the purpose of computer forensics. Software forensics that analyzes crime-ware code
and behavior is also included.
Theme and Scope of the Workshop
The theme of the workshop is to advance research on a legal-activity-enforced cyber environment. We need to build forensics into software so that evidence of cybercrime can be collected more efficiently, cyber attacks on critical infrastructures can be prevented more effectively, and anonymity and privacy can be preserved more confidently.
In addition to the study of “after the fact” issues on collection, examination, and analysis of digital evidence, paying attention to computer forensics issues in an early stage of software development has become an urgent need as our society relies more and more on the Internet. In this workshop, we will turn our focus to the foundations of cyberspace to investigate “built-in” issues, such as how to build a software environment that better serves the purpose of computer forensics. The effort to build forensics “by design” will make cyberspace more friendly in a later forensic search and investigation.
Topics of interest include, but are not limited to,
? Anti-Plagiarism Technology
? Anti-Software Forensics
? Cloud Forensics
? Code Authorship Analysis or Code-theft Detection
? Compiler Forensics / Formal Methods in Forensic Computing
? Computer Forensics in Education
? Cyber Crime Simulation
? Electronic Voting Forensics
? Forensic Programming and Software Development
? Forensic Testing
? Forensics in Embedded Systems
? Image forensics
? Information hiding technology
? Legal, Ethical, and Privacy Issues in Computing
? Next Generation of Forensic Software
? Social Networking Forensics
? Software Application Forensics (Medical, Financial, Governmental, etc.)
? Software Forensics and Profiling
? Source Code Forensic Recovering
? System Software Forensics (Operating Systems, Browsers, Email
systems, etc.)
? Ubiquitous/Mobile Forensic Computing
? Web Services/SOA/XML Forensics
? Workflow/business process forensics
and behavior is also included.
Theme and Scope of the Workshop
The theme of the workshop is to advance research on a legal-activity-enforced cyber environment. We need to build forensics into software so that evidence of cybercrime can be collected more efficiently, cyber attacks on critical infrastructures can be prevented more effectively, and anonymity and privacy can be preserved more confidently.
In addition to the study of “after the fact” issues on collection, examination, and analysis of digital evidence, paying attention to computer forensics issues in an early stage of software development has become an urgent need as our society relies more and more on the Internet. In this workshop, we will turn our focus to the foundations of cyberspace to investigate “built-in” issues, such as how to build a software environment that better serves the purpose of computer forensics. The effort to build forensics “by design” will make cyberspace more friendly in a later forensic search and investigation.
Topics of interest include, but are not limited to,
? Anti-Plagiarism Technology
? Anti-Software Forensics
? Cloud Forensics
? Code Authorship Analysis or Code-theft Detection
? Compiler Forensics / Formal Methods in Forensic Computing
? Computer Forensics in Education
? Cyber Crime Simulation
? Electronic Voting Forensics
? Forensic Programming and Software Development
? Forensic Testing
? Forensics in Embedded Systems
? Image forensics
? Information hiding technology
? Legal, Ethical, and Privacy Issues in Computing
? Next Generation of Forensic Software
? Social Networking Forensics
? Software Application Forensics (Medical, Financial, Governmental, etc.)
? Software Forensics and Profiling
? Source Code Forensic Recovering
? System Software Forensics (Operating Systems, Browsers, Email
systems, etc.)
? Ubiquitous/Mobile Forensic Computing
? Web Services/SOA/XML Forensics
? Workflow/business process forensics
Other CFPs
- The 1st IEEE International Workshop on Methods for Establishing Trust with Open Data
- The Sixth IEEE International Workshop on Quality Oriented Reuse of Software
- First International Scientific Global Warming Solution(GWS) Conference PAC 2010
- 14th International Telecommunications Network Strategy and Planning Symposium NETWORKS 2010
- 9th International Conference of the Learning Sciences ICLS 2010
Last modified: 2011-12-17 22:52:01