CFSE: The 10th IEEE International Workshop on Computer Forensics in Software Engineering
Call for Papers
Computer forensics has been an emerging research area for IT-related professionals, practitioners, and researchers since the turn of the century. As we continue the research on how to collect and analyze digital evidence in an existing software/hardware environment, we are also interested in and challenged by the question of the “built-in” issues in how to design and create software/hardware applications with forensic consciousness so that a more supportive environment for the purpose of computer/digital forensics is provided.
The theme of the workshop is to advance research on legal-activity-enforced cyber physical systems in an innovative way. We believe that to build forensics into software/hardware applications will help us more efficiently in collecting/identifying evidence of illegal and unethical activities, more effectively in preventing/detecting cyber attacks on critical infrastructures, and more confidently in preserving/promoting anonymity and privacy.
In addition to the study of “after the fact” issues on collection, examination, and analysis of digital evidence, it is critical to involve computer forensic readiness in the early stage of software/hardware application development, especially for a cyber-physical system with pervasive IoT devices. As the principles of software engineering suggest, the effort to build forensics “by design” will make the cyberspace more supportive and cost effective in a later forensic search and investigation.
Topics of interest include but are not limited to:
- Augmented and virtual reality forensics
- Big data forensics / big data analytics in digital forensics
- Business (workflow) process forensics
- Case studies in all digital forensics related areas
- Cloud forensics / fog forensics
- Code authorship analysis or code-theft detection
- Cyber physical systems (CPS) forensics
- Cyber security and forensics
- Curriculum development in digital forensics and security
- Electronic discovery and fraud detection/investigation
- Forensic readiness in software engineering / forensics by design
- Forensic testing / cyber crime simulation
- Forensics in embedded and real time systems
- game/virtual world forensics
- Image forensics / information hiding technology
- Internet of Things forensics and security
- Legal, ethical and privacy issues in computing
- Malware and intrusion detection and penetration testing
- Next generation and evolution of computer forensics
- SCADA / Critical infrastructures forensics
- Social networking forensics and security
- Software application forensics (medical, financial, governmental, etc.)
- Software forensics and profiling
- System software forensics and security
- Ubiquitous/Mobile/iPhone forensic computing and cyber security
- Visualization of computer/digital forensics
- Web services/SOA/XML forensics
- Workflow/business process forensics
CFSE Program Schedule
Monday July 23, 11:30 – 1:00pm
Session 1
Location: Meeting 102
Session Chair: Tetsutaroh Uehara, Ritsumeikan University, Japan
Video Forensics for Detecting Shot Manipulation Using the Information of Deblocking Filter
Chen-Kuang Hsieh, Ching-Chun Chiu, Po-Chyi Su
Design Scheme of Copyright Management System Based on Digital Watermarking and Blockchain
Zhaoxiong Meng, Tetsuya Morizumi, Sumiko Miyata, Hirotsugu Kinshita
Copy-move Forgery Detection using GLCM-based Rotation-invariant Feature: A Preliminary Research
Songpon Teerakanok, Tetsutaro Uehara
Monday July 23, 2:00 – 3:30pm
Session 2
Location: Meeting 102
Session Chair: Tetsutaroh Uehara, Ritsumeikan University, Japan
The Expansion of Source Code Abbreviations Using a Language Model
Abdulrahman Alatawi, Weifeng Xu, Jie Yan
Modeling and Verifying OpenFlow Scheduled Bundle Mechanism using CSP
Huiwen Wang, Huibaiao Zhu, Lili Xiao, Wanling Xie, Gang Lu
Monday July 23, 4:00 – 5:30pm
Session 3
Location: Meeting 102
Session Chair: Tetsutaroh Uehara, Ritsumeikan University, Japan
A High-capacity Watermarking Algorithm Using Two Bins Histogram Modification
Zhen Yue, Zichen Li, Peifei Song, Shumei Zhang, Yixian Yang
TRAC: A Therapeutic Regimen-oriented Access Control Model in Healthcare
Hongcan Gao, Yanfeng Wu, Sihan Xu, Xiaolei Hou, Chenkai Guo, Jing Xu
Enhancing Inter-Node Process Migration for Load Balancing on Linux-based NUMA Multicore Systems
Mei-Ling Chiang, Shu-Wei Tu, Wei-Lun Su, Chen-Wei Lin
CFSE Workshop Organizers
Ryoichi Sasaki, Tokyo Denki University, Japan
Tetsutaro Uehara, Ritsumeikan University, Japan
Jigang Liu, Metropolitan State University, USA
For questions about CFSE, please contact Jigang Liu at jigang.liu@metrostate.edu
CFSE Program Committee
Yuki Ashino, NEC, Japan
Vinod Bhattathiripad, G J Software Forensics, India
Rong Chen, Dalian Maritime University, China
Fred Cohen, California Sciences Institute, USA
Ryan Hankins, Dell Inc. USA
Shuhui Hou, University of Sci. and Tech., Beijing, China
Satoshi Kai, Hitachi Ltd., Japan
Rethabile Khutlang, CSIR, South Africa
Chu-Hsing Lin, Tunghai University, Taiwan
Anyi Liu, Oakland University, USA
Masakatsu Nishigaki, Shizuoka University, Japan
Wei Ren, China University of Geosciences, China
Sean Thorpe, University of Technology, Jamaica
Michael Tu, Purdue University Calumet, USA
Ben Turnbull, Defense Science and Technology, Australia
Shiuh-Jeng Wang, Central Police University, Taiwan
Rongsheng Xu, Chinese Academy of Science, China
Chung-Huang Yang, Kaohsiung Normal University, Taiwan
S. M. Yiu, the University of Hong Kong, China
Hiroshi Yoshiura, The University of Electro-Comm., Japan
Yanjun Zuo, University of North Dakota, USA