CFSE: The 10th IEEE International Workshop on Computer Forensics in Software Engineering

Call for Papers
Computer forensics has been an emerging research area for IT-related professionals, practitioners, and researchers since the turn of the century. As we continue the research on how to collect and analyze digital evidence in an existing software/hardware environment, we are also interested in and challenged by the question of the “built-in” issues in how to design and create software/hardware applications with forensic consciousness so that a more supportive environment for the purpose of computer/digital forensics is provided.

The theme of the workshop is to advance research on legal-activity-enforced cyber physical systems in an innovative way. We believe that to build forensics into software/hardware applications will help us more efficiently in collecting/identifying evidence of illegal and unethical activities, more effectively in preventing/detecting cyber attacks on critical infrastructures, and more confidently in preserving/promoting anonymity and privacy.

In addition to the study of “after the fact” issues on collection, examination, and analysis of digital evidence, it is critical to involve computer forensic readiness in the early stage of software/hardware application development, especially for a cyber-physical system with pervasive IoT devices. As the principles of software engineering suggest, the effort to build forensics “by design” will make the cyberspace more supportive and cost effective in a later forensic search and investigation.

Topics of interest include but are not limited to:

  • Augmented and virtual reality forensics
  • Big data forensics / big data analytics in digital forensics
  • Business (workflow) process forensics
  • Case studies in all digital forensics related areas
  • Cloud forensics / fog forensics
  • Code authorship analysis or code-theft detection
  • Cyber physical systems (CPS) forensics
  • Cyber security and forensics
  • Curriculum development in digital forensics and security
  • Electronic discovery and fraud detection/investigation
  • Forensic readiness in software engineering / forensics by design
  • Forensic testing / cyber crime simulation
  • Forensics in embedded and real time systems
  • game/virtual world forensics
  • Image forensics / information hiding technology
  • Internet of Things forensics and security
  • Legal, ethical and privacy issues in computing
  • Malware and intrusion detection and penetration testing
  • Next generation and evolution of computer forensics
  • SCADA / Critical infrastructures forensics
  • Social networking forensics and security
  • Software application forensics (medical, financial, governmental, etc.)
  • Software forensics and profiling
  • System software forensics and security
  • Ubiquitous/Mobile/iPhone forensic computing and cyber security
  • Visualization of computer/digital forensics
  • Web services/SOA/XML forensics
  • Workflow/business process forensics

CFSE Program Schedule

Monday July 23, 11:30 – 1:00pm
Session 1
Location: Meeting 102
Session Chair: Tetsutaroh Uehara, Ritsumeikan University, Japan

Video Forensics for Detecting Shot Manipulation Using the Information of Deblocking Filter
Chen-Kuang Hsieh, Ching-Chun Chiu, Po-Chyi Su

Design Scheme of Copyright Management System Based on Digital Watermarking and Blockchain
Zhaoxiong Meng, Tetsuya Morizumi, Sumiko Miyata, Hirotsugu Kinshita

Copy-move Forgery Detection using GLCM-based Rotation-invariant Feature: A Preliminary Research
Songpon Teerakanok, Tetsutaro Uehara

Monday July 23, 2:00 – 3:30pm
Session 2
Location: Meeting 102
Session Chair: Tetsutaroh Uehara, Ritsumeikan University, Japan

The Expansion of Source Code Abbreviations Using a Language Model
Abdulrahman Alatawi, Weifeng Xu, Jie Yan

Modeling and Verifying OpenFlow Scheduled Bundle Mechanism using CSP
Huiwen Wang, Huibaiao Zhu, Lili Xiao, Wanling Xie, Gang Lu

Monday July 23, 4:00 – 5:30pm
Session 3
Location: Meeting 102
Session Chair: Tetsutaroh Uehara, Ritsumeikan University, Japan

A High-capacity Watermarking Algorithm Using Two Bins Histogram Modification
Zhen Yue, Zichen Li, Peifei Song, Shumei Zhang, Yixian Yang

TRAC: A Therapeutic Regimen-oriented Access Control Model in Healthcare
Hongcan Gao, Yanfeng Wu, Sihan Xu, Xiaolei Hou, Chenkai Guo, Jing Xu

Enhancing Inter-Node Process Migration for Load Balancing on Linux-based NUMA Multicore Systems
Mei-Ling Chiang, Shu-Wei Tu, Wei-Lun Su, Chen-Wei Lin

CFSE Workshop Organizers

Ryoichi Sasaki, Tokyo Denki University, Japan
Tetsutaro Uehara, Ritsumeikan University, Japan
Jigang Liu, Metropolitan State University, USA

For questions about CFSE, please contact Jigang Liu at

CFSE Program Committee

Yuki Ashino, NEC, Japan
Vinod Bhattathiripad, G J Software Forensics, India
Rong Chen, Dalian Maritime University, China
Fred Cohen, California Sciences Institute, USA
Ryan Hankins, Dell Inc. USA
Shuhui Hou, University of Sci. and Tech., Beijing, China
Satoshi Kai, Hitachi Ltd., Japan
Rethabile Khutlang, CSIR, South Africa
Chu-Hsing Lin, Tunghai University, Taiwan
Anyi Liu, Oakland University, USA
Masakatsu Nishigaki, Shizuoka University, Japan
Wei Ren, China University of Geosciences, China
Sean Thorpe, University of Technology, Jamaica
Michael Tu, Purdue University Calumet, USA
Ben Turnbull, Defense Science and Technology, Australia
Shiuh-Jeng Wang, Central Police University, Taiwan
Rongsheng Xu, Chinese Academy of Science, China
Chung-Huang Yang, Kaohsiung Normal University, Taiwan
S. M. Yiu, the University of Hong Kong, China
Hiroshi Yoshiura, The University of Electro-Comm., Japan
Yanjun Zuo, University of North Dakota, USA