March 12th - 14th, 2013
Nuremberg (Nürnberg), Germany
http://www.imf-conference.org/
mailto:2013@imf-conference.org
Conference of SIG SIDAR
of the German Informatics Society (GI).
| Time | Presentation / Description | Speaker |
|---|---|---|
| 10:00 | Registration and Welcome Coffee | |
| 11:00 | Welcome (Room Conference Center 1) | Felix Freiling (Conference Chair) Friedrich-Alexander-Universitaet Erlangen-Nuernberg, Germany |
| 11:15 |
Key Note: Measuring the Cost of Cybercrime |
Rainer Boehme University of Muenster, Germany |
| 12:15 | Lunch | |
| 13:15 | Forewarned is Forearmed: Indicators for Evaluating Information Security
Incident Management
| Karin Bernsmed and Inger Anne Tondel SINTEF ICT |
| 14:00 |
Identifying a Shared Mental Model Among Incident Responders
| Robert Floodeen, John Haller and Brett Tjaden CMU, CMU, JMU |
| 14:45 |
Preparing for the Smart Grids - Current Practice for Information
Security Incident Management in the Power Industry
| Maria B. Line Norwegian University of Science and Technology |
| 15:30 | Coffee Break | |
| 16:00 |
mvHash-B - a new approach for similarity preserving hash function
| Frank Breitinger, Knut Petter Astebol, Harald Baier and Christoph Busch CASED / Hochschule Darmstadt, Gjovik University College, CASED / Hochschule Darmstadt, CASED / Hochschule Darmstadt |
| 16:45 | Selective Imaging Revisited |
Johannes Stuettgen, Andreas Dewald and Felix Freiling
Friedrich-Alexander-Universitaet Erlangen-Nuernberg |
| 17:30 | Wrap-Up | Moderated by Holger Morgenstern (Program Chair)
gutachten.info, Germany |
| 18:30 | Bus leaves 18:30 for Social Event (19:00): Dinner at Alte Kuech'n/Im Keller (Albrecht Duerer Street 3, 90403 Nuremberg, Germany, http://www.alte-kuechn.de/eng/knights_banquet/). Bus transfer from (18:30) / to (23:30) Hilton is organized. | |
| Time | Presentation / Description | Speaker | |
|---|---|---|---|
| 09:00 | Registration and Welcome Coffee | ||
| 09:25 | Greetings (Room Conference Center 1) | ||
| 09:30 |
Sponsor talk by Datev DATEV Company Presentation | Stefan Scheller DATEV |
|
| 10:00 |
Sponsor talk by Datev DATEV NET - internet made secure | Jörg Spilker DATEV |
|
| 10:30 | Coffee Break | ||
| 11:00 |
Developing a Cloud Computing Based Approach for Forensic Analysis using OCR (short paper)
| Matthias Trojahn, Lei Pan and Fabian Schmidt Volkswagen AG, Deakin University, ISC Gebhardt |
|
| 11:30 |
On Bayesian Trust and Risk Forecasting for Compound Systems (short paper)
| Stefan Rass and Sebastian Kurowski Alpen-Adria Universitaet Klagenfurt, Institute of Applied Informatics, System Security Group, Klagenfurt; Information Management, Fraunhofer IAO |
|
| 12:00 | Lunch | ||
| 13:00 |
Key Note: Recent Cyber Attacks: Inherent Risks, Countermeasures, Perspectives |
Klaus Brunnstein University of Hamburg |
|
| 14:00 |
Digital Forensic Tool Testing meets Anti-Forensics
| Martin Wundram, Felix Freiling and Christian Moch TronicGuard GmbH, Friedrich-Alexander-Universitaet Erlangen-Nuernberg |
|
| 14:45 |
Forensic Application-Fingerprinting based on Filesystem Metadata
| Sven Kaelber, Andreas Dewald and Felix C. Freiling Friedrich-Alexander-Universitaet Erlangen-Nuernberg |
|
| 15:30 | Coffee Break | ||
| 16:00 |
Statistical Pattern Recognition Based Content Analysis on encrypted
network traffics
(Veröffentlichung nicht freigegeben) | Robert Altschaffel, Robert Clausing, Stefan Kiltz, Christian Kraetzer,
Tobias Hoppe and Jana Dittmann OVGU Magdeburg |
|
| 16:45 |
Visualizing Indicators of Rootkit Infections in Memory Forensics
|
Stefan Voemel and Hermann Lenz Friedrich-Alexander-Universitaet Erlangen-Nuernberg,Thor GmbH |
|
| 17:30 | Wrap-Up | Moderated by Oliver Goebel
RUS-CERT, Universitaet Stuttgart, Germany |
|
| 17:45 | End of Day Two | ||
| Time | Presentation / Description | Organisation |
|---|---|---|
| 08:30 | Welcome Coffee | |
| 09:00-10:20 | Workshop (Room Salt Lake City):
Hands-on reverse engineering of complex modern malware by example of the Stuxnet code (Veröffentlichung nicht freigegeben) |
Heiko Patzlaff (Siemens CERT, Germany) |
| 10:20 | Coffee Break | |
| 10:40-12:00 | Workshop (Room Salt Lake City):
Hacking Embedded Crypto Implementations using Fault Injection |
Johannes Bauer (Robert Bosch GmbH, Germany) |
| 12:00 | Lunch | |
| 13:00-16:00 | Workshop (Room Salt Lake City):
Tools and Processes for Forensic Analyses of Smartphones and Mobile Applications
|
Michael Spreitzenbarth and Tilo Mueller Department of Computer Science Friedrich-Alexander-University Erlangen-Nuremberg |
| 14:30 | Coffee Break | |
| 14:45-16:00 | Continue Workshop | |
| 16:00-16:45 | Sponsor Presentation (Room Salt Lake City):
XRY Tool presentation:
|
Gerhard Gunst, Martin Westmann (Micro Systemation) |
| 16:45 | End of Workshop Day | |
The conference would qualify for CPE hours for ISACA
certifications (CISA, CISM, CRISC and CGEIT) and (ISC)² certification
CISSP. Participants can earn up to 18 CPE for continuing their
professional education.