IMF 2009

5th International Conference on
IT Security Incident Management & IT Forensics

September 15th to 17th, 2009
Stuttgart, Germany

http://www.imf-conference.org/
mailto:2009@imf-conference.org

Conference of SIG SIDAR
of the German Informatics Society (GI).

Call for Papers

Conference Programme

Tuesday, September 15th, 2009

Time Presentation / Description Speaker
10:00 Registration/Coffee
11:00 Greeting and Introduction
11:15 Keynote:
Overcast: Forensic Discovery in Cloud Environments (PDF)
Stephen Wolthusen
Royal Holloway, University of London, UK
12:10 Botnet Statistical Analysis Tool for Limited Resource Computer Emergency Response Team (PDF) Nuttapong Sanglerdsinlapachai
NECTEC, Thailand
13:00 Lunch
14:00 Semi-Autonomous Link Layer Vulnerability Discovery and Mitigation Dissemination (PDF) Ziyad Al-Salloum and Stephen Wolthusen
Royal Holloway, University of London, UK
14:50 From the Incident Taxonomy to a Forensic Examination Taxonomy (PDF) Stefan Kiltz
Otto-von-Guericke-University Magdeburg, Germany
15:40 Break
16:15 Fast user classifying to establish forensic analysis priorities (PDF) Alessandro Lentini
University of Rome Tor Vergata, Italy
16:45 SIG SIDAR meeting (PDF) Michael Meier
17:30 End of Day One
19:00 Social Event

Wednesday, September 16th, 2009

Time Presentation / Description Speaker
09:00 Registration/Coffee
09:25 Greeting and Introduction
09:30 Safe-keeping Digital Evidence with Secure Logging Protocols: State of the Art and Challenges (PDF) Rafael Accorsi
University of Freiburg, Germany
10:20 Rump Session III (PDF 1) (PDF 2) Cooperative Reseach: "Development of Analytical and Forensic Tools"
11:10 Break
11:40 Experiences with an Advanced Honetnet Testbed to Detect new Internet Worms (PDF) Jan Kohlrausch
DFN-CERT, Germany
12:30 Rump Session I (PDF) DUPE - The Depository of Universal Plagiarism Examples
13:00 Lunch
14:00 The Forensic Image Generator Generator (PDF) Felix Freiling and Christian Moch
University of Mannheim, Germany
14:50 Rump Session II (PDF) Curriculum "Digital Forensics" at the Technical University of Albstadt-Siegmaringen
15:15 KeyNote Oliver Göbel, RUS-CERT, University of Stuttgart
16:00 End of Day Two

Thursday, September 17th, 2009 - Workshop Day

Time Presentation / Description Speaker
08:00 Registration/Coffee
08:45 Greeting and Introduction
09:00 Getting the full picture in mobile forensic investigation
a practical workshop on physical extraction of data from mobile phones (PDF)
Martin Westman
Micro Systemation, Sweden
10:30 Break
11:00 A forensic process model and its practical application during the investigation of an exemplary selected incident Stefan Kiltz
Otto-von-Guericke-University Magdeburg, Germany
  IT-Forensics at Fraunhofer SIT(PDF) York Yannikos
Frauhofer SIT, Darmstadt, Germany
13:00 Lunch
14:00 Digital Discovery with Bootable CDs (PDF 1) (PDF 2) Ralf Moll, Federal Police Baden-Wuerttemberg, Germany
Michael Prokop, grml Solutions, Austria
Holger Morgenstern, gutachten.info, Germany
16:45 End of Day Three



The conference would qualify for CPE hours for ISACA certifications (CISA, CISM and CGEIT) and (ISC)² certification CISSP. Participants can earn up to 18 CPE for continuing their professional education.