Interested in joining our BS/MS programs in CS/Cybersecurity?
2019 Publications
-
Casey, P., Baggili, I., & Yarramreddy, A. (2019). Immersive Virtual Reality Attacks and the Human Joystick. IEEE Transactions on Dependable and Secure Computing.
-
Zhang, X., Grannis, J., Baggili, I., & Beebe, N. L. (2019). Frameup: An incriminatory attack on storj: A peer to peer blockchain enabled distributed storage system. Digital Investigation.
-
Ricci, J., Baggili, I., & Breitinger, F. (2019). Blockchain-Based Distributed Cloud Storage Digital Forensics: Where's the Beef?. IEEE Security & Privacy, 17(1), 34-42.
-
Liebler, L., Schmitt, P., Baier, H., & Breitinger, F. (2019). On efficiency of artifact lookup strategies in digital forensics. Digital Investigation, 28, S116-S125.
-
Debinski, M., Breitinger, F., & Mohan, P. (2019). Timeline2GUI: A Log2Timeline CSV parser and training scenarios. Digital Investigation, 28, 34-43.
2018 Publications
-
Breitinger, F., & Baggili, I. (Eds.). (2018). Digital Forensics and Cyber Crime: 10th International EAI Conference, ICDF2C 2018, New Orleans, LA, USA, September 10–12, 2018, Proceedings (Vol. 259). Springer.
-
Dorai, G., Houshmand, S., & Baggili, I. (2018, August). I Know What You Did Last Summer: Your Smart Home Internet of Things and Your iPhone Forensically Ratting You Out. In Proceedings of the 13th International Conference on Availability, Reliability and Security (p. 49). ACM.
-
Yarramreddy, A., Gromkowski, P., & Baggili, I. (2018, May). Forensic Analysis of Immersive Virtual Reality Social Applications: A Primary Account. In 2018 IEEE Security and Privacy Workshops (SPW) (pp. 186-196). IEEE.
-
Ricci, J., Breitinger, F., & Baggili, I. (2018). Survey results on adults and cybersecurity education. Education and Information Technologies, 1-19.
-
Luciano, L., Baggili, I., Topor, M., Casey, P., & Breitinger, F. (2018, August). Digital Forensics in the Next Five Years. In Proceedings of the 13th International Conference on Availability, Reliability and Security (p. 46). ACM.
-
Ricci, J., Baggili, I., & Breitinger, F. (2018). Watch What You Wear: Smartwatches and Sluggish Security. In Wearable Technologies: Concepts, Methodologies, Tools, and Applications (pp. 1458-1478). IGI Global.
-
Haigh, T., Breitinger, F., & Baggili, I. (2018, September). If I Had a Million Cryptos: Cryptowallet Application Analysis and a Trojan Proof-of-Concept. In International Conference on Digital Forensics and Cyber Crime (pp. 45-65). Springer, Cham. BEST PAPER AWARD.
-
Schmicker, R., Breitinger, F., & Baggili, I. (2018, September). AndroParse-An Android Feature Extraction Framework and Dataset. In International Conference on Digital Forensics and Cyber Crime (pp. 66-88). Springer, Cham.
-
Grajeda, C., Sanchez, L., Baggili, I., Clark, D., & Breitinger, F. (2018). Experience constructing the Artifact Genome Project (AGP): Managing the domain's knowledge one artifact at a time. Digital Investigation, 26, S47-S58.
-
Liebler, L. and Breitinger, F., mrsh-mem: Approximate Matching on Raw Memory Dumps. In Proceedings of 11th International Conference on IT Security Incident Management & IT Forensics (IMF’18), Hamburg (Germany), May 2018.
2017 Publications
-
Meffert, C., Clark, D., Baggili, I., & Breitinger, F. (2017, August). Forensic State Acquisition from Internet of Things (FSAIoT): A general framework and practical approach for IoT forensics through IoT device state acquisition. In Proceedings of the 12th International Conference on Availability, Reliability and Security (p. 56). ACM.
-
Zhang, X., Baggili, I., & Breitinger, F.. Breaking into the vault: privacy, security and forensic analysis of android vault applications. Computers & Security (2017), pp. –. issn: 0167-4048.
-
Clark, D., Meffert, C., Baggili, I., & Breitinger, F. DROP (DRone Open source Parser) your drone: Forensic analysis of the DJI Phantom III. Digital Investigation 22, Supplement (2017), S3 –S14. issn: 1742-2876.
-
Denton, G., Karpisek, F., Breitinger, F., & Baggili, I. Leveraging the SRTP protocol for over-the-network memory acquisition of a GE Fanuc Series 90-30. Digital Investigation 22, Supplement (2017), S26 –S38. issn: 1742-2876.
-
Grajeda, C., Breitinger, F., & Baggili, I. Availability of datasets for digital forensics – And what is missing. Digital Investigation 22, Supplement (2017), S94 –S105. issn: 1742- 2876.
-
Moore, J., Baggili, I., & Breitinger, F. (2017). Find Me If You Can: Mobile GPS Mapping Applications Forensic Analysis & SNAVP the Open Source, Modular, Extensible Parser. Journal of Digital Forensics, Security and Law, 12(1), 7.
2016 Publications
-
Jeong, D., Breitinger, F., Kang, H., & Lee, S. (2016). Towards Syntactic Approximate Matching-A Pre-Processing Experiment. Journal of Digital Forensics, Security and Law, 11(2), pp.97-110.
-
Harichandran, V. S., Breitinger, F., & Baggili, I. (2016). Bytewise Approximate Matching: The Good, The Bad, and The Unknown. Journal of Digital Forensics, Security and Law, 11(2), 59-78.
-
Al-khateeb, S., Conlan, K. J., Agarwal, N., Baggili, I., & Breitinger, F. (2016). Exploring Deviant Hacker Networks (DHN) On Social Media Platforms. Journal of Digital Forensics, Security and Law, 11(2), 7-20.
-
Ricci, J., Baggili, I., & Breitinger, F. (2017). Watch What You Wear: Smartwatches and Sluggish Security. In A. Marrington, D. Kerr, & J. Gammack (Eds.) Managing Security Issues and the Hidden Dangers of Wearable Technologies (pp. 47-73). Hershey, PA: Information Science Reference. doi:10.4018/978-1-5225-1016-1.ch003
-
Harichandran, V. S., Walnycky, D., Baggili, I., & Breitinger, F. (2016). CuFA: A more formal definition for digital forensic artifacts. Digital Investigation, 18, S125-S137.
-
Meffert, C. S., Baggili, I., & Breitinger, F. (2016). Deleting collected digital evidence by exploiting a widely adopted hardware write blocker. Digital Investigation, 18, S87-S96.
-
Conlan, K., Baggili, I., & Breitinger, F. (2016). Anti-forensics: Furthering digital forensic science through a new extended, granular taxonomy. Digital Investigation, 18, S66-S75.
-
Shahzad Saleem, Oliver Popov, Ibrahim Baggili, A method and a case study for the selection of the best available tool for mobile device forensics using decision analysis, Digital Investigation, Volume 16, Supplement, 29 March 2016, Pages S55-S64, ISSN 1742-2876, http://dx.doi.org/10.1016/j.diin.2016.01.008.
-
Xiaolu Zhang, Frank Breitinger, and Ibrahim Baggili. “Rapid Android Parser for Investigating DEX files (RAPID)”. In: Digital Investigation 17 (2016), pp. 28 –39. issn: 1742-2876.
-
Vikram S Harichandran, Breitinger, F., Baggili, I., & Marrington, A. (2016). A cyber forensics needs analysis survey: Revisiting the domain's needs a decade later. Computers & Security, 57, 1-13.
2015 Publications
-
Baggili, I., Oduro, J., Anthony, K., Breitinger, F., & McGee, G. (2015, August). Watch What You Wear: Preliminary Forensic Analysis of Smart Watches. In Availability, Reliability and Security (ARES), 2015 10th International Conference on (pp. 303-311). IEEE.
-
James, J. I., & Breitinger, F. (Eds.). (2015). Digital Forensics and Cyber Crime: 7th International Conference, ICDF2C 2015, Seoul, South Korea, October 6-8, 2015. Revised Selected Papers (Vol. 157). Springer.
-
F. Karpisek, I. Baggili, F. Breitinger, WhatsApp network forensics: Decrypting and understanding the WhatsApp call signaling messages, Digital Investigation, Available online 10 October 2015, ISSN 1742-2876, http://dx.doi.org/10.1016/j.diin.2015.09.002.
-
Walnycky, D., Baggili, I., Marrington, A., Moore, J., & Breitinger, F. (2015). Network and device forensic analysis of Android social-messaging applications. Digital Investigation, 14, S77-S84.
-
Gupta, V., & Breitinger, F. (2015). How Cuckoo Filter Can Improve Existing Approximate Matching Techniques. In Digital Forensics and Cyber Crime (pp. 39-52). Springer International Publishing. BEST PAPER AWARD.
-
Rathgeb, C., Breitinger, F., Baier, H., Busch, C. (2015). Towards Bloom Filter-based Indexing of Iris Biometric Data. Biometrics (ICB), 2015 International Conference on, 2015, (To Appear). BEST POSTER AWARD. http://icb2015.org/awards.
-
Gurjar, S., Baggili, I., Breitinger, F., & Fischer, A. (2015, May). An Empirical Comparison of Widely Adopted Hash Functions in Digital Forensics: Does the Programming Language and Operating System Make a Difference?. In Proceedings of the Conference on Digital Forensics, Security and Law (pp. 57-68).
-
Baggili, I., & Breitinger, F. (2015, December). Data Sources for Advancing Cyber Forensics: What the Social World Has to Offer. In 2015 AAAI Spring Symposium Series, Stanford, USA.
-
Gladyshev, P., Marrington, A., & Baggili, I. (Eds.). (2015). Digital Forensics and Cyber Crime: Fifth International Conference, ICDF2C 2013, Moscow, Russia, September 26-27, 2013, Revised Selected Papers (Vol. 132). Springer.
2014 Publications
-
Breitinger, F., Guttman, B., McCarrin, M., & Roussev, V. (2014). Approximate matching: definition and terminology. NIST Publication.
-
Breitinger, F., & Baggili, I. (2014). File Detection On Network Traffic Using Approximate Matching. Journal of Digital Forensics, Security and Law, 9(2), 23-36. BEST PAPER AWARD.
-
Moore, J., Baggili, I., Marrington, A., & Rodrigues, A. (2014). Preliminary forensic analysis of the Xbox One. Digital Investigation, 11, S57-S65.
-
Iqbal, A., Marrington, A., and Ibrahim Baggili. Amazon Kindle Fire HD Forensics. To appear In Digital Forensics and Cyber Crime. Springer Berlin Heidelberg, 2014
-
Marrington, A., Farkhund, I., Baggili, I., Computer Profiling for Preliminary Forensic Examination To appear In Digital Forensics and Cyber Crime. Springer Berlin Heidelberg, 2014
-
Baggili, I., Al Awawdeh, S., & Moore, J. (2014, May). LiFE (LOGICAL iOS FORENSICS EXAMINER): AN OPEN SOURCE iOS BACKUP FORENSICS EXAMINATION TOOL. In Proceedings of the Conference on Digital Forensics, Security and Law (pp. 41-52).
-
Baggili, I., Marrington, A., & Jafar, Y. (2014). Performance of a Logical, Five-Phase, Multithreaded, Bootable Triage Tool. In Advances in Digital Forensics X (pp. 279-295). Springer Berlin Heidelberg.
-
Saleem, S., Baggili, I., & Popov, O. (2014). Quantifying relevance of mobile digital evidence as they relate to case types: A survey and a guide for best practices. Journal of Digital Forensics, Security and Law, 9(3), 19-50.
-
Saleem, S., Popov, O., & Bagilli, I. (2014). Extended abstract digital forensics model with preservation and protection as umbrella principles. Procedia Computer Science, 35, 812-821.
-
Mohamed, A. F. A. L., Marrington, A., Iqbal, F., & Baggili, I. (2014). Testing the forensic soundness of forensic examination environments on bootable media. Digital Investigation, 11, S22-S29.
-
Ferris, B., Stahle, J., & Baggili, I. (2014, June). Quantifying the Danger of Mobile Banking Applications on the Android Platform. In 9th Annual Symposium on Information Assurance (ASIA’14) (p. 65).
2013 Publications
-
Al Awawdeh, S., Baggili, I., Marrington, A., & Iqbal, F. (2013, November). CAT Record (computer activity timeline record): A unified agent based approach for real time computer forensic evidence collection. In Systematic Approaches to Digital Forensic Engineering (SADFE), 2013 Eighth International Workshop on (pp. 1-8). IEEE.
-
Iqbal, A., Marrington, A., and Ibrahim Baggili. Forensic artifacts of the ChatON Instant Messaging application, 2013. SADFE 2013. To appear in the Eighth International Workshop on Systematic Approaches to Digital Forensic Engineering. IEEE.
-
Awawdeh, S. A., Baggili, I., Marrington, A., & Iqbal, F. (2013). Towards a unified agent-based approach for real time computer forensic evidence collection. In Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (pp. 1492-1493). ACM.
-
Barghouthy, N. A., Marrington, A., & Baggili, I. (2013, March). The forensic investigation of android private browsing sessions using orweb. In Computer Science and Information Technology (CSIT), 2013 5th International Conference on (pp. 33-37). IEEE.
-
Baggili, I., Al Shamlan, M., Al Jabri, B., & Al Zaabi, A. (2013). Cybercrime, Censorship, Perception and Bypassing Controls: An Exploratory Study. In Digital Forensics and Cyber Crime (pp. 91-108). Springer Berlin Heidelberg.
-
Al Marzougy, M., Baggili, I., & Marrington, A. (2013). BlackBerry PlayBook Backup Forensic Analysis. In Digital Forensics and Cyber Crime (pp. 239-252). Springer Berlin Heidelberg.
-
Baggili, I., BaAbdallah, A., Al-Safi, D., & Marrington, A. (2013). Research Trends in Digital Forensic Science: An Empirical Analysis of Published Research. In Digital Forensics and Cyber Crime (pp. 144-157). Springer Berlin Heidelberg.
-
Ruan, K., Carthy, J., & Baggili, I. (2013). Cloud forensics definitions and critical criteria for cloud forensic capability: An overview of survey results. Digital Investigation.
-
Barghouthy, N. A., Marrington, A., & Baggili, I. (2013, March). The forensic investigation of android private browsing sessions using orweb. In Computer Science and Information Technology (CSIT), 2013 5th International Conference on (pp. 33-37). IEEE.