Follow Us
  • YouTube Social  Icon
  • Twitter Classic
  • Google Classic
  • Facebook Classic

© 2019

2019 Publications

  1. Casey, P., Baggili, I., & Yarramreddy, A. (2019). Immersive Virtual Reality Attacks and the Human Joystick. IEEE Transactions on Dependable and Secure Computing.

  2. Zhang, X., Grannis, J., Baggili, I., & Beebe, N. L. (2019). Frameup: An incriminatory attack on storj: A peer to peer blockchain enabled distributed storage system. Digital Investigation.

  3. Ricci, J., Baggili, I., & Breitinger, F. (2019). Blockchain-Based Distributed Cloud Storage Digital Forensics: Where's the Beef?. IEEE Security & Privacy, 17(1), 34-42.

  4. Liebler, L., Schmitt, P., Baier, H., & Breitinger, F. (2019). On efficiency of artifact lookup strategies in digital forensics. Digital Investigation, 28, S116-S125.

  5. Debinski, M., Breitinger, F., & Mohan, P. (2019). Timeline2GUI: A Log2Timeline CSV parser and training scenarios. Digital Investigation, 28, 34-43.

 

2018 Publications

  1. Breitinger, F., & Baggili, I. (Eds.). (2018). Digital Forensics and Cyber Crime: 10th International EAI Conference, ICDF2C 2018, New Orleans, LA, USA, September 10–12, 2018, Proceedings (Vol. 259). Springer.

  2. Dorai, G., Houshmand, S., & Baggili, I. (2018, August). I Know What You Did Last Summer: Your Smart Home Internet of Things and Your iPhone Forensically Ratting You Out. In Proceedings of the 13th International Conference on Availability, Reliability and Security (p. 49). ACM.

  3. Yarramreddy, A., Gromkowski, P., & Baggili, I. (2018, May). Forensic Analysis of Immersive Virtual Reality Social Applications: A Primary Account. In 2018 IEEE Security and Privacy Workshops (SPW) (pp. 186-196). IEEE.

  4. Ricci, J., Breitinger, F., & Baggili, I. (2018). Survey results on adults and cybersecurity education. Education and Information Technologies, 1-19.

  5. Luciano, L., Baggili, I., Topor, M., Casey, P., & Breitinger, F. (2018, August). Digital Forensics in the Next Five Years. In Proceedings of the 13th International Conference on Availability, Reliability and Security (p. 46). ACM.

  6. Ricci, J., Baggili, I., & Breitinger, F. (2018). Watch What You Wear: Smartwatches and Sluggish Security. In Wearable Technologies: Concepts, Methodologies, Tools, and Applications (pp. 1458-1478). IGI Global.

  7. Haigh, T., Breitinger, F., & Baggili, I. (2018, September). If I Had a Million Cryptos: Cryptowallet Application Analysis and a Trojan Proof-of-Concept. In International Conference on Digital Forensics and Cyber Crime (pp. 45-65). Springer, Cham. BEST PAPER AWARD

  8. Schmicker, R., Breitinger, F., & Baggili, I. (2018, September). AndroParse-An Android Feature Extraction Framework and Dataset. In International Conference on Digital Forensics and Cyber Crime (pp. 66-88). Springer, Cham.

  9. Grajeda, C., Sanchez, L., Baggili, I., Clark, D., & Breitinger, F. (2018). Experience constructing the Artifact Genome Project (AGP): Managing the domain's knowledge one artifact at a time. Digital Investigation, 26, S47-S58.

  10. Liebler, L. and Breitinger, F., mrsh-mem: Approximate Matching on Raw Memory Dumps. In Proceedings of 11th International Conference on IT Security Incident Management & IT Forensics (IMF’18), Hamburg (Germany), May 2018.

2017 Publications

  1. Meffert, C., Clark, D., Baggili, I., & Breitinger, F. (2017, August). Forensic State Acquisition from Internet of Things (FSAIoT): A general framework and practical approach for IoT forensics through IoT device state acquisition. In Proceedings of the 12th International Conference on Availability, Reliability and Security (p. 56). ACM.

  2. Zhang, X., Baggili, I., & Breitinger, F.. Breaking into the vault: privacy, security and forensic analysis of android vault applications. Computers & Security (2017), pp. –. issn: 0167-4048.

  3. Clark, D., Meffert, C., Baggili, I., & Breitinger, F. DROP (DRone Open source Parser) your drone: Forensic analysis of the DJI Phantom III. Digital Investigation 22, Supplement (2017), S3 –S14. issn: 1742-2876.

  4. Denton, G., Karpisek, F., Breitinger, F., & Baggili, I. Leveraging the SRTP protocol for over-the-network memory acquisition of a GE Fanuc Series 90-30. Digital Investigation 22, Supplement (2017), S26 –S38. issn: 1742-2876.

  5. Grajeda, C., Breitinger, F., & Baggili, I. Availability of datasets for digital forensics – And what is missing. Digital Investigation 22, Supplement (2017), S94 –S105. issn: 1742- 2876.

  6. Moore, J., Baggili, I., & Breitinger, F. (2017). Find Me If You Can: Mobile GPS Mapping Applications Forensic Analysis & SNAVP the Open Source, Modular, Extensible Parser. Journal of Digital Forensics, Security and Law, 12(1), 7.

2016 Publications 

  1. Jeong, D., Breitinger, F., Kang, H., & Lee, S. (2016). Towards Syntactic Approximate Matching-A Pre-Processing Experiment. Journal of Digital Forensics, Security and Law, 11(2), pp.97-110.

  2. Harichandran, V. S., Breitinger, F., & Baggili, I. (2016). Bytewise Approximate Matching: The Good, The Bad, and The Unknown. Journal of Digital Forensics, Security and Law, 11(2), 59-78.

  3. Al-khateeb, S., Conlan, K. J., Agarwal, N., Baggili, I., & Breitinger, F. (2016). Exploring Deviant Hacker Networks (DHN) On Social Media Platforms. Journal of Digital Forensics, Security and Law, 11(2), 7-20.

  4. Ricci, J., Baggili, I., & Breitinger, F. (2017). Watch What You Wear: Smartwatches and Sluggish Security. In A. Marrington, D. Kerr, & J. Gammack (Eds.) Managing Security Issues and the Hidden Dangers of Wearable Technologies (pp. 47-73). Hershey, PA: Information Science Reference. doi:10.4018/978-1-5225-1016-1.ch003

  5. Harichandran, V. S., Walnycky, D., Baggili, I., & Breitinger, F. (2016). CuFA: A more formal definition for digital forensic artifacts. Digital Investigation, 18, S125-S137.

  6. Meffert, C. S., Baggili, I., & Breitinger, F. (2016). Deleting collected digital evidence by exploiting a widely adopted hardware write blocker. Digital Investigation, 18, S87-S96.

  7. Conlan, K., Baggili, I., & Breitinger, F. (2016). Anti-forensics: Furthering digital forensic science through a new extended, granular taxonomy. Digital Investigation, 18, S66-S75.

  8. Shahzad Saleem, Oliver Popov, Ibrahim Baggili, A method and a case study for the selection of the best available tool for mobile device forensics using decision analysis, Digital Investigation, Volume 16, Supplement, 29 March 2016, Pages S55-S64, ISSN 1742-2876, http://dx.doi.org/10.1016/j.diin.2016.01.008.

  9. Xiaolu Zhang, Frank Breitinger, and Ibrahim Baggili. “Rapid Android Parser for Investigating DEX files (RAPID)”. In: Digital Investigation 17 (2016), pp. 28 –39. issn: 1742-2876.

  10. Vikram S Harichandran, Breitinger, F., Baggili, I., & Marrington, A. (2016). A cyber forensics needs analysis survey: Revisiting the domain's needs a decade later. Computers & Security, 57, 1-13.

 

2015 Publications 

  1. Baggili, I., Oduro, J., Anthony, K., Breitinger, F., & McGee, G. (2015, August). Watch What You Wear: Preliminary Forensic Analysis of Smart Watches. In Availability, Reliability and Security (ARES), 2015 10th International Conference on (pp. 303-311). IEEE.

  2. James, J. I., & Breitinger, F. (Eds.). (2015). Digital Forensics and Cyber Crime: 7th International Conference, ICDF2C 2015, Seoul, South Korea, October 6-8, 2015. Revised Selected Papers (Vol. 157). Springer.

  3. F. Karpisek, I. Baggili, F. Breitinger, WhatsApp network forensics: Decrypting and understanding the WhatsApp call signaling messages, Digital Investigation, Available online 10 October 2015, ISSN 1742-2876, http://dx.doi.org/10.1016/j.diin.2015.09.002.

  4. Walnycky, D., Baggili, I., Marrington, A., Moore, J., & Breitinger, F. (2015). Network and device forensic analysis of Android social-messaging applications. Digital Investigation, 14, S77-S84.

  5. Gupta, V., & Breitinger, F. (2015). How Cuckoo Filter Can Improve Existing Approximate Matching Techniques. In Digital Forensics and Cyber Crime (pp. 39-52). Springer International Publishing. BEST PAPER AWARD.

  6. Rathgeb, C., Breitinger, F., Baier, H., Busch, C. (2015). Towards Bloom Filter-based Indexing of Iris Biometric Data. Biometrics (ICB), 2015 International Conference on, 2015, (To Appear). BEST POSTER AWARD. http://icb2015.org/awards.

  7. Gurjar, S., Baggili, I., Breitinger, F., & Fischer, A. (2015, May). An Empirical Comparison of Widely Adopted Hash Functions in Digital Forensics: Does the Programming Language and Operating System Make a Difference?. In Proceedings of the Conference on Digital Forensics, Security and Law (pp. 57-68).

  8. Baggili, I., & Breitinger, F. (2015, December). Data Sources for Advancing Cyber Forensics: What the Social World Has to Offer. In 2015 AAAI Spring Symposium Series, Stanford, USA. 

  9. Gladyshev, P., Marrington, A., & Baggili, I. (Eds.). (2015). Digital Forensics and Cyber Crime: Fifth International Conference, ICDF2C 2013, Moscow, Russia, September 26-27, 2013, Revised Selected Papers (Vol. 132). Springer.

 

2014 Publications

  1. Breitinger, F., Guttman, B., McCarrin, M., & Roussev, V. (2014). Approximate matching: definition and terminology. NIST Publication.

  2. Breitinger, F., & Baggili, I. (2014). File Detection On Network Traffic Using Approximate Matching. Journal of Digital Forensics, Security and Law, 9(2), 23-36. BEST PAPER AWARD.

  3. Moore, J., Baggili, I., Marrington, A., & Rodrigues, A. (2014). Preliminary forensic analysis of the Xbox One. Digital Investigation, 11, S57-S65.

  4. Iqbal, A., Marrington, A., and Ibrahim Baggili. Amazon Kindle Fire HD Forensics. To appear In Digital Forensics and Cyber Crime. Springer Berlin Heidelberg, 2014

  5. Marrington, A., Farkhund, I., Baggili, I., Computer Profiling for Preliminary Forensic Examination To appear In Digital Forensics and Cyber Crime. Springer Berlin Heidelberg, 2014

  6. Baggili, I., Al Awawdeh, S., & Moore, J. (2014, May). LiFE (LOGICAL iOS FORENSICS EXAMINER): AN OPEN SOURCE iOS BACKUP FORENSICS EXAMINATION TOOL. In Proceedings of the Conference on Digital Forensics, Security and Law (pp. 41-52).

  7. Baggili, I., Marrington, A., & Jafar, Y. (2014). Performance of a Logical, Five-Phase, Multithreaded, Bootable Triage Tool. In Advances in Digital Forensics X (pp. 279-295). Springer Berlin Heidelberg.

  8. Saleem, S., Baggili, I., & Popov, O. (2014). Quantifying relevance of mobile digital evidence as they relate to case types: A survey and a guide for best practices. Journal of Digital Forensics, Security and Law, 9(3), 19-50.

  9. Saleem, S., Popov, O., & Bagilli, I. (2014). Extended abstract digital forensics model with preservation and protection as umbrella principles. Procedia Computer Science, 35, 812-821.

  10. Mohamed, A. F. A. L., Marrington, A., Iqbal, F., & Baggili, I. (2014). Testing the forensic soundness of forensic examination environments on bootable media. Digital Investigation, 11, S22-S29.

  11. Ferris, B., Stahle, J., & Baggili, I. (2014, June). Quantifying the Danger of Mobile Banking Applications on the Android Platform. In 9th Annual Symposium on Information Assurance (ASIA’14) (p. 65).

 

2013 Publications

  1. Al Awawdeh, S., Baggili, I., Marrington, A., & Iqbal, F. (2013, November). CAT Record (computer activity timeline record): A unified agent based approach for real time computer forensic evidence collection. In Systematic Approaches to Digital Forensic Engineering (SADFE), 2013 Eighth International Workshop on (pp. 1-8). IEEE.

  2. Iqbal, A., Marrington, A., and Ibrahim Baggili. Forensic artifacts of the ChatON Instant Messaging application, 2013. SADFE 2013. To appear in the Eighth International Workshop on Systematic Approaches to Digital Forensic Engineering. IEEE.

  3. Awawdeh, S. A., Baggili, I., Marrington, A., & Iqbal, F. (2013). Towards a unified agent-based approach for real time computer forensic evidence collection. In Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (pp. 1492-1493). ACM.

  4. Barghouthy, N. A., Marrington, A., & Baggili, I. (2013, March). The forensic investigation of android private browsing sessions using orweb. In Computer Science and Information Technology (CSIT), 2013 5th International Conference on (pp. 33-37). IEEE.

  5. Baggili, I., Al Shamlan, M., Al Jabri, B., & Al Zaabi, A. (2013). Cybercrime, Censorship, Perception and Bypassing Controls: An Exploratory Study. In Digital Forensics and Cyber Crime (pp. 91-108). Springer Berlin Heidelberg.

  6. Al Marzougy, M., Baggili, I., & Marrington, A. (2013). BlackBerry PlayBook Backup Forensic Analysis. In Digital Forensics and Cyber Crime (pp. 239-252). Springer Berlin Heidelberg.

  7. Baggili, I., BaAbdallah, A., Al-Safi, D., & Marrington, A. (2013). Research Trends in Digital Forensic Science: An Empirical Analysis of Published Research. In Digital Forensics and Cyber Crime (pp. 144-157). Springer Berlin Heidelberg.

  8. Ruan, K., Carthy, J., & Baggili, I. (2013). Cloud forensics definitions and critical criteria for cloud forensic capability: An overview of survey results. Digital Investigation.

  9. Barghouthy, N. A., Marrington, A., & Baggili, I. (2013, March). The forensic investigation of android private browsing sessions using orweb. In Computer Science and Information Technology (CSIT), 2013 5th International Conference on (pp. 33-37). IEEE.