CFSE 2013: The 5th IEEE International Workshop on Computer Forensics in Software Engineering

Held in conjunction with COMPSAC, the IEEE Signature Conference on Computers, Software & Applications - July 22-26, 2013 - Kyoto, Japan


Goal of the Workshop

Computer forensics has been an emerging research area for IT-related professionals, researchers, and practitioners since the turn of the century. However, the majority of the research has focused on “after the fact” issues, namely how to collect and analyze digital evidence in an existing software/hardware environment. In this workshop, we encourage the discussion and study on the “built-in” issues, namely how to build software applications for critical infrastructures that better serve the purpose of computer forensics. Software forensics that analyzes crime-ware code and behavior is also included.

Theme and Scope of the Workshop

The theme of the workshop is to advance research on a legal-activity-enforced cyber environment. We need to build forensics into software so that evidence of cybercrime can be collected more efficiently, cyber attacks on critical infrastructures can be prevented more effectively, and anonymity and privacy can be preserved more confidently. In addition to the study of “after the fact” issues on collection, examination, and analysis of digital evidence, paying attention to computer forensics issues in an early stage of software development has become an urgent need as our society relies more and more on the Internet. In this workshop, we will turn our focus to the foundations of cyberspace to investigate “built-in” issues, such as how to build a software environment that better serves the purpose of computer forensics. The effort to build forensics “by design” will make cyberspace more friendly in a later forensic search and investigation. Topics of interest include, but are not limited to:

• Anti-Plagiarism Technology
• Anti-Software Forensics
• Cloud Forensics
• Code Authorship Analysis or Code-theft Detection
• Compiler Forensics / Formal Methods in Forensic Computing
• Computer Forensics in Education
• Cyber Crime Simulation
• Electronic Voting Forensics
• Forensic Programming and Software Development
• Forensic Testing
• Forensics in Embedded Systems
• Image forensics
• Information hiding technology
• Legal, Ethical, and Privacy Issues in Computing
• Next Generation of Forensic Software
• Social Networking Forensics
• Software Application Forensics (Medical, Financial, Governmental, etc.)
• Software Forensics and Profiling
• Source Code Forensic Recovering
• System Software Forensics (Operating Systems, Browsers, Email systems, etc.)
• Ubiquitous/Mobile Forensic Computing
• Web Services/SOA/XML Forensics
• Workflow/business process forensics


Papers must be submitted electronically via the CFSE 2013 Submission Page.

Follow the IEEE Computer Society Press Proceedings Author Guidelines to prepare your papers:

All papers will be carefully reviewed by at least three reviewers. Papers can be submitted as regular papers (six pages), and the acceptance will depend on reviewer feedback. Accepted papers will be published in the workshop proceedings of the IEEE Computer Software and Applications Conference (COMPSAC 2013) by the IEEE CS Press. At least one of the authors of each accepted paper must register as a full participant of the workshop to have the paper or published in the proceedings. Each accepted paper must be presented in person by an author.

General Inquiries

For updated information, please contact the workshop organizers.

CFSE Organizers

Ryoichi Sasaki
Tokyo Denki University, Japan
Email: sasaki (at)

Tetsutaroh Uehara
Ritsumeikan University, Japan
Email: uehara (at)

Jigang Liu
Metropolitan State University, USA
Email: jigang.liu (at)

Program Committee

Yuki Ashino, NEC, Japan
Vinod Bhattathiripad, G J Software Forensics, India
Rong Chen, Dalian Maritime University, China
Shuhui Hou, University of Sci. and Tech., Beijing, China
Satoshi Kai, Hitachi Ltd., Japan
Ki Jung Lee, Drexel University, USA
Chu-Hsing Lin, Tunghai University, Taiwan
Anyi Liu, Purdue University Fort Wayne, USA
Masakatsu Nishigaki, Shizuoka University, Japan
Wei Ren, China University of Geosciences, China
Sean Thorpe, University of Technology, Jamaica
Ben Turnbull, Defense Science and Technology, Australia
Shiuh-Jeng Wang, Central Police University, Taiwan
Rongsheng Xu, Chinese Academy of Science, China
Chung-Huang Yang, Kaohsiung Normal University, Taiwan
S. M. Yiu, the University of Hong Kong, China
Hiroshi Yoshiura, The University of Electro-Comm., Japan

Workshops Program Deadlines

• Extended: April 8, 2013 : Workshop papers due
• April 26, 2013: Workshop paper notifications
• May 5, 2013: Camera-ready copy and registration due