CFSE 2013: The 5th IEEE International Workshop on Computer Forensics in Software Engineering
Held in conjunction with COMPSAC, the IEEE Signature Conference on Computers, Software & Applications - July 22-26, 2013 - Kyoto, Japan
MS Word CFP
Goal of the WorkshopComputer forensics has been an emerging research area for IT-related professionals, researchers, and practitioners since the turn of the century. However, the majority of the research has focused on “after the fact” issues, namely how to collect and analyze digital evidence in an existing software/hardware environment. In this workshop, we encourage the discussion and study on the “built-in” issues, namely how to build software applications for critical infrastructures that better serve the purpose of computer forensics. Software forensics that analyzes crime-ware code and behavior is also included.
Theme and Scope of the WorkshopThe theme of the workshop is to advance research on a legal-activity-enforced cyber environment. We need to build forensics into software so that evidence of cybercrime can be collected more efficiently, cyber attacks on critical infrastructures can be prevented more effectively, and anonymity and privacy can be preserved more confidently. In addition to the study of “after the fact” issues on collection, examination, and analysis of digital evidence, paying attention to computer forensics issues in an early stage of software development has become an urgent need as our society relies more and more on the Internet. In this workshop, we will turn our focus to the foundations of cyberspace to investigate “built-in” issues, such as how to build a software environment that better serves the purpose of computer forensics. The effort to build forensics “by design” will make cyberspace more friendly in a later forensic search and investigation. Topics of interest include, but are not limited to:
• Anti-Plagiarism Technology
• Anti-Software Forensics
• Cloud Forensics
• Code Authorship Analysis or Code-theft Detection
• Compiler Forensics / Formal Methods in Forensic Computing
• Computer Forensics in Education
• Cyber Crime Simulation
• Electronic Voting Forensics
• Forensic Programming and Software Development
• Forensic Testing
• Forensics in Embedded Systems
• Image forensics
• Information hiding technology
• Legal, Ethical, and Privacy Issues in Computing
• Next Generation of Forensic Software
• Social Networking Forensics
• Software Application Forensics (Medical, Financial, Governmental, etc.)
• Software Forensics and Profiling
• Source Code Forensic Recovering
• System Software Forensics (Operating Systems, Browsers, Email systems, etc.)
• Ubiquitous/Mobile Forensic Computing
• Web Services/SOA/XML Forensics
• Workflow/business process forensics
SubmissionPapers must be submitted electronically via the CFSE 2013 Submission Page.
Follow the IEEE Computer Society Press Proceedings Author Guidelines to prepare your papers: http://www.computer.org/portal/web/cscps/submission.
All papers will be carefully reviewed by at least three reviewers. Papers can be submitted as regular papers (six pages), and the acceptance will depend on reviewer feedback. Accepted papers will be published in the workshop proceedings of the IEEE Computer Software and Applications Conference (COMPSAC 2013) by the IEEE CS Press. At least one of the authors of each accepted paper must register as a full participant of the workshop to have the paper or published in the proceedings. Each accepted paper must be presented in person by an author.