This book constitutes the refereed proceedings of the 13th EAI International Conference on Practical Aspects of Digital Forensics and Cyber Crime, ICDF2C 2022, held in Boston, MA, during November 16-18, 2022.
The 28 full papers included in this book were carefully reviewed and selected from 80 submissions. They were organized in topical sections as follows: Image Forensics; Forensics Analysis; spread spectrum analysis; traffic analysis and monitoring; malware analysis; security risk management; privacy and security.
Image Forensics.- Image-to-Image Translation Generative Adversarial
Networks for Video Source Camera Falsification.- Towards efficient on-site
CSAM triage by clustering images from a source point of view.- Can Image
Watermarking Efficiently Protect DeepLearning-Based Image Classifiers? A
Preliminary Security Analysis of an IP-Protecting Method.- Forensics
Analysis.- Digital Forensics Tool Evaluation on Deleted Files.- Forensic
Analysis of Webex on the iOS Platform.- Watch Your WeChat Wallet: Digital
Forensics Approach on WeChat Payments on Android.- Crypto Wallet Artifact
Detection on Android Devices using Advanced Machine Learning Techniques.-
SPREAD SPECTRUM ANALYSIS.- CSCD: A Cyber Security Community Detection Scheme
on Online Social Networks.- Shedding Light on Monopoly: Temporal Analysis of
Drug Trades.- Extracting Spread-Spectrum Hidden Data Based on Better Lattice
Decoding.- TRAFFIC ANALYSIS AND MONITORING.- MQTT Traffic Collection and
ForensicAnalysis Framework.- IoT Malicious Traffic Detection Based on FSKDE
and Federated DIOT-Pysyft.- Crime and Incident Watch for Smart Cities: A
Sensor-Based Approach.- Malware Analysis.- The Lightweight Botnet Detection
Model Based on the Improved UNet.- On the application of active learning to
handle data evolution in Android malware detection.- Volatility Custom
Profiling for Automated Hybrid ELF Malware Detection.- Security Risk
Management.- The Need for Biometric Anti-Spoofing Policies: The Case of
Etsy.- VPnet: A Vulnerability Prioritization Approach Using Pointer Network
and Deep Reinforcement Learning.- Are External Auditors Capable of Dealing
with Cybersecurity Risks?.- Deep Learning-based Detection of Cyberattacks
in Software-Defined Networks.- Deep Learning Based Network Intrusion
Detection System for Resource-Constrained Environments.- Poisoning-Attack
Detection using an Auto-Encoder for Deep Learning Models.- PRIVACY AND
SECURITY.- Attribute-based Proxy Re-encryption with Privacy Protection for
Message Dissemination in VANET.- PBPAFL: A Federated Learning Framework with
Hybrid Privacy Protection for Sensitive Data.- Cyber Crime undermines Data
Privacy efforts On the Balance between Data Privacy and
Security.- Automating the Flow of Data Between Digital Forensic Tools using
Apache NiFi.- Android Mobile Terminal Security Assessment Based on Analytical
Hierarchy Process (AHP).- A General Steganalysis Method of QR Codes.