• Login
  • Search DFA

Digital Forensics Association

  • Login
  • Search DFA

Top
  • Login
  • Search DFA
Main
  • Home
  • DFA Discussion Board
  • Networking
    • Events
  • Volunteering
  • Membership
  • Start a Chapter
Education
  • A word on Education
  • Formal Education
    • Certificates
    • Associates
    • Bachelors
    • Masters
    • Doctorates
  • Free Training
  • Vendor Training
Forensic Info
  • Forensic Tools
    • Open Source
  • Library
    • Articles
    • Case Studies
    • Books
    • Papers
    • Presentations
    • Professional Journals
    • Publications
    • Anti-Forensics
      • Articles & Papers
      • Presentations
      • Tools
  • Resources
    • Community Sites
    • Discussion Groups
    • Forensic Blogs
    • Podcasts
    • Resource Sites
  • Evidence Files
  • Forensic Challenges
Research
  • Current Projects
    • Common Body of Knowledge
    • Processes
    • Standards
    • Testimony Archive
    • Tools Research
  • DFA Research Publications
About the DFA
  • Mission
  • Contact the DFA
  • Connect with Us
  • Press Room
  • Case Studies

    Have you published an article or whitepaper that you'd like to list here? Do you know of a good one that you'd like to tell us about? Send the DFA an email with the URL.
    • Analysis of a FAT-16 formatted image using Linux, TSK and Autopsy
      by Ove Hansen, 2005.
    • Analysis of Italian Malware, Romanian Rootkits, and United States Computer Law
      by Michael Ford, 2003.
    • Analysis of a Serial Based Digital Voice Recorder
      by Craig Wright, 2005.
    • Analysis of WinHex
      by Jessica Dillinger, 2004.
    • Analyze an Unknown Image and Perform Forensic Tool Validation
      by Patricia Watson, 2004.
    • Autopsy of a Successful Intrustion (Well, Two Actually)
      by Floydman, 2001.
    • Camouflaged and Attacked?
      by Bertha Marasky, 2005.
    • CC Terminals, Inc., Forensic Examination Report: Examination of a USB Hard Drive
      by Mark Mawer, 2005.
    • CC Terminals Computer Forensic Analysis Report
      by George Do, 2005.
    • Computer Forensics Investigation: Analyze an Unknown Image
      by Raul Siles Pelaez, 2004.
    • Discovery of a Rootkit: A Simple Scan Leads to a Complex Solution
      by John Melvin, 2005.
    • Examining an Unknown Image & Analysis of a Compromised Honeypot
      by Siti Faten Farina Hj. Ramli, 2005.
    • Forensic Analysis of Camouflage and Validation of X-Ways Forensic Tool
      by Mike Aylor, 2005.
    • Forensic Analysis of a Compromised Intranet Server
      by Roberto Obialero, 2006.
    • Forensic Analysis of the Contents of Nokia Mobile Phones
      by B. Williamson, P. Apeldoorn, B. Cheam & M. McDonald, Edith Cowan University, 2006.
    • Forensic Analysis of a Live Linux System, Pt. 1
      by Mariusz Burdach, 2004.
    • Forensic Analysis of a Live Linux System, Pt. 2
      by Mariusz Burdach, 2004.
    • Forensic Analysis of a Misused System
      by David Shettler, 2005.
    • Forensic Analysis of a Shared Workstation
      by Michael Kerr, 2003.
    • Forensic Examination of a RIM (BlackBerry) Wireless Device
      by Michael Burnette, 2002.
    • Forensic Analysis of a USB Flash Drive
      by Norrie Bennie, 2005.
    • Foregetting to Lock the Back Door: A Break-in Analysis on a Red Hat Linux 6.2 Machine
      by Gary Belshaw, 2003.
    • FTP Attack Case Study Part I: the Analysis
      by Anton Chuvakin, 2002.
    • FTP Attack Case Study Part II: The Lessons
      by Anton Chuvakin, 2002.
    • Investgating an Internal Case of Internet Abuse
      by Mal Wright, 2003.
    • iPod Forensics: Forensically Sound Examination of an Apple iPod
      by Andrew Przibilla.
    • Norton Ghost 2003 as a Forensic Image Acquisition Tool
      by John Brozycki, 2002.
    • Open Source Forensics Analysis - Windows 2000 Server
      by Andre Arnes, 2003.
    • Oracle Database Forensics Using LogMiner
      by Paul Wright, 2005.
    • Steganography for Spies and Sypbots for Hackers
      by Andrew Christensen, 2005.
    • Unspoken Truths - Forensic Analysis of an Unknown Binary
      by Louie Velocci.
Copyright © Digital Forensics Association. All rights reserved.