You are here: Resources > FIDIS Deliverables > Forensic Implications > D6.5/D6.6: Second thematic Workshop forensic implications > 
Presentation 1: The use of memory analysis in the recovery of digital data from mobile phone equipment.  Title:
PRESENTATION 2: TIME STAMP INTERPRETATION IN RELATION TO IDENTITY
 Presentation 3: Biometric devices methods for spoofing and circumventing

 

Presentation 2: Time stamp interpretation in relation to identity

The second presentation was by Svein Ingvar Willassen from the Norwegian University of Science and Technology (Norway). This was the first of two presentations from Svein and this presentation was on the interpretation of time stamps. Svein is currently only six months into this research topic – This research is being carried out for a three-year duration PhD thesis and will hopefully improve the understanding of time stamps to enable them to be better used in evidence. Purdue University (USA) and private company iBAS also contribute to the project, called “TID – Timestamps In Digital forensics” (TID means time in Norwegian). 

 

Up to date, Svein focused specifically on dates in FAT and NTFS filesystems (file last modified date, file last accessed date, file created date, MFT last modified date). 

 

Time stamps can present many problems, including different computers having different time stamps, which may or may not correlate, miss-adjusted clocks (accidental or deliberate), non-synchronisation of time clocks and the fact that different applications will handle time stamps in different ways. 

 

Presentation 1: The use of memory analysis in the recovery of digital data from mobile phone equipment.  fidis-wp6-del6_5_del6_6_workshop_on_forensic_implications.sxw  Presentation 3: Biometric devices methods for spoofing and circumventing
5 / 9