Publications

Last names tagged with * are mentored students, last names tagged with + are colleagues, and last names tagged with u are from underrepresented groups in computing. C = Proceedings, J = Journal, W = White Paper.

  1. [C] Alshaya*, A., Kardorff*, A., Facundus*, C., Baggili, I., & Richard III+, G. (2023, August). Memory Forensics of the OpenDaylight Software-Defined Networking (SDN) Controller. In Proceedings of the 18th International Conference on Availability, Reliability and Security (pp. 1-8).
  2. [C] Soares*u, N., Seiden*, S., Baggili, I., & Webb+, W. (2023). On the Application of Synthetic Media to Penetration Testing. In Proceedings of the 2nd Workshop on Security Implications of Deepfakes and Cheapfakes (WDC '23). Association for Computing Machinery, New York, NY, USA, 1–10. https://doi.org/10.1145/3595353.3595886
  3. [J] Grajedau, C., Berrios*u, J., Benzo*u, S., Ogunwobi*u, E., & Baggili, I. (2023). Expanding digital forensics education with artifact curation and scalable, accessible exercises via the Artifact Genome Project. Forensic Science International: Digital Investigation, 45, 301566. TOP 3 PROFESSIONAL PAPER @ DFRWS 2023. 
  4. [J] Berrios*u, J., Mosher*, E., Benzo*, S., Grajedau, C., & Baggili, I. (2023). Factorizing 2FA: Forensic analysis of two-factor authentication applications. Forensic Science International: Digital Investigation, 45, 301569. TOP 3 STUDENT PAPER @ DFRWS 2023. 
  5. [J]  Dudani*, S., Baggili, I., Raymond, D., & Marchany, R. (2023). The current state of cryptocurrency forensics. Forensic Science International: Digital Investigation, 46, 301576.
  6. [J] Vondráček*, M., Baggili, I., Casey*, P., & Mekni+, M. (2023). Rise of the metaverse’s immersive virtual reality malware and the man-in-the-room attack & defenses. Computers & Security, 127, 102923.
  7. [J] Balon*, T., & Baggili, I. (2023). Cybercompetitions: A survey of competitions, tools, and systems to support cybersecurity education. Education and Information Technologies, 1-33.
  8. [C] Mahr*, A., Serafin*, R., Grajeda+, C., & Baggili, I. (2022). Auto-Parser: Android Auto and Apple CarPlay Forensics. In International Conference on Digital Forensics and Cyber Crime (pp. 52-71). Springer, Cham.
  9. [J] Thomas*, T., Edwards*, T., & Baggili, I. (2022). BlockQuery: Toward forensically sound cryptocurrency investigation. Forensic Science International: Digital Investigation, 40, 301340.
  10. [C] Yasuhara+, K., Walnycky*, D., Baggili, I., & Alhishwan*, A. (2022). The Amorphous Nature of Hackers: An Exploratory Study. Annual ADFSL Conference on Digital Forensics, Security and Law.
  11. [J] Vondracek*, M., Baggili, I., Casey*, P., & Mekni+, M. (2022). Rise of the Metaverse’s Immersive Virtual Reality Malware and the Man-in-the-Room Attack & Defenses. Computers & Security, 102923.
  12. [C] Zurowski*, S., Lord*, G., & Baggili, I. (2022, August). A Quantitative Analysis of Offensive Cyber Operation (OCO) Automation Tools. In Proceedings of the 17th International Conference on Availability, Reliability and Security (pp. 1-11).
  13. [J] Johnson*u, H., Volk*, K., Serafin*, R., Grajedau, C., & Baggili, I. (2022). Alt-tech social forensics: Forensic analysis of alternative social networking applications. Forensic Science International: Digital Investigation, 42, 301406.
  14. [C] Edwards*u, T., McCullough*u, S., Nassar+, M., & Baggili, I. (2022). On Exploring the Sub-domain of Artificial Intelligence (AI) Model Forensics. In International Conference on Digital Forensics and Cyber Crime (pp. 35-51). Springer, Cham.
  15. [J] Wang*, E., Zurowski*, S., Duffy*, O., Thomas*, T., & Baggili, I. (2022). Juicing V8: A primary account for the memory forensics of the V8 JavaScript engine. Forensic Science International: Digital Investigation, 42, 301400.
  16. [J] Thomas*, T., Piscitelli*, M., Nahar*, B. A., & Baggili, I. (2021). Duck Hunt: Memory forensics of USB attack platforms. Forensic Science International: Digital Investigation, 37, 301190
  17. [J] McCullough*u, S., Abudu*u, S., Onwubuariri*u, E., & Baggili, I. (2021). Another brick in the wall: An exploratory analysis of digital forensics programs in the United States. Forensic Science International: Digital Investigation, 37, 301187
  18. [C] Sitterer*, A., Dubois*, N., & Baggili, I. (2021, August). Forensicast: A Non-intrusive Approach & Tool For Logical Forensic Acquisition & Analysis of The Google Chromecast TV. In The 16th International Conference on Availability, Reliability and Security (pp. 1-12)
  19. [C] Balon*, T., Herlopian*, K., Baggili, I., & Grajeda-Mendez+u, C. (2021, August). Forensic Artifact Finder (ForensicAF): An Approach & Tool for Leveraging Crowd-Sourced Curated Forensic Artifacts. In The 16th International Conference on Availability, Reliability and Security (pp. 1-10). BEST PAPER AWARD
  20. [J] Mahr, A., Cichonu, M., Mateou, S., Grajedau, C., & Baggili, I. (2021). Zooming into the pandemic! A forensic analysis of the Zoom application. Forensic Science International: Digital Investigation, 36, 301107[J] Hassenfeldt*u, C., Jacques*u, J., & Baggili, I. (2020). Exploring the Learning Efficacy of Digital Forensics Concepts and Bagging & Tagging of Digital Devices in Immersive Virtual Reality. Forensic Science International: Digital Investigation, 33, 301011
  21. [J] Thomas*, T., Piscitelli*, M., Shavrov*, I., & Baggili, I. (2020). Memory FORESHADOW: Memory FOREnSics of HArDware CryptOcurrency wallets–A Tool and Visualization Framework. Forensic Science International: Digital Investigation, 33, 301002
  22. [C] Baggili, I., Behzadan+, V. Founding The Domain of AI Forensics. Proceedings of the Workshop on Artificial Intelligence Safety (SafeAI 2020) (pp. 31-35)
  23. [C] Hassenfeldt*u, C., Baig*u, S., Baggili, I., & Zhang*, X. (2019, August). Map My Murder: A Digital Forensic Study of Mobile Health and Fitness Applications. In Proceedings of the 14th International Conference on Availability, Reliability and Security (p. 42). ACM
  24. [J] Sanchez*u, L., Grajeda*u, C., Baggili, I., & Hall+, C. (2019). A Practitioner Survey Exploring the Value of Forensic Tools, AI, Filtering, & Safer Presentation for Investigating Child Sexual Abuse Material (CSAM). Digital Investigation, 29, S124-S142
  25. [C] Wu+u, T., Breitinger+, F., & Baggili, I. (2019, August). IoT Ignorance is Digital Forensics Research Bliss: A Survey to Understand IoT Forensics Definitions, Challenges and Future Research Directions. In Proceedings of the 14th International Conference on Availability, Reliability and Security (p. 46). ACM
  26. [J] Casey, P*., Lindsay-Decusati*u, R., Baggili, I., & Breitinger+, F. (2019). Inception: Virtual Space in Memory Space in Real Space–Memory Forensics of Immersive Virtual Reality with the HTC Vive. Digital Investigation, 29, S13-S21
  27. [J] Ricci*, J., Baggili, I., & Breitinger+, F. (2019). Blockchain-Based Distributed Cloud Storage Digital Forensics: Where's the Beef?. IEEE Security & Privacy, 17(1), 34-42
  28. [J] Zhang*, X., Grannis*, J., Baggili, I., & Beebe+u, N. L. (2019). Frameup: An incriminatory attack on storj: A peer to peer blockchain enabled distributed storage system. Digital Investigation
  29. [J] Casey*, P., Baggili, I., & Yarramreddy*, A. (2019). Immersive Virtual Reality Attacks and the Human Joystick. IEEE Transactions on Dependable and Secure Computing
  30. [C] Schmicker*, R., Breitinger+, F., & Baggili, I. (2018, September). AndroParse-An Android Feature Extraction Framework and Dataset. In International Conference on Digital Forensics and Cyber Crime (pp. 66-88). Springer, Cham
  31. [C] Haigh*, T., Breitinger+, F., & Baggili, I. (2018, September). If I Had a Million Cryptos: Cryptowallet Application Analysis and a Trojan Proof-of-Concept. In International Conference on Digital Forensics and Cyber Crime (pp. 45-65). Springer, Cham. BEST PAPER AWARD
  32. [C] Dorai*u, G., Houshmand+u, S., & Baggili, I. (2018, August). I Know What You Did Last Summer: Your Smart Home Internet of Things and Your iPhone Forensically Ratting You Out. In Proceedings of the 13th International Conference on Availability, Reliability and Security (p. 49). ACM
  33. [C] Luciano*u, L., Baggili, I., Topor*, M., Casey*, P., & Breitinger+, F. (2018, August). Digital Forensics in the Next Five Years. In Proceedings of the 13th International Conference on Availability, Reliability and Security (p. 46). ACM
  34. [C] Yarramreddy*u, A., Gromkowski*, P., & Baggili, I. (2018, May). Forensic Analysis of Immersive Virtual Reality Social Applications: A Primary Account. In 2018 IEEE Security and Privacy Workshops (SPW) (pp. 186-196). IEEE
  35. [J] Grajeda*u, C., Sanchez*u, L., Baggili, I., Clark*, D., & Breitinger+, F. (2018). Experience constructing the Artifact Genome Project (AGP): Managing the domain's knowledge one artifact at a time. Digital Investigation, 26, S47-S58.
  36. [J] Ricci*, J., Breitinger+, F., & Baggili, I. (2018). Survey results on adults and cybersecurity education. Education and Information Technologies, 1-19
  37. [B] Ricci*, J., Baggili, I., & Breitinger+, F. (2018). Watch What You Wear: Smartwatches and Sluggish Security. In Wearable Technologies: Concepts, Methodologies, Tools, and Applications (pp. 1458-1478). IGI Global
  38. [C] Knieriem*, B., Zhang*, X., Levine*, P., Breitinger+, F., & Baggili, I. (2017, October). An Overview of the Usage of Default Passwords. In International Conference on Digital Forensics and Cyber Crime (pp. 195-203). Springer
  39. [L] Saleem*, S., Popov+, O., & Baggili, I. (2017). Comments on “A method and a case study for the selection of the best available tool for mobile device forensics using decision analysis”[Digit Investig 16S, S55–S64]. Digital Investigation, 21, 88
  40. [C] Meffert*, C., Clark*, D., Baggili, I., & Breitinger+, F. (2017, August). Forensic State Acquisition from Internet of Things (FSAIoT): A general framework and practical approach for IoT forensics through IoT device state acquisition. In Proceedings of the 12th International Conference on Availability, Reliability and Security (p. 56). ACM
  41. [J] Zhang*, X., Baggili, I., & Breitinger+, F.. Breaking into the vault: privacy, security and forensic analysis of android vault applications. Computers & Security (2017), pp. –. issn: 0167-4048
  42. [J] Moore*u, J., Baggili, I., & Breitinger+, F. (2017). Find Me If You Can: Mobile GPS Mapping Applications Forensic Analysis & SNAVP the Open Source, Modular, Extensible Parser. Journal of Digital Forensics, Security and Law, 12(1), 7
  43. [J] Grajeda*u, C., Breitinger+, F., & Baggili, I. Availability of datasets for digital forensics – And what is missing. Digital Investigation 22, Supplement (2017), S94 –S105. issn: 1742- 2876
  44. [J] Denton*u, G., Karpisek*, F., Breitinger+, F., & Baggili, I. Leveraging the SRTP protocol for over-the-network memory acquisition of a GE Fanuc Series 90-30. Digital Investigation 22, Supplement (2017), S26 – S38. issn: 1742-2876
  45. [J] Clark*, D., Meffert*, C., Baggili, I., & Breitinger+, F. DROP (DRone Open source Parser) your drone: Forensic analysis of the DJI Phantom III. Digital Investigation 22, Supplement (2017), S3 –S14. issn: 1742-2876
  46. [J] Al-khateeb*, S., Conlan*, K. J., Agarwal+, N., Baggili, I., & Breitinger+, F. (2016). Exploring DeviantHacker Networks (DHN) On Social Media Platforms. Journal of Digital Forensics, Security and Law, 11(2), 7-20
  47. [J] Harichandran*, V. S., Breitinger+, F., & Baggili, I. (2016). Bytewise Approximate Matching: The Good, The Bad, and The Unknown. Journal of Digital Forensics, Security and Law, 11(2), 59-78
  48. [B] Ricci*, J., Baggili, I., & Breitinger+, F. (2017). Watch What You Wear: Smartwatches and Sluggish Security. In A. Marrington, D. Kerr, & J. Gammack (Eds.) Managing Security Issues and the Hidden Dangers of Wearable Technologies (pp. 47-73). Hershey, PA: Information Science Reference. doi:10.4018/978-1-5225-1016-1.ch003
  49. [J] Meffert*, C. S., Baggili, I., & Breitinger+, F. (2016). Deleting collected digital evidence by exploiting a widely adopted hardware write blocker. Digital Investigation, 18, S87-S96
  50. [J] Harichandran*, V. S., Walnycky*, D., Baggili, I., & Breitinger+, F. (2016). CuFA: A more formal definition for digital forensic artifacts. Digital Investigation, 18, S125-S137
  51. [J] Conlan*, K., Baggili, I., & Breitinger+, F. (2016). Anti-forensics: Furthering digital forensic science through a new extended, granular taxonomy. Digital Investigation, 18, S66-S75
  52. [J] Harichandran*, V. S., Breitinger+, F., Baggili, I., & Marrington+, A. (2016). A cyber forensics needs analysis survey: Revisiting the domain's needs a decade later. Computers & Security, 57, 1-13
  53. [J] Zhang*, X., Breitinger+, F., & Baggili, I. (2016). Rapid Android Parser for Investigating DEX files (RAPID). Digital Investigation, 17, 28-39
  54. [J] Saleem*, S., Popov, O+., & Baggili, I. (2016). A method and a case study for the selection of the best available tool for mobile device forensics using decision analysis. Digital Investigation, 16, S55-S64
  55. [J] Karpisek*, F., Baggili, I., & Breitinger+, F. (2015). WhatsApp network forensics: Decrypting and understanding the WhatsApp call signaling messages. Digital Investigation
  56. [C] Baggili, I., Oduro*u, J., Anthony*, K., Breitinger+, F., & McGee+, G. (2015, August). Watch What You Wear: Preliminary Forensic Analysis of Smart Watches. In Availability, Reliability and Security (ARES), 2015 10th International Conference on (pp. 303-311). IEEE
  57. [J] Walnycky*, D., Baggili, I., Marrington+, A., Moore*u, J., & Breitinger+, F. (2015). Network and device forensic analysis of Android social-messaging applications. Digital Investigation, 14, S77-S84
  58. [C] Gurjar*, S., Baggili, I., Breitinger+, F., & Fischer+u, A. (2015, May). An Empirical Comparison of Widely Adopted Hash Functions in Digital Forensics: Does the Programming Language and Operating System Make a Difference?. In Proceedings of the Conference on Digital Forensics, Security and Law (pp. 57-68)
  59. [C] Baggili, I., & Breitinger+, F. (2015, December). Data Sources for Advancing Cyber Forensics: What the Social World Has to Offer. In 2015 AAAI Spring Symposium Series, Stanford University, CA
  60. [C/BC] Marrington+, A., Iqbal+, F., & Baggili, I. (2014). Computer Profiling for Preliminary Forensic Examination. In Digital Forensics and Cyber Crime (pp. 207-220). Springer International Publishing
  61. [C/BC] Iqbal*, A., Alobaidli+, H., Marrington+, A., & Baggili, I. (2014). Amazon Kindle Fire HD Forensics. In Digital Forensics and Cyber Crime (pp. 39-50). Springer International Publishing
  62. [J] Saleem*, S., Baggili, I., & Popov+, O. (2014). Quantifying relevance of mobile digital evidence as they relate to case types: A survey and a guide for best practices. Journal of Digital Forensics, Security and Law, 9(3), 19-50.
  63. [J] Moore*u, J., Baggili, I., Marrington+, A., & Rodrigues*, A. (2014). Preliminary forensic analysis of the Xbox One. Digital Investigation, 11, S57-S65[J] Breitinger+, F., & Baggili, I. (2014). File Detection On Network Traffic Using Approximate Matching. Journal of Digital Forensics, Security and Law, 9(2), 23-36
  64. [J] Mohamed+, A. F. A. L., Marrington+, A., Iqbal+, F., & Baggili, I. (2014). Testing the forensic soundness of forensic examination environments on bootable media.Digital Investigation, 11, S22-S29
  65. [J] Saleem*, S., Popov,+ O., & Bagilli, I. (2014). Extended Abstract Digital Forensics Model with Preservationand Protection as Umbrella Principles. Procedia Computer Science, 35, 812-821
  66. [C] Baggili, I., Al Awawdeh*, S., & Moore*, J. (2014, May). LiFE (Logical iOS Forensics Examiner): An Open Source iOS backup forensics examination tool. In Proceedings of the Conference on Digital Forensics, Security and Law (pp. 41-52)
  67. [C] Al Awawdeh*, S., Baggili, I., Marrington+, A., & Iqbal+, F. (2013, November). CAT Record (computer activity timeline record): A unified agent based approach for real time computer forensic evidence collection. In Systematic Approaches to Digital Forensic Engineering (SADFE), 2013 Eighth International Workshop on(pp. 1-8). IEEE
  68. [C] Iqbal+, A., Marrington+, A., and Ibrahim Baggili. Forensic artifacts of the ChatON Instant Messaging application, 2013. SADFE 2013. In Systematic Approaches to Digital Forensic Engineering (SADFE), 2013 Eighth International Workshop on. IEEE
  69. [C/BC] Baggili, I., Marrington+, A., & Jafar*, Y. (2014). Performance of a Logical, Five-Phase, Multithreaded, Bootable Triage Tool. In Advances in Digital Forensics X(pp. 279-295). Springer Berlin Heidelberg
  70. [J] Ruan*u, K., Carthy+, J., Kechadi+, T., & Baggili, I. (2013). Cloud forensics definitions and critical criteria for cloud forensic capability: An overview of survey results. Digital Investigation, 10(1), 34-43
  71. [C] Awawdeh*, S. A., Baggili, I., Marrington+, A., & Iqbal+, F. (2013, August). Towards a unified agent-based approach for real time computer forensic evidence collection. In Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (pp. 1492-1493). ACM
  72. [C] Barghouthy+u, N. A., Marrington+, A., & Baggili, I. (2013, March). The forensic investigation of android private browsing sessions using orweb. In Computer Science and Information Technology (CSIT), 2013 5th International Conference on (pp. 33-37). IEEE
  73. [C/BC] Al Marzougy*, M., Baggili, I., & Marrington+, A. (2013). BlackBerry PlayBook Backup Forensic Analysis. In Digital Forensics and Cyber Crime (pp. 239-252). Springer Berlin Heidelberg
  74. [C/BC] Baggili, I., BaAbdallah*u, A., Al-Safi*u, D., & Marrington+, A. (2013). Research Trends in Digital Forensic Science: An Empirical Analysis of Published Research. In Digital Forensics and Cyber Crime (pp. 144-157). Springer Berlin Heidelberg
  75. [C/BC] Baggili, I., Al Shamlan*u, M., Al Jabri*u, B., & Al Zaabi*u, A. (2013). Cybercrime, Censorship, Perception and Bypassing Controls: An Exploratory Study. In Digital Forensics and Cyber Crime (pp. 91-108). Springer Berlin Heidelberg
  76. [J] Al Mutawa*u, N., Baggili, I., & Marrington+, A. (2012). Forensic analysis of social networking applications on mobile devices. Digital Investigation, 9, S24-S33
  77. [C] Ali, S., AlHosani*u, S., AlZarooni*u, F., & Baggili, I. (2012). iPad2 Logical Acquisition: Automated or manual examination?. In Proceedings of the Conference on Digital Forensics, Security and Law (pp. 113-128)
  78. [C] Marrington+, A., Baggili, I., Ismail*, T. A., & Kaf*, A. A. (2012, December). Portable web browser forensics: A forensic examination of the privacy benefits of portable web browsers. In Computer Systems and Industrial Informatics (ICCSII), 2012 International Conference on (pp. 1-6). IEEE
  79. [C/BC] Bariki*u, H., Hashmi*u, M., & Baggili, I. (2011). Defining a standard for reporting digital evidence items in computer forensic tools. In Digital Forensics and Cyber Crime (pp. 78-95). Springer Berlin Heidelberg. BEST PAPER AWARD
  80. [C] Al Mutawa*u, N., Al Awadhi*u, I., Baggili, I., & Marrington+, A. (2011, December). Forensic artifacts of Facebook's instant messaging service. In Internet Technology and Secured Transactions (ICITST), 2011 International Conference for (pp. 771-776). IEEE
  81. [C/BC] Trabelsi+, Z., Al-Hemairy+, M., Baggili, I., & Amin, S. (2011). Towards More Secure Biometric Readers for Effective Digital Forensic Investigation. In Digital Forensics and Cyber Crime (pp. 65-77). Springer Berlin Heidelberg[J] Marrington+, A., Baggili, I., Mohay+, G., & Clark+, A. (2011). CAT Detect (computer activity timeline detection): a Tool for Detecting Inconsistency in Computer Activity Timelines. digital investigation, 8, S52-S6
  82. [C/BC] Husain*, M. I., Baggili, I., & Sridhar+, R. (2011). A simple cost-effective framework for iPhone forensic analysis. In Digital Forensics and Cyber Crime(pp. 27-37). Springer Berlin Heidelberg
  83. [C] Ruan*u, K., Baggili, I., Carthy+, J., & Kechadi+, T. (2011, May). Survey on cloud forensics and critical criteria for cloud forensic capability: A preliminary analysis. In 6th annual conference of the ADFSL Conference on Digital Forensics, Security and Law, Richmond, Virginia, USA
  84. [J] Yousef+, A. F., Baggili, I. M., Bartlett+, G., Kane+, M. D., & Mymryk, J. S. (2011). Lina: A laboratory inventory system for oligonucleotides, microbial strains, and cell lines. Journal of the Association for Laboratory Automation, 16(1), 82-89
  85. [C] Baggili, I. (2010). Generating system requirements for a mobile digital evidence collection system: a preliminary step towards enhancing the forensic collection of digital devices. European, Mediterranean & Middle Eastern Conference on Information Systems (EMCIS2010)
  86. [J] Bader*u, M., & Baggili, I. (2010). iPhone 3GS forensics: logical analysis using apple itunes backup utility. Small scale digital device forensics journal, 4(1), 1-15[C/B] Baggili, I., Mohan*, A., & Rogers+, M. (2010). SMIRK: SMS Management and Information Retrieval Kit. In Digital Forensics and Cyber Crime (pp. 33-42). Springer Berlin Heidelberg
  87. [W] Mohan*, A., Baggili, I. M., & Rogers+, M. K. (2010).Authorship attribution of SMS messages using an N-grams approach (Vol. 11). CERIAS Tech Report 2011
  88. [J] Baggili, I., & Rogers+, M. (2009). Self-Reported Cyber Crime: An Analysis on the Effects of Anonymity and Pre-Employment Integrity. International Journal of Cyber Criminology, 3(2)
  89. [J] Baggili, I. M., Mislan+, R., & Rogers+, M. (2007). Mobile phone forensics tool testing: A database driven approach. International Journal of Digital Evidence,6(2), 168-178
  90. [C] Lutes+, K. D., Chang+u, K., & Baggili, I. M. (2006, April). Diabetic e-management system (DEMS)In Information Technology: New Generations, 2006. ITNG 2006. Third International Conference on (pp. 619-624). IEEE