DFRWS 2004 Speakers and Presenters

The people listed below made DFRWS 2004 a great success by sharing their knowledge, ideas and time. To learn more about the Workshop's program and proceedings, view the Agenda. For event photos from DFRWS 2004, visit the Photo Gallery.

Nicole Lang Beebe

Nicole is a Research Assistant at the University of Texas at San Antonio, where she is working on her PhD in Information Technology. Previously, she was a Senior Network Security Engineer with the SAIC, where she conducted commercial digital forensics investigations and information/network security vulnerability assessments for government and commercial customers. She served in the USAF on active duty and reserves and has been a federally credentialed computer crime investigator for the AFOSI since 1998. Nicole holds degrees in electrical engineering and criminal justice and is a Certified Information Systems Security Professional (CISSP).

Ms. Florence Tushabe:

Florence is a senior research fellow at the Institute of Computer Science, Makerere University, Uganda. She holds a Masters Degree in Computer Science and does research in Computer crime and security, Ethical and social aspects of computing and Virtual reality.

Co-author-Dr. Venansius Baryamureeba

He is the Director of Makerere University Institute of Computer Science. His research interests include Software Engineering, Information Systems, Databases, Optimization, Computer Forensics and Crime, and Network Security and he teaches graduate level courses in these same areas.

Brian Carrier

Brian is a Research Assistant at the Center for Education and Research in Information Assurance and Security (CERIAS) at Purdue University while he works on a Ph.D in Computer Science and Digital Forensics. Previously, Brian was a Research Scientist at @stake in Boston, MA, and the lead for the @stake Response Team and Digital Forensic Labs. Brian has authored several computer forensic tools including The Sleuth Kit and the Autopsy Forensic Browser. He has taught digital forensics at SANS, FIRST, the @stake Academy, and SEARCH and has presented to the HTCIA, the American Academy of Forensic Sciences (AAFS), the Regional Computer Forensics Group, Geek Cruises, Red Hat Security Summit and the University of Dayton Computer and Cyberspace Law Seminar. Brian is also a member of the Honeynet Project and has been involved with the European Commission's CTOSE project on Digital Evidence.

Lance Spitzner

Lance is a geek who constantly plays with computers, especially network security. He loves security because it is a constantly changing environment, your job is to do battle with the bad guys. This love for tactics first began in the Army, where he served for seven years, four as an Armor officer in the Army's Rapid Deployment Force. Following the military he received his M.B.A and became involved in the world of information security. Now he fights threats with IPv4 packets as opposed to 120mm SABOT rounds. His passion is researching honeypot technologies and using them to learn more about the enemy. He is founder of the Honeynet Project, moderator of the honeypot maillist, author of "Honeypots: Tracking Hacker", co-author of "Know Your Enemy" and author of several whitepapers. He has also spoken at various conferences and organizations, including SANS, Blackhat, FIRST, the Pentagon, the FBI Academy, the President's Advisory Board, the Army War College, West Point and Navy War College.

Edward Balas

Edward is a security researcher within the Advanced Network Management Laboratory at Indiana University. Edward's professional interests focus on network infrastructure protection. As a member of the Honeynet Project, Edward has led the development of Sebek and co-authored the second edition of the Know Your Enemy book. Prior to joining Indiana University, Edward spent over 6 years in the network industry as an engineer at a tier-1 ISP and as a developer of NMS systems.

Heather Dussault

Heather has a broad background in information and microprocessor systems, microelectro- mechanical systems design, modeling and simulation and semiconductor physics. She has published more than twenty technical articles on topics ranging from the reliability of fault tolerant systems to microprocessor design and how cosmic radiation affects the performance of semiconductor devices. Her current research interests include information assurance, computer forensics, system and device reliability, programmable microsystems, and biological and chemical analogies for organizing and processing information. She is also an instructor in the Advanced Course in Engineering - Cyber Security Bootcamp in the area of network security. Prior to joining SUNY-IT, Dr. Dussault was a researcher at the Air Force Research Laboratory's Information Directorate and a program manager at the Defense Advanced Research Projects Agency (DARPA).

John Lowry

John Lowry is Technical Director for Information Security at BBN Technologies. He has been active in all aspects of information security for over 30 years.

Golden G. Richard III

He is the third in a now broken line of Goldens, was born in 1964 in Jennings, LA. He set a record still unbroken among his peers by sending forth a single job application after graduation, to the University of New Orleans, where he was hired as an Assistant Professor in 1994. Since 2001, he has been an Associate Professor of Computer Science in the same department. He is CTO and co-founder of Digital Forensics Solutions. When he's not hacking, he can be found in his garden, covered in dirt.

Mark Hirsh

Mark has worked for The MITRE Corporation since September 1984. He has been supporting DCCI since November 2000. Mr. Hirsh has been involved in DCCI T&E activities for the past three years, and has authored more than 30 test reports. Before coming to MITRE, Mr. Hirsh spent sixteen years at NSA, providing system design and software development support to NSA time sensitive operations centers.

Paul Blythe

Paul is a Systems Science Ph.D. student, and research assistant at Binghamton University, New York. He manages the Digital Data Embedding Laboratory for Dr. Jessica Fridrich, with the Department of Electrical and Computer Engineering. His interests include Biometric Watermarking, Optics, Steganalysis of Digital Images, Image Authentication, and Electrical Systems Engineering. Paul is currently building a “Proof of Concept” prototype of a “Secure Digital Camera” using Lossless Biometric (iris) Watermarking, for forensic applications. His research in this area is funded by the AFRL

Lorenzo Martignoni

Lorenzo is a Master student at Università degli Studi di Milano Bicocca where he is currently working on his thesis pertaining to computer forensics. Since 2000 he has cooperated with CERT-IT, a non profit organization that provides support for computer incidents involving Italian organizations. His main interests are reverse engineering of malicious software, analysis of compromised system and network security.

Mike Sieffert

Mike graduated from Binghamton University in 2004 and is currently working for Assured Information Security, as contractor, at Air Force Research Laboratory (AFRL) in Rome NY. His focus has been largely in the area of information assurance, and the bulk of his programming has been in the Java language. Mike is also studying for his MS in computer science at Syracuse University, Syracuse, NY, with an expected graduation date of May 2005.

©2001-2016 DFRWS   |   dfrws [at] dfrws [dot] org  

DFRWS is a US 501(c)(3) non-profit organization.