Why showcase your artifact at IDFC?
The International Conference on Intelligent Digital Forensics and Cybersecurity (IDFC) is a premier global forum bringing together researchers, forensic practitioners, cybersecurity professionals, and policymakers to explore cutting-edge developments in digital evidence analysis, threat intelligence, and cyber defense.
- High-impact visibility: Engage with world-class researchers across digital forensics, cybersecurity, and threat intelligence domains.
- Actionable feedback: Get expert reviews on forensic validity, security effectiveness, scalability, and real-world deployment.
- Bridge research & practice: Share forensic datasets, security tools, and solutions for reproducibility and operational adoption.
- Grow collaborations: Meet potential co-authors, mentors, and partners across academia, law enforcement, and industry.
What makes a strong artifact/demo?
- Clear problem framing & rigorous forensic methodology
- Forensic validity: evidence integrity, chain of custody, threat detection accuracy
- Ethical considerations, privacy compliance, and legal admissibility
- Compelling visuals: case studies, detection metrics, live/recorded demos, QR codes
We welcome early/late-breaking results, negative results with analysis, threat datasets, forensic tools, and deployed security systems.
Topics of Interest
Artifacts and demonstrations addressing (but not limited to) the following topics are welcome.
Advanced Digital Forensics
- Memory, firmware, and hardware-assisted forensics
- Live forensics and real-time evidence acquisition
- Cross-platform and cross-device forensic correlation
- Timeline reconstruction and event attribution at scale
- Forensics for encrypted, ephemeral, and volatile data
- Automated triage and prioritization of digital evidence
- Multimedia forensics (image, video, audio, and sensor data)
- Forensics for cyber-physical systems and smart infrastructures
Next-Generation Cybersecurity and Cyber Defense
- AI-driven cyber defense and autonomous response systems
- Adversarial attacks against security systems and AI models
- Post-quantum cryptography and forensic readiness
- Cyber deception, honeypots, and active defense strategies
- Supply-chain attacks and software integrity verification
- Detection and mitigation of insider threats
- Security for 5G/6G networks and edge computing
- Cyber resilience and recovery modeling
AI and Machine Learning for Security and Forensics
- Foundation models for security analytics
- Multimodal AI for forensic reasoning and correlation
- Continual, online, and adaptive learning in forensic systems
- Robust ML against poisoning and evasion attacks
- Human-in-the-loop AI for investigative decision support
- Causal AI for cyber incident attribution
- Trust, fairness, and bias analysis in forensic AI
- Benchmarking datasets and evaluation metrics for forensic AI
Generative AI and Synthetic Media Forensics
- Detection, attribution, and provenance of AI-generated content
- Deepfake forensics for images, video, voice, and text
- Watermarking, fingerprinting, and content authenticity verification
- Generative AI for attack simulation and red teaming
- Generative models for reconstructing missing or damaged evidence
- Prompt forensics and analysis of LLM misuse
- Adversarial generative models and forensic countermeasures
- Forensics of AI agents and autonomous systems
Privacy-Preserving, Distributed, and Trustworthy Forensics
- Federated and decentralized forensic learning
- Secure multi-party computation for investigations
- Homomorphic encryption in forensic analytics
- Confidential computing and trusted execution environments
- Privacy-preserving evidence sharing across organizations
- Secure data collaboration between law enforcement and industry
- Transparency, auditability, and reproducibility in forensic systems
Blockchain, Web3, and Financial Crime Forensics
- Smart contract analysis and vulnerability forensics
- Cryptocurrency tracing and transaction graph analysis
- DeFi fraud, rug pulls, and NFT-related crimes
- Forensics for decentralized identity (DID) systems
- Tokenomics manipulation and market abuse detection
- Cross-chain forensic analysis and interoperability challenges
IoT, Edge, and Cyber-Physical System Forensics
- Forensics for smart homes, vehicles, drones, and wearables
- Industrial IoT (IIoT) and critical infrastructure forensics
- Edge AI security and forensic challenges
- Digital twins for forensic reconstruction
- Sensor data integrity and provenance verification
Human, Social, and Cognitive Dimensions of Cybercrime
- Social engineering and phishing analysis using AI
- Behavioral analytics for insider threat detection
- Cognitive forensics and decision-making under uncertainty
- Misinformation, disinformation, and influence operations
- Online radicalization and coordinated inauthentic behavior
Legal, Ethical, and Policy Perspectives
- Legal implications of AI-generated evidence
- Explainability requirements for AI in court proceedings
- Standards and certification for forensic AI tools
- Accountability and liability in automated investigations
- Cross-border evidence sharing and digital sovereignty
- Ethics-by-design for intelligent forensic systems
- Policy frameworks for regulating generative AI misuse
Applied Systems, Tools, and Case Studies
- End-to-end forensic platforms and real-world deployments
- National and international cybercrime case studies
- Public-private collaboration models in cyber investigations
- Evaluation of forensic tools in operational environments
- Lessons learned from large-scale cyber incidents
Visionary and Emerging Topics
- Self-healing and self-forensic cyber systems
- Autonomous cyber investigators and AI agents
- Forensics for metaverse and extended reality (XR) environments
- Digital trust ecosystems and evidence provenance at scale
- The future of cyber forensics in an AI-native world
Privacy-Preserving Federated Learning
- Federated learning for collaborative forensic analysis
- Differential privacy in distributed cyber investigations
- Secure multi-party computation for evidence sharing
- Privacy-aware threat intelligence aggregation
- Homomorphic encryption for forensic data processing
What to Include
- Motivation & technical contributions of the artifact/demo
- Key interactive features; how attendees will engage
- Links to resources (live demo, video, docs, repo, dataset)
- Evaluation metrics and preliminary results
- Special requirements (non-standard power/network, space)
On-site Logistics
- Power & basic Wi-Fi provided (bring adapters if needed)
- Bring your own device(s) and peripherals
- Poster boards and table space available
- Include QR codes to video/demo pages for fast access