\newcommand{\introauthor}{Miha Frangež} % % The first few paragraphs don't really change between years % Digital forensics is a pivotal branch of forensic science dedicated to the recovery and investigation of materials found in digital devices. Originally synonymous with computer forensics, the field of digital forensics has expanded significantly to encompass the examination of all digital data storage devices. Its roots can be traced back to the personal computer revolution of the late 1970s and early 1980s, evolving through the 1990s without formal organization until the emergence of national guidelines in the 21st century. \par Digital forensic investigations serve diverse purposes, primarily to substantiate or challenge hypotheses in both criminal and civil court proceedings. In criminal cases, these investigations support allegations of offenses such as murder, theft, and personal assault. In civil cases, they safeguard individuals’ rights and property, often addressing disputes ranging from family matters to contractual conflicts among economic entities. The field also extends into electronic discovery, crucial in modern litigation. \par This conference gathers the seminar papers of master’s students at the Faculty of Computer Science and Information, University of Ljubljana \currentyear/\nextyear. It explores a variety of topics including mobile forensics, logs, password forensics and cyphering, browser forensics and forensic investigation. Each paper contributes to the ongoing development and application of digital forensic techniques, enhancing our ability to navigate the complexities of today’s digital landscape. In mobile forensics, three seminar papers provide valuable insights. The first paper addresses data recovery from damaged devices, highlighting challenges in accessing data without owner-provided access. The second paper evaluates smartphone backup integrity, focusing on iPhone and Android systems. The third paper examines MOBILedit Forensic Express for retrieving digital evidence, emphasizing complexities in accessing messaging app data amid evolving security measures. % % Here, add a one-paragraph summary for each of the categories/topics % % TODO: do this