2013
DOI: 10.1186/1687-417x-2013-6
|View full text |Cite
|
Sign up to set email alerts
|

Do private and portable web browsers leave incriminating evidence?: a forensic analysis of residual artifacts from private and portable web browsing sessions

Abstract: The Internet is an essential tool for everyday tasks. Aside from common use, the option to browse the Internet privately is a desirable attribute. However, this can create a problem when private Internet sessions become hidden from computer forensic investigators in need of evidence. Our primary focus in this research is to discover residual artifacts from private and portable web browsing sessions. In addition, the artifacts must contain more than just file fragments and enough to establish an affirmative lin… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0
2

Year Published

2015
2015
2023
2023

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 35 publications
(10 citation statements)
references
References 2 publications
0
8
0
2
Order By: Relevance
“…In (Said et al, 2011) the authors examined if private browsing artefacts were available in the system's memory. The work in (Ohana and Shashidhar, 2013) focused on portable browsers (e.g., stored on a USB flash drive) and whether artefacts are still available after the session terminates. The approach resembles the work in (Said et al, 2011), in terms of capturing and analysing RAM, while the artefacts tested included: history, credentials, images and videos.…”
Section: Related Workmentioning
confidence: 99%
“…In (Said et al, 2011) the authors examined if private browsing artefacts were available in the system's memory. The work in (Ohana and Shashidhar, 2013) focused on portable browsers (e.g., stored on a USB flash drive) and whether artefacts are still available after the session terminates. The approach resembles the work in (Said et al, 2011), in terms of capturing and analysing RAM, while the artefacts tested included: history, credentials, images and videos.…”
Section: Related Workmentioning
confidence: 99%
“…A report of PBM weaknesses for popular regular and portable browsers can be found in [12]. In addition to the conventional forensics methodology they also performed limited RAM forensics.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Conventionally, computer forensic investigators focus on static media for data retrieval and acquisition. For example, Oh [11] and Ohana [12] show that private mode browsing in all major web browsers does leave some kind of recoverable data but it is difficult to establish a link between the user and a web browsing session. The same researchers also used RAM forensics methodology to investigate traces of artifacts left in main memory with regard to private browsing for several web browsers.…”
Section: Introductionmentioning
confidence: 99%
“…In (Said et al, 2011) the authors examined if artefacts were available in the system's memory. The work in (Ohana and Shashidhar, 2013) focused on portable browsers (e.g., stored on a USB flash drive) and whether artefacts are still available after the session terminates. The approach resembles the work in (Said et al, 2011), in terms of capturing and analyzing RAM, while the artefacts tested included: history, credentials, images and videos.…”
Section: Private Browsingmentioning
confidence: 99%
“…) (Montasari and Peltola, 2015) ( Satvat et al, 2014) (Ruiz et al, 2015) ( Ohana and Shashidhar, 2013) (Said et al, 2011) (Xu et al, 2015) ( Oh et al, 2011) The browsers were monitored inside a virtual running Windows 7. Every browser was installed using the default installation settings in a different snapshot of the virtual machine.…”
Section: Generic Artefactsmentioning
confidence: 99%