2014
DOI: 10.1016/j.jisa.2014.02.002
|View full text |Cite|
|
Sign up to set email alerts
|

On the privacy of private browsing – A forensic approach

Abstract: Private browsing has been a popular privacy feature built into all mainstream browsers since 2005. However, despite the prevalent use, the security of this feature has received little attention from the research community. To the best of our knowledge, no study has existed that systematically evaluates the security of private browsing across all major browsers and from all angles: not only examining the memory, but also the underlying database structure on the disk and the web traffic. In this paper, we presen… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0
1

Year Published

2014
2014
2023
2023

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 18 publications
(7 citation statements)
references
References 11 publications
0
6
0
1
Order By: Relevance
“…The approach taken here is not to attempt reassembly of database files, but to reliably carve individual records. (Satvat et al, 2013) is a more recent paper, but despite quoting Internet Explorer 10 as the target, they describe the analysis of Index.dat files which are associated with earlier versions of the browser. The paper provides interesting suggestions for active attacks; however, these are less relevant to the normal forensic process.…”
Section: Related Workmentioning
confidence: 99%
“…The approach taken here is not to attempt reassembly of database files, but to reliably carve individual records. (Satvat et al, 2013) is a more recent paper, but despite quoting Internet Explorer 10 as the target, they describe the analysis of Index.dat files which are associated with earlier versions of the browser. The paper provides interesting suggestions for active attacks; however, these are less relevant to the normal forensic process.…”
Section: Related Workmentioning
confidence: 99%
“…The search terms were used in the websites of the four supermarkets to retrieve all food products in the UK food supply in that category. The supermarket search was conducted in Google Chrome used in ‘incognito mode’ to minimise the influence of previous browsing history on retrieval of food brands from the search results ( 27 ) . Searches were conducted over a 6-month period (June 2020–November 2020) and was performed by a team of three research dietitians.…”
Section: Methodsmentioning
confidence: 99%
“…Semakin pedulinya pengguna terhadap privasi aktivitas browsing, maka mereka menghendaki web browser mampu untuk tidak meninggalkan jejak informasi terkait aktifitas browsing dari sesi pengguna [3] TOR Browser adalah Web browser yang secara default sdh mempunyai kemampuan menjaga privasi, sehingga keberadaan dan identitas pengguna tidak terekpos ke internet. Perute onion dikembangkan lebih jauh oleh DARPA pada tahun 1997.…”
Section: Article History Menerima 11 Mei 2020 Revisi 1 Juni 2020 Diterima 3 Juni 2020unclassified