Show simple item record

dc.contributor.authorFlowers, Cassandraen
dc.contributor.authorMansour, Alien
dc.contributor.authoral-Khateeb, Haideren
dc.date.accessioned2016-03-29T14:00:06Zen
dc.date.available2016-03-29T14:00:06Zen
dc.date.issued2016-04en
dc.identifier.citationFlowers, C., Mansour, A. and Al-Khateeb, H.M. (2016) ‘Web browser artefacts in private and portable modes: a forensic investigation’, Int. J. Electronic Security and Digital Forensics, 8 (2) pp.99–117en
dc.identifier.issn1751-9128en
dc.identifier.doi10.1504/IJESDF.2016.075583en
dc.identifier.urihttp://hdl.handle.net/10547/603909en
dc.description.abstractWeb browsers are essential tools for accessing the internet. Extra complexities are added to forensic investigations when recovering browsing artefacts as portable and private browsing are now common and available in popular web browsers. Browsers claim that whilst operating in private mode, no data is stored on the system. This paper investigates whether the claims of web browsers discretion are true by analysing the remnants of browsing left by the latest versions of Internet Explorer, Chrome, Firefox, and Opera when used in a private browsing session, as a portable browser, and when the former is running in private mode. Some of our key findings show how forensic analysis of the file system recovers evidence from IE while running in private mode whereas other browsers seem to maintain better user privacy. We analyse volatile memory and demonstrate how physical memory by means of dump files, hibernate and page files are the key areas where evidence from all browsers will still be recoverable despite their mode or location they run from.
dc.language.isoenen
dc.publisherInderscienceen
dc.relation.urlhttp://www.inderscience.com/info/inarticle.php?artid=75583en
dc.subjectweb browser forensicsen
dc.subjectportable applicationsen
dc.subjectprivate browsingen
dc.subjectincognito modeen
dc.subjectphysical memoryen
dc.subjectWindowsen
dc.subjectChromeen
dc.subjectFirefoxen
dc.subjectOperaen
dc.subjectOSForensicsen
dc.subjectInternet Exploreren
dc.subjectweb browsersen
dc.subjectbrowser artefactsen
dc.subjectportable browsersen
dc.subjectuser privacyen
dc.subjectvolatile memoryen
dc.subjectrecoverable artefactsen
dc.subjectrecord recoveryen
dc.subjectevidence recoveryen
dc.subjectG400 Computer Scienceen
dc.titleWeb browser artefacts in private and portable modes: a forensic investigationen
dc.typeArticleen
dc.identifier.eissn1751-9128en
dc.contributor.departmentBabraham Research Campusen
dc.contributor.departmentUniversity of Bedfordshireen
dc.identifier.journalInt. J. of Electronic Security and Digital Forensicsen
html.description.abstractWeb browsers are essential tools for accessing the internet. Extra complexities are added to forensic investigations when recovering browsing artefacts as portable and private browsing are now common and available in popular web browsers. Browsers claim that whilst operating in private mode, no data is stored on the system. This paper investigates whether the claims of web browsers discretion are true by analysing the remnants of browsing left by the latest versions of Internet Explorer, Chrome, Firefox, and Opera when used in a private browsing session, as a portable browser, and when the former is running in private mode. Some of our key findings show how forensic analysis of the file system recovers evidence from IE while running in private mode whereas other browsers seem to maintain better user privacy. We analyse volatile memory and demonstrate how physical memory by means of dump files, hibernate and page files are the key areas where evidence from all browsers will still be recoverable despite their mode or location they run from.


This item appears in the following Collection(s)

Show simple item record