Abstract

Web browsers are one of the most used applications on every computational device in our days. Hence, they play a pivotal role in any forensic investigation and help determine if nefarious or suspicious activity has occurred on that device. Our study investigates the usage of private mode and browsing artefacts within four prevalent web browsers and is focused on analyzing both hard disk and random access memory. Forensic analysis on the target device showed that using private mode matched each of the web browser vendors’ claims, such as that browsing activity, search history, cookies and temporary files that are not saved in the device’s hard disks. However, in volatile memory analysis, a majority of artefacts within the test cases were retrieved. Hence, a malicious actor performing a similar approach could potentially retrieve sensitive information left behind on the device without the user’s consent.

Highlights

  • As technology becomes more embedded within our society, there has been an exponential increase in the number of web transactions that take place online on a daily basis

  • Our work investigates the usage of the private mode within the chosen web browser scope, compares the findings with those of normal web browsing mode and identifies which web browser offers the most privacy and if the results correlate with what is promoted by its web browser vendor

  • Autopsy was developed to automate this manual process by leveraging tools from “The Sleuth Kit” that can parse the output from the results into an intuitive graphical user interface

Read more

Summary

Introduction

As technology becomes more embedded within our society, there has been an exponential increase in the number of web transactions that take place online on a daily basis. This coverage can include activities that are carried out in the home, work or industry verticals such as education. Research by [2] focused on the topic of private browsing, on the Brave browser Their area of research is around browser privacy and the increased number of users who expect privacy whilst browsing online. The majority of web browsers have integrated this functionality and have made it available to all who choose to take advantage of it

Objectives
Methods
Results
Discussion
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call