Abstract
Web browsers are essential tools for accessing the internet. Extra complexities are added to forensic investigations when recovering browsing artefacts as portable and private browsing are now common and available in popular web browsers. Browsers claim that whilst operating in private mode, no data is stored on the system. This paper investigates whether the claims of web browsers discretion are true by analysing the remnants of browsing left by the latest versions of Internet Explorer, Chrome, Firefox, and Opera when used in a private browsing session, as a portable browser, and when the former is running in private mode. Some of our key findings show how forensic analysis of the file system recovers evidence from IE while running in private mode whereas other browsers seem to maintain better user privacy. We analyse volatile memory and demonstrate how physical memory by means of dump files, hibernate and page files are the key areas where evidence from all browsers will still be recoverable despite their mode or location they run from.
Original language | English |
---|---|
Pages (from-to) | 99-117 |
Number of pages | 18 |
Journal | International Journal of Electronic Security and Digital Forensics |
Volume | 8 |
Issue number | 2 |
DOIs | |
Publication status | E-pub ahead of print - 29 Mar 2016 |
Bibliographical note
© 2016 Inderscience Enterprises Ltd.Keywords
- web browser forensics
- portable applications
- private browsing
- incognito mode
- physical memory
- Windows
- Chrome
- Firefox
- Opera
- OSForensics
- Internet explorer
- web browsers
- browser artefacts
- portable browsers
- user privacy
- volatile memory
- recoverable artefacts record recovery
- evidence recovery