Forensic analysis of private browsing artifacts

41Citations
Citations of this article
82Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The paper investigates the effectiveness of the privacy mode feature in three widely used Web browsers, and outlines how to investigate when these browsers have been used to perform a criminal or illegal act. It performs an identical test on a privacy mode session for each of the three Web browsers and investigates whether traces are left behind. The analysis is done in three phases. First, common places where history and cache records are usually stored are examined. Then, other locations on the local machine are examined using special forensic tools. Also, the physical memory (RAM) is captured and examined for traces. © 2011 IEEE.

Cite

CITATION STYLE

APA

Said, H., Al Mutawa, N., Al Awadhi, I., & Guimaraes, M. (2011). Forensic analysis of private browsing artifacts. In 2011 International Conference on Innovations in Information Technology, IIT 2011 (pp. 197–202). https://doi.org/10.1109/INNOVATIONS.2011.5893816

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free