Forensic analysis of private browsing artifacts
Source of Publication
2011 International Conference on Innovations in Information Technology, IIT 2011
The paper investigates the effectiveness of the privacy mode feature in three widely used Web browsers, and outlines how to investigate when these browsers have been used to perform a criminal or illegal act. It performs an identical test on a privacy mode session for each of the three Web browsers and investigates whether traces are left behind. The analysis is done in three phases. First, common places where history and cache records are usually stored are examined. Then, other locations on the local machine are examined using special forensic tools. Also, the physical memory (RAM) is captured and examined for traces. © 2011 IEEE.
Institute of Electrical and Electronics Engineers (IEEE)
artifacts left by private browsing, in-private and Firefox private browsing, incognito, Private browsing
Said, Huwida; Al Mutawa, Noora; Al Awadhi, Ibtesam; and Guimaraes, Mario, "Forensic analysis of private browsing artifacts" (2011). All Works. 1705.
Indexed in Scopus