Digital forensic analysis methodology for private browsing: Firefox and Chrome on Linux as a case study

dc.contributor.affiliationUniversidade de Santiago de Compostela. Centro de Investigación en Tecnoloxías da Informacióngl
dc.contributor.affiliationUniversidade de Santiago de Compostela. Departamento de Electrónica e Computacióngl
dc.contributor.areaÁrea de Enxeñaría e Arquitectura
dc.contributor.authorFernández Fuentes, Xosé
dc.contributor.authorFernández Pena, Anselmo Tomás
dc.contributor.authorCabaleiro Domínguez, José Carlos
dc.date.accessioned2022-02-25T12:18:21Z
dc.date.available2022-02-25T12:18:21Z
dc.date.issued2022
dc.description.abstractThe web browser has become one of the basic tools of everyday life. A tool that is increasingly used to manage personal information. This has led to the introduction of new privacy options by the browsers, including private mode. In this paper, a methodology to explore the effectiveness of the private mode included in most browsers is proposed. A browsing session was designed and conducted in Mozilla Firefox and Google Chrome running on four different Linux environments. After analyzing the information written to disk and the information available in memory, it can be observed that Firefox and Chrome did not store any browsing-related information on the hard disk. However, memory analysis reveals that a large amount of information could be retrieved in some of the environments tested. For example, for the case where the browsers were executed in a VMware virtual machine, it was possible to retrieve most of the actions performed, from the keywords entered in a search field to the username and password entered to log in to a website, even after restarting the computer. In contrast, when Firefox was run on a slightly hardened non-virtualized Linux, it was not possible to retrieve any browsing-related artifacts after the browser was closedgl
dc.description.peerreviewedSIgl
dc.identifier.citationComputers & Security 115 (2022) 102626gl
dc.identifier.doi10.1016/j.cose.2022.102626
dc.identifier.issn0167-4048
dc.identifier.urihttp://hdl.handle.net/10347/27616
dc.language.isoenggl
dc.publisherElseviergl
dc.relation.publisherversionhttps://doi.org/10.1016/j.cose.2022.102626gl
dc.rights© 2022 The Authors. Published by Elsevier Ltd. This is an open access article under the CC BY license (http://creativecommons.org/licenses/by/4.0/)gl
dc.rightsAtribución 4.0 Internacional
dc.rights.accessRightsopen accessgl
dc.rights.urihttp://creativecommons.org/licenses/by/4.0/
dc.subjectDigital forensicsgl
dc.subjectBrowsing artefactsgl
dc.subjectPrivate browsinggl
dc.subjectInternet privacygl
dc.subjectVirtualizationgl
dc.titleDigital forensic analysis methodology for private browsing: Firefox and Chrome on Linux as a case studygl
dc.typejournal articlegl
dc.type.hasVersionVoRgl
dspace.entity.typePublication
relation.isAuthorOfPublicationdecb372f-b9cd-4237-8dda-2c0f5c40acbe
relation.isAuthorOfPublication1959c3e1-552e-4a0b-bc17-a5f9f687ad38
relation.isAuthorOfPublication.latestForDiscoverydecb372f-b9cd-4237-8dda-2c0f5c40acbe

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
2022_computers_fernandez_digital.pdf
Size:
1.52 MB
Format:
Adobe Portable Document Format
Description:
Artigo de investigación