This Article 
 Bibliographic References 
 Add to: 
2013 IEEE CS Security and Privacy Workshops (SPW2013)
San Francisco, CA USA
May 23-May 24
ISBN: 978-1-4799-0458-7
Donny Jacob Ohana, Sam Houston State Univ., Huntsville, TX, USA
Narasimha Shashidhar, Sam Houston State Univ., Huntsville, TX, USA
The Internet is an essential tool for everyday tasks. Aside from common usage, users desire the option to browse the Internet in a private manner. This can create a problem when private Internet sessions become hidden from computer investigators in need of evidence. Our primary focus in this research is to discover residual artifacts from private and portable browsing sessions. In addition, the artifacts must contain more than just file fragments and enough to establish an affirmative link between user and session. Certain aspects of this topic have triggered many questions, but there have not been enough authoritative answers to follow. As a result, we propose a new methodology for analyzing private and portable web browsing artifacts. Furthermore, our research will serve to be a significant resource for law enforcement, computer forensic investigators, and the digital forensics research community.
Index Terms:
Browsers,Internet,Forensics,History,Google,Universal Serial Bus,Drives,RAM Analysis,Private Browsing,Portable Browsers,Untraceable Browsing,Secret Browsing,USB Browser,Browser Artifacts,Internet Forensics
Donny Jacob Ohana, Narasimha Shashidhar, "Do Private and Portable Web Browsers Leave Incriminating Evidence? A Forensic Analysis of Residual Artifacts from Private and Portable Web Browsing Sessions," spw, pp.135-142, 2013 IEEE CS Security and Privacy Workshops (SPW2013), 2013
Usage of this product signifies your acceptance of the Terms of Use.