Volatile memory forensics of privacy aware browsers

被引:1
|
作者
Mistry, Nilay R. [1 ]
Gajjar, Krupa [1 ]
Junare, S. O. [1 ]
机构
[1] Natl Forens Sci Univ, Sect 9, Gandhinagar, Gujarat, India
关键词
privacy browser; portable browser; memory forensics; RAM analysis; digital forensics; cyber crime;
D O I
10.1504/IJICS.2022.125255
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Internet privacy has become a notable concern in today's world. Aside from the common usage of web browsers, users are using such browsers which can protect their privacy using anonymity. Such growing concerns regarding privacy over the internet have led to the development of privacy-enhanced web browsers whose main aim is to provide better privacy to its users by not storing any information on user's personal computers, and at the same time also keeps the users anonymous while browsing. Some users have found an alternative use of these web browsers that are somewhat illegal in nature. This research encompasses the acquisition and analysis of such kind of privacy browsers and compares its outcomes with that of the portable web browsers and private modes of commonly-used web browsers to establish the claim of these privacy browsers of keeping providing a higher level of privacy.
引用
收藏
页码:313 / 326
页数:14
相关论文
共 50 条
  • [1] Volatile memory forensics of privacy-aware operating systems
    Mistry, Nilay R. (nilaymistry30@gmail.com), 1600, Inderscience Publishers (13):
  • [2] Volatile memory forensics of privacy-aware operating systems
    Mistry, Nilay R.
    Kanitkar, Sampada
    Junare, S. O.
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2021, 13 (06) : 671 - 684
  • [3] Advances in volatile memory forensics
    Schatz, Bradley
    Cohen, Michael
    DIGITAL INVESTIGATION, 2017, 20 : 1 - 1
  • [4] Portable Web Browser Forensics A forensic examination of the privacy benefits of portable web browsers
    Marrington, Andrew
    Baggili, Ibrahim
    Al Ismail, Talal
    Al Kaf, Ali
    2012 INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND INDUSTRIAL INFORMATICS (ICCSII), 2012,
  • [5] A Methodology for Privacy-Aware IoT-Forensics
    Nieto, Ana
    Rios, Ruben
    Lopez, Javier
    2017 16TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS / 11TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING / 14TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS, 2017, : 626 - 633
  • [6] A Comprehensive Literature Review on Volatile Memory Forensics
    Hamid, Ishrag
    Rahman, M. M. Hafizur
    ELECTRONICS, 2024, 13 (15)
  • [7] Using Memory Forensics to Investigate Security and Privacy of Facebook
    Ghafarian, Ahmad
    Keskin, Deniz
    INTELLIGENT COMPUTING, VOL 3, 2022, 508 : 581 - 601
  • [8] Email Spoofing Detection Using Volatile Memory Forensics
    Iyer, R. Padmavathi
    Atrey, Pradeep K.
    Varshney, Gaurav
    Misra, Manoj
    2017 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2017, : 619 - 625
  • [9] Windows volatile memory forensics based on correlation analysis
    Zhao, K. (zhaokuo@jlu.edu.cn), 1600, Academy Publisher (09):
  • [10] Process based volatile memory forensics for ransomware detection
    Arfeen, Asad
    Khan, Muhammad Asim
    Zafar, Obad
    Ahsan, Usama
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2022, 34 (04):