Volatile memory forensics of privacy aware browsers

被引:1
|
作者
Mistry, Nilay R. [1 ]
Gajjar, Krupa [1 ]
Junare, S. O. [1 ]
机构
[1] Natl Forens Sci Univ, Sect 9, Gandhinagar, Gujarat, India
关键词
privacy browser; portable browser; memory forensics; RAM analysis; digital forensics; cyber crime;
D O I
10.1504/IJICS.2022.125255
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Internet privacy has become a notable concern in today's world. Aside from the common usage of web browsers, users are using such browsers which can protect their privacy using anonymity. Such growing concerns regarding privacy over the internet have led to the development of privacy-enhanced web browsers whose main aim is to provide better privacy to its users by not storing any information on user's personal computers, and at the same time also keeps the users anonymous while browsing. Some users have found an alternative use of these web browsers that are somewhat illegal in nature. This research encompasses the acquisition and analysis of such kind of privacy browsers and compares its outcomes with that of the portable web browsers and private modes of commonly-used web browsers to establish the claim of these privacy browsers of keeping providing a higher level of privacy.
引用
收藏
页码:313 / 326
页数:14
相关论文
共 50 条
  • [21] Disk Memory Forensics Analysis of Memory Forensics Frameworks Flow
    Prem, T.
    Selwin, V. Paul
    Mohan, Ashok Kumar
    2017 INNOVATIONS IN POWER AND ADVANCED COMPUTING TECHNOLOGIES (I-PACT), 2017,
  • [22] Energy-aware memory allocation in heterogeneous non-volatile memory systems
    Lee, HG
    Chang, N
    ISLPED'03: PROCEEDINGS OF THE 2003 INTERNATIONAL SYMPOSIUM ON LOW POWER ELECTRONICS AND DESIGN, 2003, : 420 - 423
  • [23] Security and privacy in the Computer Forensics context
    Sirinivasan, S.
    2006 10TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, VOLS 1 AND 2, PROCEEDINGS, 2006, : 226 - 228
  • [24] Privacy-preserving email forensics
    Armknecht, Frederik
    Dewald, Andreas
    DIGITAL INVESTIGATION, 2015, 14 : S127 - S136
  • [25] A comparative forensic analysis of privacy enhanced web browsers and private browsing modes of common web browsers
    Gabet, Ryan M.
    Seigfried-Spellar, Kathryn C.
    Rogers, Marcus K.
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2018, 10 (04) : 356 - 371
  • [26] Windows memory forensics
    Ruff, Nicolas
    JOURNAL IN COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2008, 4 (02): : 83 - 100
  • [27] Hypervisor Memory Forensics
    Graziano, Mariano
    Lanzi, Andrea
    Balzarotti, Davide
    RESEARCH IN ATTACKS, INTRUSIONS, AND DEFENSES, 2013, 8145 : 21 - 40
  • [28] Privacy-Preserving Network Forensics
    Afanasyev, Mikhail
    Kohno, Tadayoshi
    Ma, Justin
    Murphy, Nick
    Savage, Stefan
    Snoeren, Alex C.
    Voelker, Geoffrey M.
    COMMUNICATIONS OF THE ACM, 2011, 54 (05) : 78 - 87
  • [29] Issues on Developing a Location Aware Game for Mobile Browsers
    Kaplan, Sinan
    Ikonen, Jouni
    Knutas, Antti
    COMPUTER SYSTEMS AND TECHNOLOGIES, COMPSYSTECH'16, 2016, : 129 - 136
  • [30] Signature based volatile memory forensics: a detection based approach for analyzing sophisticated cyber attacks
    Mistry N.R.
    Dahiya M.S.
    International Journal of Information Technology, 2019, 11 (3) : 583 - 589