International Conference on Global Security, Safety, and Sustainability

ICGS3 2015: Global Security, Safety and Sustainability: Tomorrow's Challenges of Cyber Security pp 96-109 | Cite as

Computer Forensic Analysis of Private Browsing Modes

Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 534)

Abstract

This paper investigates the effectiveness of the private browsing modes built into four major Internet browsers. In examining the phenomenon of the private browsing modes built into four widely used Internet browsers, this paper aims to determine whether one can identify when a private browsing mode has been utilized by a suspect to perform a criminal or illegal act and to what extent the forensic examination of a computer can expose evidence of private browsing use.

Keywords

Private browsing Incognito InPrivate Computer forensics investigation Digital analysis 

References

  1. 1.
    Google: Incognito mode (browse in private) (2013). http://support.google.com/chrome/bin/answer.py?hl=en&answer=95464. Accessed 10 Mar 2013
  2. 2.
    Microsoft: InPrivate Browsing (2013). http://windows.microsoft.com/en-GB/internet-explorer/products/ie-9/features/in-private. Accessed 13 Mar 2013
  3. 3.
    Mozilla: Firefox 3.5 (2009). http://www.mozilla.org/en-US/firefox/3.5/releasenotes/. Accessed 11 Mar 2013
  4. 4.
    Apple: Safari 5.1 (OS X Lion): Browse privately (2013). https://support.apple.com/kb/PH5000. Accessed 10 Mar 2013
  5. 5.
    Fox, S.: ‘Porn mode’ browsing not really that private, NBCNews, 24 August 2010. http://www.nbcnews.com/id/38834872/ns/technology_and_science-security/t/porn-mode-browsing-not-really-private/#.UQl3Nh2EzTq. Accessed 11 Mar 2013
  6. 6.
    Keizer, G.: Microsoft Adds Privacy Tools to IE8 (2008). http://www.pcworld.com/article/150334/ie8_privacy_tools.html. Accessed 13 Mar 2013
  7. 7.
    Mozilla: Private Browsing- Browse the web without saving information about the sites you visit (2013). http://support.mozilla.org/en-US/kb/private-browsing-browse-web-without-saving-info. Accessed 11 Mar 2013
  8. 8.
    Aggarwal, G., Bursztein, E., Jackson, C., Boneh, D.: An analysis of private browsing modes in modern browsers. In: Proceedings of the 19th USENIX Security Symposium, Washington, DC, Stanford University (2010). http://static.usenix.org/events/sec10/tech/full_papers/Aggarwal.pdf. Accessed 10 Mar 2013
  9. 9.
    Eckersley, P.: How unique is your web browser? In: Atallah, M.J., Hopper, N.J. (eds.) PETS 2010. LNCS, vol. 6205, pp. 1–18. Springer, Heidelberg (2010)Google Scholar
  10. 10.
    Frowen, A.: How Private Is ‘In Private’ Browsing? (2010). http://www.intaforensics.com/Blog/How-Private-Is-In-Private-Browsing.aspx. Accessed 17 Mar 2013
  11. 11.
    Mahendrakar, A., Irving, J., Patel, S.: Forensic analysis of private browsing mode in popular browsers. In: Proceedings of the USENIX security symposium (2010). http://www.mocktest.net/paper.pdf. Accessed 2 May 2013
  12. 12.
    Said, H., Al Mutawa, N., Al Awadhi, I., Guimaraes, M.: Forensic analysis of private browsing artefacts. In: International Conference on Innovations in Information Technology (IIT), Dubai, 25–27 April, pp. 197–202 (2011)Google Scholar

Copyright information

© Springer International Publishing Switzerland 2015

Authors and Affiliations

  1. 1.Derby UniversityDerbyUK
  2. 2.Nottingham UniversityNottinghamUK

Personalised recommendations