Skip to main content

Mozilla Firefox Browsing Artifacts in 3 Different Anti-forensics Modes

  • Conference paper
  • First Online:
Digital Forensics and Cyber Crime (ICDF2C 2013)

Abstract

There are several techniques which can assist a user to avoid leaving traces (Digital Evidence) of Internet activity so that one can frustrate forensic investigation. In this paper we examined three different usage scenarios of Internet browsing using Mozilla Firefox. These different usage scenarios were a sandbox environment, browsing with portable tools, and browsing with virtual box. We tried to find the artifacts created and left by web browsing activities in each of these usage scenarios. In our experiments, we performed identical web browsing activity for each of the three scenarios and investigated whether the traces were left behind.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 54.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 72.00
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Sandboxie. http://www.sandboxie.com

  2. Firefox portable. http://portableapps.com/apps/internet/firefox_portable

  3. Bares, R.A.: Hiding in a virtual world: using unconventionally installed operating system. In: International Conference on Intelligence and Security Informatics, pp. 276–284 (2009)

    Google Scholar 

  4. Said, H., Al Mutawa, N, Al Awadhi, I.: Forensic analysis of private browsing artifacts. In: International Conference on Innovations in Information Technology (IIT), pp. 197–202 (2011)

    Google Scholar 

  5. Mrdovic, S., Huseinovic, A.: Forensic analysis of encrypted volumes using hibernation file. In: 19th Telecommunications Forum (TELFOR), pp. 1277–1280 (2011)

    Google Scholar 

  6. Oha, J.J., Leeb, S., Leea, S.: Advanced evidence collection and analysis of web browser activity. Digital Invest. 8, 62–70 (2011)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Babu M. Mehtre .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Gupta, D., Mehtre, B.M. (2014). Mozilla Firefox Browsing Artifacts in 3 Different Anti-forensics Modes. In: Gladyshev, P., Marrington, A., Baggili, I. (eds) Digital Forensics and Cyber Crime. ICDF2C 2013. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 132. Springer, Cham. https://doi.org/10.1007/978-3-319-14289-0_17

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-14289-0_17

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-14288-3

  • Online ISBN: 978-3-319-14289-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics