Abstract
There are several techniques which can assist a user to avoid leaving traces (Digital Evidence) of Internet activity so that one can frustrate forensic investigation. In this paper we examined three different usage scenarios of Internet browsing using Mozilla Firefox. These different usage scenarios were a sandbox environment, browsing with portable tools, and browsing with virtual box. We tried to find the artifacts created and left by web browsing activities in each of these usage scenarios. In our experiments, we performed identical web browsing activity for each of the three scenarios and investigated whether the traces were left behind.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Sandboxie. http://www.sandboxie.com
Firefox portable. http://portableapps.com/apps/internet/firefox_portable
Bares, R.A.: Hiding in a virtual world: using unconventionally installed operating system. In: International Conference on Intelligence and Security Informatics, pp. 276–284 (2009)
Said, H., Al Mutawa, N, Al Awadhi, I.: Forensic analysis of private browsing artifacts. In: International Conference on Innovations in Information Technology (IIT), pp. 197–202 (2011)
Mrdovic, S., Huseinovic, A.: Forensic analysis of encrypted volumes using hibernation file. In: 19th Telecommunications Forum (TELFOR), pp. 1277–1280 (2011)
Oha, J.J., Leeb, S., Leea, S.: Advanced evidence collection and analysis of web browser activity. Digital Invest. 8, 62–70 (2011)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Gupta, D., Mehtre, B.M. (2014). Mozilla Firefox Browsing Artifacts in 3 Different Anti-forensics Modes. In: Gladyshev, P., Marrington, A., Baggili, I. (eds) Digital Forensics and Cyber Crime. ICDF2C 2013. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 132. Springer, Cham. https://doi.org/10.1007/978-3-319-14289-0_17
Download citation
DOI: https://doi.org/10.1007/978-3-319-14289-0_17
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-14288-3
Online ISBN: 978-3-319-14289-0
eBook Packages: Computer ScienceComputer Science (R0)