Computer Forensic Analysis of Private Browsing Modes

Reza Montasari, Pekka Peltola

Research output: Chapter in Book/Report/Conference proceedingConference contribution

10 Citations (Scopus)

Abstract

This paper investigates the effectiveness of the private browsing modes built into four major Internet browsers. In examining the phenomenon of the private browsing modes built into four widely used Internet browsers, this paper aims to determine whether one can identify when a private browsing mode has been utilized by a suspect to perform a criminal or illegal act and to what extent the forensic examination of a computer can expose evidence of private browsing use.
Original languageEnglish
Title of host publicationGlobal Security, Safety and Sustainability: Tomorrow’s Challenges of Cyber Security
Subtitle of host publication10th International Conference, ICGS3 2015, London, UK, September 15-17, 2015. Proceedings
EditorsH. Jahankhani, A. Carlile, B. Akhgar, A. Taal, A. G. Hessami, A. Hosseinian-Far
PublisherSpringer, Cham
Pages96-109
Number of pages14
Volume534
ISBN (Electronic)9783319232768
Publication statusPublished - 4 Sep 2015
Externally publishedYes

Fingerprint Dive into the research topics of 'Computer Forensic Analysis of Private Browsing Modes'. Together they form a unique fingerprint.

  • Cite this

    Montasari, R., & Peltola, P. (2015). Computer Forensic Analysis of Private Browsing Modes. In H. Jahankhani, A. Carlile, B. Akhgar, A. Taal, A. G. Hessami, & A. Hosseinian-Far (Eds.), Global Security, Safety and Sustainability: Tomorrow’s Challenges of Cyber Security: 10th International Conference, ICGS3 2015, London, UK, September 15-17, 2015. Proceedings (Vol. 534, pp. 96-109). Springer, Cham.