Computer Forensic Analysis of Private Browsing Modes

Reza Montasari, Pekka Peltola

Research output: Chapter in Book/Report/Conference proceedingConference contribution

7 Citations (Scopus)

Abstract

This paper investigates the effectiveness of the private browsing modes built into four major Internet browsers. In examining the phenomenon of the private browsing modes built into four widely used Internet browsers, this paper aims to determine whether one can identify when a private browsing mode has been utilized by a suspect to perform a criminal or illegal act and to what extent the forensic examination of a computer can expose evidence of private browsing use.
Original languageEnglish
Title of host publicationGlobal Security, Safety and Sustainability: Tomorrow’s Challenges of Cyber Security
Subtitle of host publication10th International Conference, ICGS3 2015, London, UK, September 15-17, 2015. Proceedings
EditorsH. Jahankhani, A. Carlile, B. Akhgar, A. Taal, A. G. Hessami, A. Hosseinian-Far
PublisherSpringer, Cham
Pages96-109
Number of pages14
Volume534
ISBN (Electronic)9783319232768
Publication statusPublished - 4 Sep 2015
Externally publishedYes

Fingerprint

Internet
examination
evidence

Cite this

Montasari, R., & Peltola, P. (2015). Computer Forensic Analysis of Private Browsing Modes. In H. Jahankhani, A. Carlile, B. Akhgar, A. Taal, A. G. Hessami, & A. Hosseinian-Far (Eds.), Global Security, Safety and Sustainability: Tomorrow’s Challenges of Cyber Security: 10th International Conference, ICGS3 2015, London, UK, September 15-17, 2015. Proceedings (Vol. 534, pp. 96-109). Springer, Cham.
Montasari, Reza ; Peltola, Pekka. / Computer Forensic Analysis of Private Browsing Modes. Global Security, Safety and Sustainability: Tomorrow’s Challenges of Cyber Security: 10th International Conference, ICGS3 2015, London, UK, September 15-17, 2015. Proceedings. editor / H. Jahankhani ; A. Carlile ; B. Akhgar ; A. Taal ; A. G. Hessami ; A. Hosseinian-Far. Vol. 534 Springer, Cham, 2015. pp. 96-109
@inproceedings{4e3677a1b5ad4a7ebf605d2f142fd24f,
title = "Computer Forensic Analysis of Private Browsing Modes",
abstract = "This paper investigates the effectiveness of the private browsing modes built into four major Internet browsers. In examining the phenomenon of the private browsing modes built into four widely used Internet browsers, this paper aims to determine whether one can identify when a private browsing mode has been utilized by a suspect to perform a criminal or illegal act and to what extent the forensic examination of a computer can expose evidence of private browsing use.",
author = "Reza Montasari and Pekka Peltola",
year = "2015",
month = "9",
day = "4",
language = "English",
volume = "534",
pages = "96--109",
editor = "H. Jahankhani and A. Carlile and B. Akhgar and A. Taal and Hessami, {A. G.} and A. Hosseinian-Far",
booktitle = "Global Security, Safety and Sustainability: Tomorrow’s Challenges of Cyber Security",
publisher = "Springer, Cham",

}

Montasari, R & Peltola, P 2015, Computer Forensic Analysis of Private Browsing Modes. in H Jahankhani, A Carlile, B Akhgar, A Taal, AG Hessami & A Hosseinian-Far (eds), Global Security, Safety and Sustainability: Tomorrow’s Challenges of Cyber Security: 10th International Conference, ICGS3 2015, London, UK, September 15-17, 2015. Proceedings. vol. 534, Springer, Cham, pp. 96-109.

Computer Forensic Analysis of Private Browsing Modes. / Montasari, Reza; Peltola, Pekka.

Global Security, Safety and Sustainability: Tomorrow’s Challenges of Cyber Security: 10th International Conference, ICGS3 2015, London, UK, September 15-17, 2015. Proceedings. ed. / H. Jahankhani; A. Carlile; B. Akhgar; A. Taal; A. G. Hessami; A. Hosseinian-Far. Vol. 534 Springer, Cham, 2015. p. 96-109.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

TY - GEN

T1 - Computer Forensic Analysis of Private Browsing Modes

AU - Montasari, Reza

AU - Peltola, Pekka

PY - 2015/9/4

Y1 - 2015/9/4

N2 - This paper investigates the effectiveness of the private browsing modes built into four major Internet browsers. In examining the phenomenon of the private browsing modes built into four widely used Internet browsers, this paper aims to determine whether one can identify when a private browsing mode has been utilized by a suspect to perform a criminal or illegal act and to what extent the forensic examination of a computer can expose evidence of private browsing use.

AB - This paper investigates the effectiveness of the private browsing modes built into four major Internet browsers. In examining the phenomenon of the private browsing modes built into four widely used Internet browsers, this paper aims to determine whether one can identify when a private browsing mode has been utilized by a suspect to perform a criminal or illegal act and to what extent the forensic examination of a computer can expose evidence of private browsing use.

UR - https://www.springer.com/us/book/9783319232751

M3 - Conference contribution

VL - 534

SP - 96

EP - 109

BT - Global Security, Safety and Sustainability: Tomorrow’s Challenges of Cyber Security

A2 - Jahankhani, H.

A2 - Carlile, A.

A2 - Akhgar, B.

A2 - Taal, A.

A2 - Hessami, A. G.

A2 - Hosseinian-Far, A.

PB - Springer, Cham

ER -

Montasari R, Peltola P. Computer Forensic Analysis of Private Browsing Modes. In Jahankhani H, Carlile A, Akhgar B, Taal A, Hessami AG, Hosseinian-Far A, editors, Global Security, Safety and Sustainability: Tomorrow’s Challenges of Cyber Security: 10th International Conference, ICGS3 2015, London, UK, September 15-17, 2015. Proceedings. Vol. 534. Springer, Cham. 2015. p. 96-109