DocumentCode :
244788
Title :
Acquisition of Evidence of Web Storage in HTML5 Web Browsers from Memory Image
Author :
Matsumoto, Shinichi ; Sakurai, Kimio
Author_Institution :
Inst. of Syst., Inf. Technol. & Nanotechnol. (ISIT), Fukuoka, Japan
fYear :
2014
fDate :
3-5 Sept. 2014
Firstpage :
148
Lastpage :
155
Abstract :
Web browser is a growing platform for the execution of various applications. There are large fractions of smartphone platforms that support the execution of web technology based application, especially one such as HTML 5. However there are also some emerging smartphone platforms that only support web technology based applications. Taking into the considerations of these situations may lead to a higher importance of forensic investigations on artifacts within the web browser bringing about the usefulness of the HTML5 specific attributes as evidences in mobile forensics. Through this paper, we explore the results of experiments that acquire the main memory image within terminal and extract the webStorage data as an evidence of the browsing activity. The memory forensics of web browsing activity is highly concerned. The evidences gathered from the HTML5 webStorage contents acquired from the main memory image are examined and the results of the observations indicate the ability to retrieve webStorage from the memory image is certain. Therefore, we proclaimed formats of evidences that are retrievable from the main memory. The formats were different depending on the type of web browser accessed. Three most utilized web browsers are experimented in this paper namely, Google Chrome, Mozilla Firefox and Microsoft Internet Explorer. The results showed that the acquisition of webStorage content on the browsers were possible and elucidated its formats. Values of webStorage is contained in the residuals that left by all of three web browsers. Therefore, if the investigator has the knowledge of values, he will be able to find the location of the evidence to hint values. If the investigator does not have the knowledge about the value, then he can explore the evidence based on the knowledge of the origin or key. Because the format of the evidence depends on Web browser, investigator must use different search techniques according to the Web browser.
Keywords :
digital forensics; online front-ends; storage management; Google Chrome; HTML5 Web browsers; HTML5 webStorage contents; Microsoft Internet Explorer; Mozilla Firefox; Web browsing activity; Web storage; Web technology based application; memory forensics; memory image; mobile forensics; smart phone platforms; webStorage data; Browsers; Computers; Digital forensics; Internet; Virtual machining; Web pages; Data Privacy; Digital Forensics; Memory Forensics;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Information Security (ASIA JCIS), 2014 Ninth Asia Joint Conference on
Conference_Location :
Wuhan
Type :
conf
DOI :
10.1109/AsiaJCIS.2014.30
Filename :
7023253
Link To Document :
بازگشت