NUST Institutional Repository

Forensic analysis of web browsers in smartphones

Show simple item record

dc.contributor.author Asim, Muhammad
dc.contributor.author Supervised by Muhammad Faisal Amiad.
dc.date.accessioned 2020-10-27T04:00:12Z
dc.date.available 2020-10-27T04:00:12Z
dc.date.issued 2018-03
dc.identifier.other TIS-243
dc.identifier.other MSIS-13
dc.identifier.uri http://10.250.8.41:8080/xmlui/handle/123456789/5498
dc.description.abstract As the use of smart-phones increases day by day, people are getting more and more dependent on smart-phones for storing their personal and sensitive information. Web browsers are primarily intended for accessing information provided by web servers or files systems in private networks. The basics of web browser forensics revolve around artifacts such as Web sites visited, Malicious URLs, time stamps, counts of access, search histories, cookies, downloaded activities, Private Browsing sessions and the potential to rebuild Web pages from cached files. However, leveraging and locating this information can be challenging without the needed prerequisite information. Leveraging Internet browser artifacts can be complex but the value of the information available makes it worth the effort. Objective of this research is; to performed forensics analysis of data structure used by popular Android web browsers (Chrome, Opera, Mozilla Firefox, and Dolphin),analyzed user privacy in private mode against spywares and how a forensics investigator can acquire forensics artifacts. To strengthen digital investigation, Andro- Kit is proposed for Android web browsers forensics. Andro-Kit had successfully acquire and analyze forensics evidence such as Web History, Downloads, Cookies, Bookmarks, Chrome stored user credentials, decode base64 encoded images, Tabs information etc. Andro-Kit also extract visited websites IP Address in private browsing sessions from Android Kernel virtual directories. Further, comparative analysis of Andro-Kit with standard forensics tool-kits (Oxygen forensics, Andriller, MOBILedit and Belkasoft evidence center) is presented. en_US
dc.language.iso en en_US
dc.publisher MCS en_US
dc.title Forensic analysis of web browsers in smartphones en_US
dc.type Thesis en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search DSpace


Advanced Search

Browse

My Account