Browser forensics: adblocker extensions
نویسنده
چکیده
The purpose of this research is to identify artifacts that are left behind by adblocking extensions. First their mechanics are explored, which includes a source code study of the two most used adblocking extesions, AdBlock and Adblock Plus. Then, samples are gathered by browsing to the top 50 websites of the Netherlands, without and with an adblocker extension installed. The same is done for running the browser in private mode. Although all tested combinations leave artifacts, or even send data over the network, only Firefox together with Adblock Plus stored artifacts that can be used to determine browsing history.
منابع مشابه
Forensics Evaluation of Privacy of Portable Web Browsers
Browsers claim private mode browsing saves no data on the host machine. Most popular web browsers also offer portable versions of their browsers which can be launched from a removable device. When the removable device is removed, it is claimed that traces of browsing activities will be deleted and consequently private portable browsers offer better privacy. This makes the task of computer foren...
متن کاملQuantifying Web Adblocker Privacy
Web advertisements, an integral part of today’s web browsing experience, financially support countless websites. Meaningful advertisements, however, require behavioral targeting, user tracking and profile fingerprinting that raise serious privacy concerns. To counter privacy issues and enhance usability, adblockers emerged as a popular way to filter web requests that do not serve the website’s ...
متن کاملReconstructing and Visualizing Evidence of Artifact from Firefox SessionStorage
Importance of digital forensics is expected to increase in the future.Many of researches on digital forensics are targeted to persistent memory. These researches concerns about the extraction of evidence directly or via filesystem. On the other hand, there is a movement to employ the Web browser supports HTML5 as software platform. In this situation, it is considered that the forensics techniqu...
متن کاملEffective detection of vulnerable and malicious browser extensions
Unsafely coded browser extensions can compromise the security of a browser, making them attractive targets for attackers as a primary vehicle for conducting cyber-attacks. Among others, the three factors making vulnerable extensions a high-risk security threat for browsers include: i) the wide popularity of browser extensions, ii) the similarity of browser extensions with web applications, and ...
متن کاملNovel Image Data-Hiding Methodologies for Robust and Secure Steganography with Extensions to Image Forensics
Novel Image Data-Hiding Methodologies for Robust and Secure Steganography with Extensions to Image Forensics
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2017