Advancing Web Browser Forensics: Critical Evaluation of Emerging Tools and Techniques

As the use of web browsers continues to grow, the potential for cybercrime and web-related criminal activities also increases. Digital forensic investigators must understand how different browsers function and the critical areas to consider during web forensic analysis. Web forensics, a subfield of...

Full description

Saved in:
Bibliographic Details
Published in:SN computer science Vol. 6; no. 4; p. 355
Main Authors: Chand, Rishal Ravikesh, Sharma, Neeraj Anand, Kabir, Muhammad Ashad
Format: Journal Article
Language:English
Published: Singapore Springer Nature Singapore 05.04.2025
Springer Nature B.V
Subjects:
ISSN:2661-8907, 2662-995X, 2661-8907
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Abstract As the use of web browsers continues to grow, the potential for cybercrime and web-related criminal activities also increases. Digital forensic investigators must understand how different browsers function and the critical areas to consider during web forensic analysis. Web forensics, a subfield of digital forensics, involves collecting and analyzing browser artifacts, such as browser history, search keywords, and downloads, which serve as potential evidence. While existing research has provided valuable insights, many studies focus on individual browsing modes or limited forensic scenarios, leaving gaps in understanding the full scope of data retention and recovery across different modes and browsers. This paper addresses these gaps by defining four browsing scenarios and critically analyzing browser artifacts across normal, private, and portable modes using various forensic tools. We define four browsing scenarios to perform a comprehensive evaluation of popular browsers—Google Chrome, Mozilla Firefox, Brave, Tor, and Microsoft Edge—by monitoring changes in key data storage areas such as cache files, cookies, browsing history, and local storage across different browsing modes. Overall, this paper contributes to a deeper understanding of browser forensic analysis and identifies key areas for enhancing privacy protection and forensic methodologies.
AbstractList As the use of web browsers continues to grow, the potential for cybercrime and web-related criminal activities also increases. Digital forensic investigators must understand how different browsers function and the critical areas to consider during web forensic analysis. Web forensics, a subfield of digital forensics, involves collecting and analyzing browser artifacts, such as browser history, search keywords, and downloads, which serve as potential evidence. While existing research has provided valuable insights, many studies focus on individual browsing modes or limited forensic scenarios, leaving gaps in understanding the full scope of data retention and recovery across different modes and browsers. This paper addresses these gaps by defining four browsing scenarios and critically analyzing browser artifacts across normal, private, and portable modes using various forensic tools. We define four browsing scenarios to perform a comprehensive evaluation of popular browsers—Google Chrome, Mozilla Firefox, Brave, Tor, and Microsoft Edge—by monitoring changes in key data storage areas such as cache files, cookies, browsing history, and local storage across different browsing modes. Overall, this paper contributes to a deeper understanding of browser forensic analysis and identifies key areas for enhancing privacy protection and forensic methodologies.
ArticleNumber 355
Author Chand, Rishal Ravikesh
Kabir, Muhammad Ashad
Sharma, Neeraj Anand
Author_xml – sequence: 1
  givenname: Rishal Ravikesh
  surname: Chand
  fullname: Chand, Rishal Ravikesh
  organization: Department of Computer Science and Mathematics, The University of Fiji
– sequence: 2
  givenname: Neeraj Anand
  surname: Sharma
  fullname: Sharma, Neeraj Anand
  organization: Department of Computer Science and Mathematics, The University of Fiji
– sequence: 3
  givenname: Muhammad Ashad
  orcidid: 0000-0002-6798-6535
  surname: Kabir
  fullname: Kabir, Muhammad Ashad
  email: akabir@csu.edu.au
  organization: School of Computing, Mathematics and Engineering, Charles Sturt University
BookMark eNp9kE1PAjEURRuDiYj8AVdNXI_2i87UHRJQExI3EJdNW15xyNBiCxj_vYNjoitX7y3OuTe5l6gXYgCErim5pYSUd1kwVaqCsFFBuGK0kGeoz6SkRaVI2fvzX6BhzhtCWpQIIUd9tByvjia4OqzxK1j8kOJHhoRnMUHItcv3eJLqfe1Mg6dH0xzMvo4BR4-nW0jrk7aIscnYhBVegHsL9fsB8hU696bJMPy5A7ScTReTp2L-8vg8Gc8LxziVBRXMcwCquDUghBMrZ4CW3oFiylccLAhnpJfe2hGhzlTG2ZJaXhLLiHR8gG663F2Kp9693sRDCm2l5rSSsmKK8JZiHeVSzDmB17tUb0361JTo04K6W1C3s-jvBbVsJd5JuYXDGtJv9D_WF88_dgQ
Cites_doi 10.1109/ICCIC.2017.8524412
10.1109/CyberSec.2021.9395432
10.1016/j.jisa.2024.103839
10.1109/SWS.2010.5607355
10.3969/j.issn.1002-1661.2022.01.010
10.1016/J.COSE.2023.103425
10.1016/J.DIIN.2022.10.002
10.1007/978-981-15-9516-5_23
10.1109/CSIT.2013.6588754
10.1109/ACCESS.2022.3142508
10.2341/IJDE.2023.15.1.045
10.1016/J.FORSCIINT.2019.03.030
10.1007/978-3-319-23276-8_9/COVER
10.1016/J.COSE.2022.102626
10.1109/PST.2018.8440762
10.3233/JCS-160702
10.51584/IJRIAS.2021.6506
10.1177/2042276021992348
10.1080/23742917.2020.1789765
10.1109/ICACCI.2017.8126191
10.1007/978-3-030-23547-5_12
10.15394/jdfsl.2019.1546
10.1016/J.COSE.2024.103784
10.1109/ICCIC.2013.6724210
10.1016/J.FSIDI.2022.301479
10.1109/CDAN.2016.7570957
10.1109/ITSEC.2019.8867736
ContentType Journal Article
Copyright The Author(s) 2025
Copyright Springer Nature B.V. Apr 2025
Copyright_xml – notice: The Author(s) 2025
– notice: Copyright Springer Nature B.V. Apr 2025
DBID C6C
AAYXX
CITATION
JQ2
DOI 10.1007/s42979-025-03921-6
DatabaseName Springer Nature OA Free Journals
CrossRef
ProQuest Computer Science Collection
DatabaseTitle CrossRef
ProQuest Computer Science Collection
DatabaseTitleList
CrossRef
ProQuest Computer Science Collection
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISSN 2661-8907
ExternalDocumentID 10_1007_s42979_025_03921_6
GrantInformation_xml – fundername: Charles Sturt University
GroupedDBID 0R~
406
AACDK
AAHNG
AAJBT
AASML
AATNV
AAUYE
ABAKF
ABBRH
ABDBE
ABECU
ABHQN
ABJNI
ABMQK
ABTEG
ABTKH
ABWNU
ACAOD
ACDTI
ACHSB
ACOKC
ACPIV
ACZOJ
ADKFA
ADKNI
ADTPH
ADYFF
AEFQL
AEMSY
AESKC
AFBBN
AFDZB
AFQWF
AGMZJ
AGQEE
AGRTI
AHPBZ
AIGIU
AILAN
AJZVZ
ALMA_UNASSIGNED_HOLDINGS
AMXSW
AMYLF
AYFIA
BAPOH
BSONS
C6C
DPUIP
EBLON
EBS
FIGPU
FNLPD
GGCAI
GNWQR
IKXTQ
IWAJR
JZLTJ
LLZTM
NPVJJ
NQJWS
PT4
ROL
RSV
SJYHP
SNE
SOJ
SRMVM
SSLCW
UOJIU
UTJUX
ZMTXR
2JN
AAYXX
ABFSG
ABRTQ
ACSTC
AEZWR
AFHIU
AFOHR
AHWEU
AIXLP
ATHPR
CITATION
KOV
JQ2
ID FETCH-LOGICAL-c2316-142f3ee193bae44c4dcae17fce929f83ebe4ca6f6fbb501ca8acb71b370b206c3
IEDL.DBID RSV
ISSN 2661-8907
2662-995X
IngestDate Wed Nov 05 14:47:14 EST 2025
Sat Nov 29 08:03:34 EST 2025
Sun Apr 06 01:11:36 EDT 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 4
Keywords Forensics tool
Cybercrime
Browser artifacts
Digital forensics
Web browser
Browser forensics
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c2316-142f3ee193bae44c4dcae17fce929f83ebe4ca6f6fbb501ca8acb71b370b206c3
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0002-6798-6535
OpenAccessLink https://link.springer.com/10.1007/s42979-025-03921-6
PQID 3186682903
PQPubID 6623307
ParticipantIDs proquest_journals_3186682903
crossref_primary_10_1007_s42979_025_03921_6
springer_journals_10_1007_s42979_025_03921_6
PublicationCentury 2000
PublicationDate 20250405
PublicationDateYYYYMMDD 2025-04-05
PublicationDate_xml – month: 4
  year: 2025
  text: 20250405
  day: 5
PublicationDecade 2020
PublicationPlace Singapore
PublicationPlace_xml – name: Singapore
– name: Kolkata
PublicationTitle SN computer science
PublicationTitleAbbrev SN COMPUT. SCI
PublicationYear 2025
Publisher Springer Nature Singapore
Springer Nature B.V
Publisher_xml – name: Springer Nature Singapore
– name: Springer Nature B.V
References 3921_CR9
AR Javed (3921_CR37) 2022; 10
M Allen (3921_CR23) 2022; 35
X Fernández-Fuentes (3921_CR6) 2022; 115
3921_CR18
L Zhang (3921_CR21) 2022; 23
X Fernández-Fuentes (3921_CR4) 2023; 134
M Davis (3921_CR19) 2016; 20
A Rasool (3921_CR33) 2020; 1
C Lewis (3921_CR24) 2020; 4
3921_CR30
GB Akintola (3921_CR35) 2024; 10
3921_CR31
AK Jadoon (3921_CR40) 2019; 299
3921_CR14
3921_CR2
3921_CR15
3921_CR3
3921_CR16
3921_CR38
3921_CR17
3921_CR10
3921_CR32
K Gupta (3921_CR1) 2023; 44
3921_CR11
3921_CR7
3921_CR12
3921_CR34
3921_CR8
3921_CR13
B Jones (3921_CR22) 2023; 15
3921_CR29
A Raza (3921_CR39) 2024; 85
K Radivojevic (3921_CR5) 2024; 140
3921_CR41
3921_CR20
3921_CR42
A Martinez (3921_CR25) 2021; 25
A Raza (3921_CR36) 2024; 85
3921_CR26
3921_CR27
3921_CR28
References_xml – ident: 3921_CR2
  doi: 10.1109/ICCIC.2017.8524412
– ident: 3921_CR27
  doi: 10.1109/CyberSec.2021.9395432
– ident: 3921_CR31
– ident: 3921_CR12
– volume: 1
  start-page: 15
  issue: 1
  year: 2020
  ident: 3921_CR33
  publication-title: Researchpedia J Comput
– volume: 85
  year: 2024
  ident: 3921_CR39
  publication-title: J Inf Secur Appl
  doi: 10.1016/j.jisa.2024.103839
– ident: 3921_CR10
  doi: 10.1109/SWS.2010.5607355
– volume: 23
  start-page: 101
  issue: 1
  year: 2022
  ident: 3921_CR21
  publication-title: J Internet Technol
  doi: 10.3969/j.issn.1002-1661.2022.01.010
– volume: 134
  year: 2023
  ident: 3921_CR4
  publication-title: Comput Secur
  doi: 10.1016/J.COSE.2023.103425
– ident: 3921_CR7
– volume: 85
  year: 2024
  ident: 3921_CR36
  publication-title: J Inf Secur Appl
– volume: 35
  start-page: 104
  year: 2022
  ident: 3921_CR23
  publication-title: Dig Investig
  doi: 10.1016/J.DIIN.2022.10.002
– ident: 3921_CR16
– ident: 3921_CR42
  doi: 10.1007/978-981-15-9516-5_23
– ident: 3921_CR8
  doi: 10.1109/CSIT.2013.6588754
– ident: 3921_CR28
– volume: 10
  start-page: 11065
  year: 2022
  ident: 3921_CR37
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2022.3142508
– volume: 15
  start-page: 45
  issue: 1
  year: 2023
  ident: 3921_CR22
  publication-title: Int J Dig Evid
  doi: 10.2341/IJDE.2023.15.1.045
– volume: 299
  start-page: 59
  year: 2019
  ident: 3921_CR40
  publication-title: Forensic Sci Int.
  doi: 10.1016/J.FORSCIINT.2019.03.030
– ident: 3921_CR41
  doi: 10.1007/978-3-319-23276-8_9/COVER
– volume: 115
  year: 2022
  ident: 3921_CR6
  publication-title: Comput Secur
  doi: 10.1016/J.COSE.2022.102626
– ident: 3921_CR20
  doi: 10.1109/PST.2018.8440762
– ident: 3921_CR13
– ident: 3921_CR30
– ident: 3921_CR15
– volume: 20
  start-page: 301
  issue: 3
  year: 2016
  ident: 3921_CR19
  publication-title: J Comput Secur
  doi: 10.3233/JCS-160702
– ident: 3921_CR32
– ident: 3921_CR34
  doi: 10.51584/IJRIAS.2021.6506
– volume: 25
  start-page: 189
  issue: 3
  year: 2021
  ident: 3921_CR25
  publication-title: J Internet Secur
  doi: 10.1177/2042276021992348
– ident: 3921_CR38
– volume: 4
  start-page: 123
  issue: 2
  year: 2020
  ident: 3921_CR24
  publication-title: J Cyber Secur Technol
  doi: 10.1080/23742917.2020.1789765
– ident: 3921_CR11
  doi: 10.1109/ICACCI.2017.8126191
– ident: 3921_CR3
  doi: 10.1007/978-3-030-23547-5_12
– ident: 3921_CR18
  doi: 10.15394/jdfsl.2019.1546
– volume: 140
  year: 2024
  ident: 3921_CR5
  publication-title: Comput Secur
  doi: 10.1016/J.COSE.2024.103784
– ident: 3921_CR17
– volume: 10
  start-page: 68
  issue: 10
  year: 2024
  ident: 3921_CR35
  publication-title: Int J Sci Res Multidiscip Stud
– ident: 3921_CR9
  doi: 10.1109/ICCIC.2013.6724210
– ident: 3921_CR29
– volume: 44
  year: 2023
  ident: 3921_CR1
  publication-title: Forensic Sci Int Dig Investig
  doi: 10.1016/J.FSIDI.2022.301479
– ident: 3921_CR14
  doi: 10.1109/CDAN.2016.7570957
– ident: 3921_CR26
  doi: 10.1109/ITSEC.2019.8867736
SSID ssj0002504465
Score 2.287376
Snippet As the use of web browsers continues to grow, the potential for cybercrime and web-related criminal activities also increases. Digital forensic investigators...
SourceID proquest
crossref
springer
SourceType Aggregation Database
Index Database
Publisher
StartPage 355
SubjectTerms Browsing
Computer forensics
Computer Imaging
Computer Science
Computer Systems Organization and Communication Networks
Crime
Criminal investigations
Cybercrime
Data recovery
Data storage
Data Structures and Information Theory
Evidence
Forensic computing
Forensic sciences
Information Systems and Communication Service
Internet
JavaScript
Malware
Original Research
Pattern Recognition and Graphics
Privacy
Software Engineering/Programming and Operating Systems
User behavior
User interface
Vision
Web browsers
Title Advancing Web Browser Forensics: Critical Evaluation of Emerging Tools and Techniques
URI https://link.springer.com/article/10.1007/s42979-025-03921-6
https://www.proquest.com/docview/3186682903
Volume 6
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVAVX
  databaseName: SpringerLINK Contemporary 1997-Present
  customDbUrl:
  eissn: 2661-8907
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0002504465
  issn: 2661-8907
  databaseCode: RSV
  dateStart: 20190101
  isFulltext: true
  titleUrlDefault: https://link.springer.com/search?facet-content-type=%22Journal%22
  providerName: Springer Nature
– providerCode: PRVAVX
  databaseName: SpringerLINK Contemporary 1997-Present
  customDbUrl:
  eissn: 2661-8907
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0002504465
  issn: 2661-8907
  databaseCode: RSV
  dateStart: 20200101
  isFulltext: true
  titleUrlDefault: https://link.springer.com/search?facet-content-type=%22Journal%22
  providerName: Springer Nature
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV09T8MwED1BYWChfIpCQR7YwFIcO07MhlARU4WghW5R7NgSEkpQU_j92G6cCgQDzEms6O589_xx7wGci8RxrguOaUwVZokusTBxgjPNFSNa2rhmXmwiHY-z2Uzct01hTbjtHo4kfabumt1s5kwFdvKrkS3qBPN12LDlLnOCDQ-PT93OiiPlYjxpO2R-_vRrFVpBy2-nob7I3Pb_93s7sN2CSnS9jIJdWNPVHvSDYANq5-8-TL2GsrLDomctkVuC2whETp6zst5qrlBQPkCjjgUc1Qa5rSunZoQmdf3aoKIq0SSQvzYHML0dTW7ucKurgJVFcxwTFhuqtYVustCMKVaqQpPUKG2xksmo9StTBTfcSJlERBVZoWRKJE0jGUdc0UPoVXWljwBRmyszzSwGEHadR4jQaUqpEsYxyxWqHMBFsHP-tqTPyDuiZG-x3Fos9xbL-QCGwRV5O5WanDpKPnfcSwdwGUy_evz7aMd_e_0EtmLvPYajZAi9xfxdn8Km-li8NPMzH2KfEM_L5Q
linkProvider Springer Nature
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3PS8MwFH7oFPTi_InTqTl400DbpGnrTWRj4hyinXoLTZaCIK2s07_fJGs6FD3ouW0o77289-XH-z6A0yQ0nOsJwyQgEtNQTXCSByGOFZPUV0LHNbViE9FoFD8_J3d1U1jlbru7I0mbqZtmN505owQb-VVPF3Ufs2VYobpiGcb8-4fHZmfFkHJRFtYdMj9_-rUKLaDlt9NQW2T67f_93iZs1KASXc6jYAuWVLENbSfYgOr5uwNjq6Es9bDoSQlkluA6ApGR5yy0t6oL5JQPUK9hAUdljszWlVEzQmlZvlYoKyYodeSv1S6M-730aoBrXQUsNZpj2KdBTpTS0E1kilJJJzJTfpRLpbFSHhPtVyozlrNciNDzZRZnUkS-IJEnAo9JsgetoizUPiCic2WsqMYAiV7n-X6ioogQmeSGWS6Tkw6cOTvztzl9Bm-Ikq3FuLYYtxbjrANd5wpeT6WKE0PJZ457SQfOnekXj38f7eBvr5_A2iC9HfLh9ejmENYD60mKvbALrdn0XR3BqvyYvVTTYxtun6ldzsk
linkToPdf http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV3PS8MwFH7oFPHi_InTqTl402DTpGnjTXRDUcbATXcLbZqAIO1Yp3-_SdduKnoQz_3Jey95X_Lyvg_gVASOc11wTH2qMAt0ioXxAxxprhjRiY1rVopNhL1eNBqJ_qcu_vK0e12SnPU0OJambHoxTs3FvPHNzqKhwE6K1bMJnmC-DCvMHaR36_XHp_kuiyPoYjyoumV-fvRrRlrAzG-V0TLhdJv__9VN2KjAJrqaRccWLOlsG5q1kAOqxvUODEttZWU_gZ51gtzS3EYmcrKdmfVicYlqRQTUmbODo9wgt6XlVI7QIM9fCxRnKRrUpLDFLgy7ncH1La70FrCyKI9jwnxDtbaQLok1Y4qlKtYkNEpbDGUiav3NVMwNN0kSeETFUaySkCQ09BLf44ruQSPLM70PiNo5NNLMYgNh13-ECB2GlCphHONcrNIWnNU2l-MZrYacEyiXFpPWYrK0mOQtaNdukdUQKyR1VH2uDExbcF67YXH597cd_O32E1jr33Tlw13v_hDW_dKRDHtBGxrTyZs-glX1Pn0pJsdl5H0AK23XrQ
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Advancing+Web+Browser+Forensics%3A+Critical+Evaluation+of+Emerging+Tools+and+Techniques&rft.jtitle=SN+computer+science&rft.au=Chand%2C+Rishal+Ravikesh&rft.au=Sharma%2C+Neeraj+Anand&rft.au=Kabir%2C+Muhammad+Ashad&rft.date=2025-04-05&rft.pub=Springer+Nature+Singapore&rft.eissn=2661-8907&rft.volume=6&rft.issue=4&rft_id=info:doi/10.1007%2Fs42979-025-03921-6&rft.externalDocID=10_1007_s42979_025_03921_6
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2661-8907&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2661-8907&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2661-8907&client=summon