2017
DOI: 10.5120/ijca2017913717
|View full text |Cite
|
Sign up to set email alerts
|

Live Forensics for Anti-Forensics Analysis on Private Portable Web Browser

Abstract: Almost all aspects of life already use the internet, to be able to access the Internet one of them using a web browser. For security, some web browser features to develop private mode. Unfortunately, from this feature, by some unscrupulous used for criminal activities by the anti-forensics. An anti-forensics process such as by using a portable web browser and delete registry. Motivation use of anti-forensics is to minimize or inhibit the discovery of digital evidence in criminal cases. So that, be an obstacle … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
6
0
5

Year Published

2018
2018
2022
2022

Publication Types

Select...
6

Relationship

4
2

Authors

Journals

citations
Cited by 13 publications
(11 citation statements)
references
References 8 publications
(10 reference statements)
0
6
0
5
Order By: Relevance
“…Kejahatan dunia maya semakin meningkat setiap tahunnya [3] [4]. Internet juga telah merubah gaya hidup masyarakat baik dari sosial, Pendidikan bahkan pemerintah [5]. Dampak buruk yang dihasilkan dari penggunaan teknologi ini adalah penyalahgunaan dalam melakukan kejahatan.…”
Section: Pendahuluanunclassified
“…Kejahatan dunia maya semakin meningkat setiap tahunnya [3] [4]. Internet juga telah merubah gaya hidup masyarakat baik dari sosial, Pendidikan bahkan pemerintah [5]. Dampak buruk yang dihasilkan dari penggunaan teknologi ini adalah penyalahgunaan dalam melakukan kejahatan.…”
Section: Pendahuluanunclassified
“…RAM is a temporary storage place when the computer system is running and can be accessed quickly [7] [8]. Therefore handling data and information on RAM must be done quickly and carefully because the data and information will be lost if the system dies [9]. This quick and careful handling is done so that the data and information contained in RAM that has the potential to become digital evidence can be obtained [10].…”
Section: Introductionmentioning
confidence: 99%
“…Other research conducted by Tri Rochmadi, Imam Riadi and Yudi Prayudi [9] who used anti-forensics to complicate investigators in the investigation process. The anti-forensics process is carried out such as using a portable web browser that provides private mode features and deletes the registry.…”
mentioning
confidence: 99%
“…On the other hand, Rochmadi, et al conducted research on the theme of the live forensics method in RAM for anti-forensic analysis in portable web browser private mode [20]. Other research on RAM extraction in Windows 7 was conducted by Thomas, et al The research explained the methodology for listing running processes, loading DLLs, and extracting memory processes from running processes [21].…”
mentioning
confidence: 99%