Abstract
Recently, due to the advance and development of Internet technology and its development, web browsers have become essential applications. A web browser is not only used to surf the Internet, but also plays an important role as a portable operating system. For example, many users edit documents via an online editor and store the documents in an online storage repository. All those tasks are done with the help of a web browser. This results in a large number of attacks on web browsers. Therefore, the security of web browsers has become an increasingly important issue in recent years. Traditionally, when a user surfs on the Internet, his interaction with the browser is recorded. This scenario is called public browsing mode. Through attacking web browsers, attackers can obtain access to surfers’ private information, including surfing habits and passwords. The attackers are able to do this as web browsers always leave cookies, browsing histories and caches on the users’ computers. To avoid malicious attacks, many web browsers have developed private browsing mode mechanisms. In private browsing mode, a user’s behavior is not traced and his private information is retained as well. However, these mechanisms still create files such as bookmarks. Most importantly, the files downloaded through a web browser will be saved to disk unless the user deletes them himself. This is an extremely serious threat to the private security of web users. We designed a mechanism in Windows XP that observes the behaviors and patterns related to the creation and deletion of files in Firefox while in private browsing mode. We then focused on the files which were not deleted, and cleared them by means of anti-forensics manners. In other words, the web browsers can be made comprehensively secure with our mechanism.
Similar content being viewed by others
References
Aggarwal G, Bursztein E, Jackson C, Boneh D (2010) An analysis of private browsing modes in modern browsers. In USENIX Security Symposium, pp 79–94
Barth A, Felt AP, Saxena P, Boodman A (2010) Protecting browsers from extension vulnerabilities. In: 17th Network and Distributed System Security Symposium
Brand M, Valli C, Woodward A (2010) Malware forensics: discovery of the intent of deception. Journal of Digital Forensics, Security & Law 5:31–42
Christodorescu M, Jha S (2003) Static analysis of executables to detect malicious patterns. In: Proceedings of the 12th USENIX Security Symposium (Security’03), pp 169–186
Egele M, Scholte T, Kirda E, Kruegel C (2012) A survey on automated dynamic malware-analysis techniques and tools. ACM Comput Surv (CSUR) vol. 44
Felten EW, Schneider MA (2000) Timing attacks on web privacy. In: Proceedings of the 7th ACM conference on Computer and communications security, pp. 25–32
Harris R (2006) Arriving at an anti-forensics consensus: examining how to define and control the anti-forensics problem. Digit Investig 3:44–49
IBM X-Force (2011) IBM X-Force 2011 Mid-year Trend and Risk Report. [Online]. Available: http://www-935.ibm.com/services/us/iss/xforce/trendreports/
Jana S, Shmatikov V (2012) Memento: learning secrets from process footprints. In: Security and Privacy (SP), 2012 I.E. Symposium on, pp. 143–157
Malin CH, Casey E, Aquilina JM (2008) Malware forensics: investigating and analyzing malicious code. Syngress, Burlington
Microsoft. Detours. [Online]. Available: http://research.microsoft.com/en-us/projects/detours/
Microsoft. Download and Install Debugging Tools for Windows. [Online]. Available: http://msdn.microsoft.com/en-us/windows/hardware/gg463009.aspx
Microsoft. NtCreateFile function. [Online]. Available: http://msdn.microsoft.com/en-us/library/bb432380(v=vs.85).aspx
Microsoft. NtCreateFile routine. [Online]. Available: http://msdn.microsoft.com/en-us/library/windows/hardware/ff566424(v=vs.85).aspx
Microsoft. Using Nt and Zw versions of the native system services routines. [Online]. Available: http://msdn.microsoft.com/en-us/library/windows/hardware/ff565438(v=vs.85).aspx
Mozilla Firefox. Private Browsing - Browse the web without saving information about the sites you visit. [Online]. Available: http://support.mozilla.org/en-US/kb/private-browsing-browse-web-without-saving-info
Nielson C, Nielson F, Nielson R, Hankin (1999) Principles of program analysis. Springer, Secaucus, 450
Qualys Security Labs. MS11-077: from patch to proof-of-concept. [Online]. Available: https://community.qualys.com/blogs/securitylabs/tags/win32k.sys
Saint-Jean F, Johnson A, Boneh D, Feigenbaum J (2007) Private web search. In: Proceedings of the 2007 ACM workshop on Privacy in electronic society, pp. 84–90
Schwartz EJ, Avgerinos T, Brumley D (2010) All you ever wanted to know about dynamic taint analysis and forward symbolic execution. IEEE Symposium on Security and Privacy (SP), pp. 317–331
Shankar U, Karlof C (2006) Doppelganger: better browser privacy without the bother. In Proceedings of the 13th ACM conference on Computer and communications security, pp. 154–167
StatCounter (2011) Top 5 Browsers. [Online]. Available: http://gs.statcounter.com/
The top 500 sites on the web. [Online]. Available: http://www.alexa.com/topsites
Torbutton 1.4.1. [Online]. Available: https://blog.torproject.org/blog/torbutton-141-released
TotalRecal on Firefox. [Online]. Available: https://addons.mozilla.org/en-US/firefox/addon/totalrecall/
Understanding the Import Address Table. [Online]. Available: http://sandsprite.com/CodeStuff/Understanding_imports.html
Zone.Identifier Stream Name. [Online]. Available: http://msdn.microsoft.com/en-us/library/ff469212%28PROT.10%29.aspx
Acknowledgments
This research was partially supported by the National Science Council of the Republic of 518 China under the Grant NSC 100-2221-E-015-001-MY2-, NSC 102-2221-E-015-001-, NSC 101-2221-E-008 -028 -MY2 and NSC 103-2623-E-008-003-D.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Hsu, FH., Wu, MH., Chang, YW. et al. Web security in a windows system as PrivacyDefender in private browsing mode. Multimed Tools Appl 74, 1667–1688 (2015). https://doi.org/10.1007/s11042-014-2003-5
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-014-2003-5