Advancing Web Browser Forensics: Critical Evaluation of Emerging Tools and Techniques Article Swipe
YOU?
·
· 2025
· Open Access
·
· DOI: https://doi.org/10.1007/s42979-025-03921-6
As the use of web browsers continues to grow, the potential for cybercrime and web-related criminal activities also increases. Digital forensic investigators must understand how different browsers function and the critical areas to consider during web forensic analysis. Web forensics, a subfield of digital forensics, involves collecting and analyzing browser artifacts, such as browser history, search keywords, and downloads, which serve as potential evidence. While existing research has provided valuable insights, many studies focus on individual browsing modes or limited forensic scenarios, leaving gaps in understanding the full scope of data retention and recovery across different modes and browsers. This paper addresses these gaps by defining four browsing scenarios and critically analyzing browser artifacts across normal, private, and portable modes using various forensic tools. We define four browsing scenarios to perform a comprehensive evaluation of popular browsers—Google Chrome, Mozilla Firefox, Brave, Tor, and Microsoft Edge—by monitoring changes in key data storage areas such as cache files, cookies, browsing history, and local storage across different browsing modes. Overall, this paper contributes to a deeper understanding of browser forensic analysis and identifies key areas for enhancing privacy protection and forensic methodologies.
Related Topics
- Type
- article
- Language
- en
- Landing Page
- https://doi.org/10.1007/s42979-025-03921-6
- https://link.springer.com/content/pdf/10.1007/s42979-025-03921-6.pdf
- OA Status
- hybrid
- References
- 17
- Related Works
- 10
- OpenAlex ID
- https://openalex.org/W4409191816
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W4409191816Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.1007/s42979-025-03921-6Digital Object Identifier
- Title
-
Advancing Web Browser Forensics: Critical Evaluation of Emerging Tools and TechniquesWork title
- Type
-
articleOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2025Year of publication
- Publication date
-
2025-04-05Full publication date if available
- Authors
-
Rishal Ravikesh Chand, Neeraj Anand Sharma, Muhammad Ashad KabirList of authors in order
- Landing page
-
https://doi.org/10.1007/s42979-025-03921-6Publisher landing page
- PDF URL
-
https://link.springer.com/content/pdf/10.1007/s42979-025-03921-6.pdfDirect link to full text PDF
- Open access
-
YesWhether a free full text is available
- OA status
-
hybridOpen access status per OpenAlex
- OA URL
-
https://link.springer.com/content/pdf/10.1007/s42979-025-03921-6.pdfDirect OA link when available
- Concepts
-
Computer science, World Wide Web, Web browser, Data science, The InternetTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
0Total citation count in OpenAlex
- References (count)
-
17Number of works referenced by this work
- Related works (count)
-
10Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W4409191816 |
|---|---|
| doi | https://doi.org/10.1007/s42979-025-03921-6 |
| ids.doi | https://doi.org/10.1007/s42979-025-03921-6 |
| ids.openalex | https://openalex.org/W4409191816 |
| fwci | 0.0 |
| type | article |
| title | Advancing Web Browser Forensics: Critical Evaluation of Emerging Tools and Techniques |
| biblio.issue | 4 |
| biblio.volume | 6 |
| biblio.last_page | |
| biblio.first_page | |
| topics[0].id | https://openalex.org/T12034 |
| topics[0].field.id | https://openalex.org/fields/17 |
| topics[0].field.display_name | Computer Science |
| topics[0].score | 1.0 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/1710 |
| topics[0].subfield.display_name | Information Systems |
| topics[0].display_name | Digital and Cyber Forensics |
| topics[1].id | https://openalex.org/T11241 |
| topics[1].field.id | https://openalex.org/fields/17 |
| topics[1].field.display_name | Computer Science |
| topics[1].score | 0.9998999834060669 |
| topics[1].domain.id | https://openalex.org/domains/3 |
| topics[1].domain.display_name | Physical Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/1711 |
| topics[1].subfield.display_name | Signal Processing |
| topics[1].display_name | Advanced Malware Detection Techniques |
| topics[2].id | https://openalex.org/T11598 |
| topics[2].field.id | https://openalex.org/fields/17 |
| topics[2].field.display_name | Computer Science |
| topics[2].score | 0.9988999962806702 |
| topics[2].domain.id | https://openalex.org/domains/3 |
| topics[2].domain.display_name | Physical Sciences |
| topics[2].subfield.id | https://openalex.org/subfields/1702 |
| topics[2].subfield.display_name | Artificial Intelligence |
| topics[2].display_name | Internet Traffic Analysis and Secure E-voting |
| funders[0].id | https://openalex.org/F4320320961 |
| funders[0].ror | https://ror.org/00wfvh315 |
| funders[0].display_name | Charles Sturt University |
| is_xpac | False |
| apc_list.value | 2290 |
| apc_list.currency | EUR |
| apc_list.value_usd | 2890 |
| apc_paid.value | 2290 |
| apc_paid.currency | EUR |
| apc_paid.value_usd | 2890 |
| concepts[0].id | https://openalex.org/C41008148 |
| concepts[0].level | 0 |
| concepts[0].score | 0.6177878379821777 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[0].display_name | Computer science |
| concepts[1].id | https://openalex.org/C136764020 |
| concepts[1].level | 1 |
| concepts[1].score | 0.5543326139450073 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q466 |
| concepts[1].display_name | World Wide Web |
| concepts[2].id | https://openalex.org/C2983909278 |
| concepts[2].level | 3 |
| concepts[2].score | 0.46272721886634827 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q6368 |
| concepts[2].display_name | Web browser |
| concepts[3].id | https://openalex.org/C2522767166 |
| concepts[3].level | 1 |
| concepts[3].score | 0.4127342700958252 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q2374463 |
| concepts[3].display_name | Data science |
| concepts[4].id | https://openalex.org/C110875604 |
| concepts[4].level | 2 |
| concepts[4].score | 0.3465590178966522 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q75 |
| concepts[4].display_name | The Internet |
| keywords[0].id | https://openalex.org/keywords/computer-science |
| keywords[0].score | 0.6177878379821777 |
| keywords[0].display_name | Computer science |
| keywords[1].id | https://openalex.org/keywords/world-wide-web |
| keywords[1].score | 0.5543326139450073 |
| keywords[1].display_name | World Wide Web |
| keywords[2].id | https://openalex.org/keywords/web-browser |
| keywords[2].score | 0.46272721886634827 |
| keywords[2].display_name | Web browser |
| keywords[3].id | https://openalex.org/keywords/data-science |
| keywords[3].score | 0.4127342700958252 |
| keywords[3].display_name | Data science |
| keywords[4].id | https://openalex.org/keywords/the-internet |
| keywords[4].score | 0.3465590178966522 |
| keywords[4].display_name | The Internet |
| language | en |
| locations[0].id | doi:10.1007/s42979-025-03921-6 |
| locations[0].is_oa | True |
| locations[0].source.id | https://openalex.org/S4210174798 |
| locations[0].source.issn | 2661-8907, 2662-995X |
| locations[0].source.type | journal |
| locations[0].source.is_oa | False |
| locations[0].source.issn_l | 2661-8907 |
| locations[0].source.is_core | True |
| locations[0].source.is_in_doaj | False |
| locations[0].source.display_name | SN Computer Science |
| locations[0].source.host_organization | https://openalex.org/P4310319965 |
| locations[0].source.host_organization_name | Springer Nature |
| locations[0].source.host_organization_lineage | https://openalex.org/P4310319965 |
| locations[0].source.host_organization_lineage_names | Springer Nature |
| locations[0].license | cc-by |
| locations[0].pdf_url | https://link.springer.com/content/pdf/10.1007/s42979-025-03921-6.pdf |
| locations[0].version | publishedVersion |
| locations[0].raw_type | journal-article |
| locations[0].license_id | https://openalex.org/licenses/cc-by |
| locations[0].is_accepted | True |
| locations[0].is_published | True |
| locations[0].raw_source_name | SN Computer Science |
| locations[0].landing_page_url | https://doi.org/10.1007/s42979-025-03921-6 |
| indexed_in | crossref |
| authorships[0].author.id | https://openalex.org/A5045149266 |
| authorships[0].author.orcid | https://orcid.org/0000-0002-2664-6243 |
| authorships[0].author.display_name | Rishal Ravikesh Chand |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | Rishal Ravikesh Chand |
| authorships[0].is_corresponding | False |
| authorships[1].author.id | https://openalex.org/A5079126330 |
| authorships[1].author.orcid | https://orcid.org/0000-0002-0405-3308 |
| authorships[1].author.display_name | Neeraj Anand Sharma |
| authorships[1].author_position | middle |
| authorships[1].raw_author_name | Neeraj Anand Sharma |
| authorships[1].is_corresponding | False |
| authorships[2].author.id | https://openalex.org/A5085181943 |
| authorships[2].author.orcid | https://orcid.org/0000-0002-6798-6535 |
| authorships[2].author.display_name | Muhammad Ashad Kabir |
| authorships[2].author_position | last |
| authorships[2].raw_author_name | Muhammad Ashad Kabir |
| authorships[2].is_corresponding | False |
| has_content.pdf | True |
| has_content.grobid_xml | True |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://link.springer.com/content/pdf/10.1007/s42979-025-03921-6.pdf |
| open_access.oa_status | hybrid |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-10-10T00:00:00 |
| display_name | Advancing Web Browser Forensics: Critical Evaluation of Emerging Tools and Techniques |
| has_fulltext | False |
| is_retracted | False |
| updated_date | 2025-11-06T03:46:38.306776 |
| primary_topic.id | https://openalex.org/T12034 |
| primary_topic.field.id | https://openalex.org/fields/17 |
| primary_topic.field.display_name | Computer Science |
| primary_topic.score | 1.0 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/1710 |
| primary_topic.subfield.display_name | Information Systems |
| primary_topic.display_name | Digital and Cyber Forensics |
| related_works | https://openalex.org/W2748952813, https://openalex.org/W4254303646, https://openalex.org/W1540003828, https://openalex.org/W2287572233, https://openalex.org/W2443963150, https://openalex.org/W2489547187, https://openalex.org/W1533121303, https://openalex.org/W3014218496, https://openalex.org/W569963976, https://openalex.org/W569541443 |
| cited_by_count | 0 |
| locations_count | 1 |
| best_oa_location.id | doi:10.1007/s42979-025-03921-6 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S4210174798 |
| best_oa_location.source.issn | 2661-8907, 2662-995X |
| best_oa_location.source.type | journal |
| best_oa_location.source.is_oa | False |
| best_oa_location.source.issn_l | 2661-8907 |
| best_oa_location.source.is_core | True |
| best_oa_location.source.is_in_doaj | False |
| best_oa_location.source.display_name | SN Computer Science |
| best_oa_location.source.host_organization | https://openalex.org/P4310319965 |
| best_oa_location.source.host_organization_name | Springer Nature |
| best_oa_location.source.host_organization_lineage | https://openalex.org/P4310319965 |
| best_oa_location.source.host_organization_lineage_names | Springer Nature |
| best_oa_location.license | cc-by |
| best_oa_location.pdf_url | https://link.springer.com/content/pdf/10.1007/s42979-025-03921-6.pdf |
| best_oa_location.version | publishedVersion |
| best_oa_location.raw_type | journal-article |
| best_oa_location.license_id | https://openalex.org/licenses/cc-by |
| best_oa_location.is_accepted | True |
| best_oa_location.is_published | True |
| best_oa_location.raw_source_name | SN Computer Science |
| best_oa_location.landing_page_url | https://doi.org/10.1007/s42979-025-03921-6 |
| primary_location.id | doi:10.1007/s42979-025-03921-6 |
| primary_location.is_oa | True |
| primary_location.source.id | https://openalex.org/S4210174798 |
| primary_location.source.issn | 2661-8907, 2662-995X |
| primary_location.source.type | journal |
| primary_location.source.is_oa | False |
| primary_location.source.issn_l | 2661-8907 |
| primary_location.source.is_core | True |
| primary_location.source.is_in_doaj | False |
| primary_location.source.display_name | SN Computer Science |
| primary_location.source.host_organization | https://openalex.org/P4310319965 |
| primary_location.source.host_organization_name | Springer Nature |
| primary_location.source.host_organization_lineage | https://openalex.org/P4310319965 |
| primary_location.source.host_organization_lineage_names | Springer Nature |
| primary_location.license | cc-by |
| primary_location.pdf_url | https://link.springer.com/content/pdf/10.1007/s42979-025-03921-6.pdf |
| primary_location.version | publishedVersion |
| primary_location.raw_type | journal-article |
| primary_location.license_id | https://openalex.org/licenses/cc-by |
| primary_location.is_accepted | True |
| primary_location.is_published | True |
| primary_location.raw_source_name | SN Computer Science |
| primary_location.landing_page_url | https://doi.org/10.1007/s42979-025-03921-6 |
| publication_date | 2025-04-05 |
| publication_year | 2025 |
| referenced_works | https://openalex.org/W4310255174, https://openalex.org/W2900312859, https://openalex.org/W2963376995, https://openalex.org/W4385804402, https://openalex.org/W4392245356, https://openalex.org/W4206936646, https://openalex.org/W2109340222, https://openalex.org/W2545429830, https://openalex.org/W1999551205, https://openalex.org/W2774856619, https://openalex.org/W2520873937, https://openalex.org/W2992211735, https://openalex.org/W3176982126, https://openalex.org/W4401528889, https://openalex.org/W4210783895, https://openalex.org/W2922545377, https://openalex.org/W3123750459 |
| referenced_works_count | 17 |
| abstract_inverted_index.a | 41, 132, 172 |
| abstract_inverted_index.As | 1 |
| abstract_inverted_index.We | 125 |
| abstract_inverted_index.as | 53, 62, 154 |
| abstract_inverted_index.by | 105 |
| abstract_inverted_index.in | 85, 148 |
| abstract_inverted_index.of | 4, 43, 90, 135, 175 |
| abstract_inverted_index.on | 75 |
| abstract_inverted_index.or | 79 |
| abstract_inverted_index.to | 8, 33, 130, 171 |
| abstract_inverted_index.Web | 39 |
| abstract_inverted_index.and | 14, 29, 48, 58, 93, 98, 110, 118, 143, 160, 179, 187 |
| abstract_inverted_index.for | 12, 183 |
| abstract_inverted_index.has | 68 |
| abstract_inverted_index.how | 25 |
| abstract_inverted_index.key | 149, 181 |
| abstract_inverted_index.the | 2, 10, 30, 87 |
| abstract_inverted_index.use | 3 |
| abstract_inverted_index.web | 5, 36 |
| abstract_inverted_index.This | 100 |
| abstract_inverted_index.Tor, | 142 |
| abstract_inverted_index.also | 18 |
| abstract_inverted_index.data | 91, 150 |
| abstract_inverted_index.four | 107, 127 |
| abstract_inverted_index.full | 88 |
| abstract_inverted_index.gaps | 84, 104 |
| abstract_inverted_index.many | 72 |
| abstract_inverted_index.must | 23 |
| abstract_inverted_index.such | 52, 153 |
| abstract_inverted_index.this | 168 |
| abstract_inverted_index.While | 65 |
| abstract_inverted_index.areas | 32, 152, 182 |
| abstract_inverted_index.cache | 155 |
| abstract_inverted_index.focus | 74 |
| abstract_inverted_index.grow, | 9 |
| abstract_inverted_index.local | 161 |
| abstract_inverted_index.modes | 78, 97, 120 |
| abstract_inverted_index.paper | 101, 169 |
| abstract_inverted_index.scope | 89 |
| abstract_inverted_index.serve | 61 |
| abstract_inverted_index.these | 103 |
| abstract_inverted_index.using | 121 |
| abstract_inverted_index.which | 60 |
| abstract_inverted_index.Brave, | 141 |
| abstract_inverted_index.across | 95, 115, 163 |
| abstract_inverted_index.deeper | 173 |
| abstract_inverted_index.define | 126 |
| abstract_inverted_index.during | 35 |
| abstract_inverted_index.files, | 156 |
| abstract_inverted_index.modes. | 166 |
| abstract_inverted_index.search | 56 |
| abstract_inverted_index.tools. | 124 |
| abstract_inverted_index.Chrome, | 138 |
| abstract_inverted_index.Digital | 20 |
| abstract_inverted_index.Mozilla | 139 |
| abstract_inverted_index.browser | 50, 54, 113, 176 |
| abstract_inverted_index.changes | 147 |
| abstract_inverted_index.digital | 44 |
| abstract_inverted_index.leaving | 83 |
| abstract_inverted_index.limited | 80 |
| abstract_inverted_index.normal, | 116 |
| abstract_inverted_index.perform | 131 |
| abstract_inverted_index.popular | 136 |
| abstract_inverted_index.privacy | 185 |
| abstract_inverted_index.storage | 151, 162 |
| abstract_inverted_index.studies | 73 |
| abstract_inverted_index.various | 122 |
| abstract_inverted_index.Abstract | 0 |
| abstract_inverted_index.Firefox, | 140 |
| abstract_inverted_index.Overall, | 167 |
| abstract_inverted_index.analysis | 178 |
| abstract_inverted_index.browsers | 6, 27 |
| abstract_inverted_index.browsing | 77, 108, 128, 158, 165 |
| abstract_inverted_index.consider | 34 |
| abstract_inverted_index.cookies, | 157 |
| abstract_inverted_index.criminal | 16 |
| abstract_inverted_index.critical | 31 |
| abstract_inverted_index.defining | 106 |
| abstract_inverted_index.existing | 66 |
| abstract_inverted_index.forensic | 21, 37, 81, 123, 177, 188 |
| abstract_inverted_index.function | 28 |
| abstract_inverted_index.history, | 55, 159 |
| abstract_inverted_index.involves | 46 |
| abstract_inverted_index.portable | 119 |
| abstract_inverted_index.private, | 117 |
| abstract_inverted_index.provided | 69 |
| abstract_inverted_index.recovery | 94 |
| abstract_inverted_index.research | 67 |
| abstract_inverted_index.subfield | 42 |
| abstract_inverted_index.valuable | 70 |
| abstract_inverted_index.Edge—by | 145 |
| abstract_inverted_index.Microsoft | 144 |
| abstract_inverted_index.addresses | 102 |
| abstract_inverted_index.analysis. | 38 |
| abstract_inverted_index.analyzing | 49, 112 |
| abstract_inverted_index.artifacts | 114 |
| abstract_inverted_index.browsers. | 99 |
| abstract_inverted_index.continues | 7 |
| abstract_inverted_index.different | 26, 96, 164 |
| abstract_inverted_index.enhancing | 184 |
| abstract_inverted_index.evidence. | 64 |
| abstract_inverted_index.insights, | 71 |
| abstract_inverted_index.keywords, | 57 |
| abstract_inverted_index.potential | 11, 63 |
| abstract_inverted_index.retention | 92 |
| abstract_inverted_index.scenarios | 109, 129 |
| abstract_inverted_index.activities | 17 |
| abstract_inverted_index.artifacts, | 51 |
| abstract_inverted_index.collecting | 47 |
| abstract_inverted_index.critically | 111 |
| abstract_inverted_index.cybercrime | 13 |
| abstract_inverted_index.downloads, | 59 |
| abstract_inverted_index.evaluation | 134 |
| abstract_inverted_index.forensics, | 40, 45 |
| abstract_inverted_index.identifies | 180 |
| abstract_inverted_index.increases. | 19 |
| abstract_inverted_index.individual | 76 |
| abstract_inverted_index.monitoring | 146 |
| abstract_inverted_index.protection | 186 |
| abstract_inverted_index.scenarios, | 82 |
| abstract_inverted_index.understand | 24 |
| abstract_inverted_index.contributes | 170 |
| abstract_inverted_index.web-related | 15 |
| abstract_inverted_index.comprehensive | 133 |
| abstract_inverted_index.investigators | 22 |
| abstract_inverted_index.understanding | 86, 174 |
| abstract_inverted_index.methodologies. | 189 |
| abstract_inverted_index.browsers—Google | 137 |
| cited_by_percentile_year | |
| countries_distinct_count | 0 |
| institutions_distinct_count | 3 |
| citation_normalized_percentile.value | 0.12494848 |
| citation_normalized_percentile.is_in_top_1_percent | False |
| citation_normalized_percentile.is_in_top_10_percent | True |