On the privacy of private browsing - A forensic approach

Private browsing has been a popular privacy feature built into mainstream browsers since 2005. However, despite the prevalent use, the security of this feature has received little attention from the research community. To the best of our knowledge, no study has existed that systematically evaluates the security of private browsing across major browsers and from multiple angles: not only examining the memory, but also the underlying database structure on the disk and the web traffic. In this paper, we present an up-to-date and comprehensive analysis of private browsing across the four popular web browsers: IE, Firefox, Chrome and Safari. We report that all browsers under study suffer from a variety of vulnerabilities, many of which have not been reported or known before. The problems are generally caused by the following factors: a lax control of permission to allow extensions to run in the private mode with unrestricted privilege; inconsistent implementations of the underlying SQLite database between the private and usual modes; the neglect of the cross-mode interference when the two modes are run in parallel; a lack of attention to side-channel timing attacks, etc. All of the attacks have been experimentally verified with countermeasures proposed.

[1]  Paul C. Kocher,et al.  Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems , 1996, CRYPTO.

[2]  Edward W. Felten,et al.  Timing attacks on Web privacy , 2000, CCS.

[3]  Kenneth G. Paterson,et al.  Lucky Thirteen: Breaking the TLS and DTLS Record Protocols , 2013, 2013 IEEE Symposium on Security and Privacy.

[4]  Dan Boneh,et al.  Protecting browser state from web privacy attacks , 2006, WWW '06.

[5]  Huwida Said,et al.  Forensic analysis of private browsing artifacts , 2011, 2011 International Conference on Innovations in Information Technology.

[6]  Sangjin Lee,et al.  A recovery method of deleted record for SQLite database , 2011, Personal and Ubiquitous Computing.

[7]  Erwin Kreyszig,et al.  Introductory Mathematical Statistics. , 1970 .

[8]  Pete Forster,et al.  Time and date issues in forensic computing - a case study , 2004, Digit. Investig..

[9]  Dan Boneh,et al.  An Analysis of Private Browsing Modes in Modern Browsers , 2010, USENIX Security Symposium.

[10]  Murilo Tito Pereira Forensic analysis of the Firefox 3 Internet history and recovery of deleted SQLite records , 2009, Digit. Investig..

[11]  ToreiniEhsan,et al.  On the privacy of private browsing - A forensic approach , 2014, WISA 2014.

[12]  Shriram Krishnamurthi,et al.  Verifying Web Browser Extensions' Compliance with Private-Browsing Mode , 2013, ESORICS.

[13]  Peter Eckersley,et al.  How Unique Is Your Web Browser? , 2010, Privacy Enhancing Technologies.

[14]  Antonio Ruiz-Martínez,et al.  A survey on solutions and main free tools for privacy enhancing Web communications , 2012, J. Netw. Comput. Appl..