101. Designing Security Auditing Protocol with Web Browsers
- Author
-
Jung Hwan Song and Ho Jung Lee
- Subjects
WYCIWYG ,World Wide Web ,Blink element ,business.industry ,Computer science ,Personal computer ,Data_FILES ,HTML Application ,Quirks mode ,The Internet ,Content Security Policy ,Web Slice ,business - Abstract
The most of users of personal computer use web browsers such as MS(Microsoft) Internet Explorer, Mozilla Firefox, and so on for accessing to internet. Especially MS Internet Explorer which is used for internet access is a module to execute local files and to install softwares that are activated by install shield. Also Explorer is the same as Shell. Analyzing “index.dat” log which is the history of executing files and accessing web sites makes security audit effective. In this paper, by analyzing Windows “index.dat” and Mozilla Firefox cache files with time analysis, we suggest a method to perform auditing of cyber crimes such as information leakage and hard disk vulnerability.
- Published
- 2006
- Full Text
- View/download PDF