Many people misuse their smartphones to commit cyber crimes, one of the cases is the use of web browsers utilized as a medium to commit criminal acts such as drug trafficking, pornography, or terrorism. Digital forensics can be used to reveal crimes. Using digital forensics, the crimes can be traced so that the perpetrators can be caught, and digital evidence can be found to trap them in the trial/court. This research method follows preliminary examinations based on the National Institute of Standards and Technology (NIST), including Collection, Examination, Analysis, and Reporting. Files on the web browser are saved in org.mozilla.firefox-1.apk then, after the analysis has been implemented, some data in folder files, cache, shared_prefts, and app tmpdir will exist. Several data could be used as digital evidence, such as Cookies, Web Bookmarks, Web History, and other data saved in the database. This can be traced to the data needed to reveal cyber-crime cases.

1.
R.
Umar
,
I.
Riadi
, and
B. F.
Muthohirin
,
Telkomnika
,
17
(
4
),
09
1803
(
2019
).
2.
J.
Oh
,
S.
Lee
, and
S.
Lee
,
Digital Investigation
,
8
,
62
(
2011
).
3.
E.
Akbal
,
F.
Gunes
, and
A.
Akbal
,
J. Softw.
11
(
7
), (
2016
).
4.
R.
Roy
,
A. K.
Khanna
, and
L.
Aneja
, in
Int. Conf. Comput. Commun. Autom.
(
2016
).
5.
S. J.
Yang
,
J. H.
Choi
,
K. B.
Kim
, and
T.
Chang
,
Digital Investigation
,
14
,
68
76
(
2015
).
6.
A.
Mendoza
,
A.
Kumar
,
D.
Midcap
,
H.
Cho
, and
C.
Varol
,
Digital Investigation
14
,
63
(
2015
).
7.
R.
Singh
,
J. Eng. Res. Appl. Febr.
21
519
(
2014
).
8.
A.
Grosskurth
and
M. W.
Godfrey
, in
21st IEEE Int. Conf. Softw. Maint.
(
2005
),
4
661
.
9.
G.
Palmer
, in
2001 Digit. Forensics Res. Work.
(
2001
),
1
42
.
10.
M. N.
Al-Azhar
,
Digital Forensic Panduan Praktis Investigasi Komputer
(
Salemba Infote
,
Jakarta
,
2012
).
11.
K.
Kent
,
S.
Chevalier
,
T.
Grance
, and
H.
Dang
,
Guide to Integrating forensic techniques into incident response
NIST Special Publication 800-86
Retrieved 12 October 2017 (
2006
).
12.
D. G.
Dharan
and
A.R.
Meeran
,
Int. J. Comput. Appl.
91
(
4
), (
2014
).
13.
R.
Bagley
,
R. I.
Ferguson
, and
P.
Leimich
, in
Int. Conf. Cybercrime Forensics Train
. (
Christ Chruch University
,
Canterbury, UK
,
2012
).
14.
A.
Reed
,
M.
Scanlon
, and
N-An
Le-Khac
, in
Euro. Conf. Cyber Warf. Secur
. (
ECCWS
(
2017
).
15.
M. P.
Aji
,
I.
Riadi
, and
A.
Luthfi
,
J. Theor. Appl. Inf. Technol
,
95
,
4992
5002
(
2017
).
This content is only available via PDF.
You do not currently have access to this content.