The Association of Digital Forensics, Security and Law (ADFSL)
A good portion of today's investigations include, at least in part, an examination of the user's web history. Although it has lost ground over the past several years, Microsoft's Internet Explorer still accounts for a large portion of the web browser market share. Most users are now aware that Internet Explorer will save browsing history, user names, passwords and form history. Consequently some users seek to eliminate these artifacts, leaving behind less evidence for examiners to discover during investigations. However, most users, and probably a good portion of examiners are unaware Automatic Crash Recovery can leave a gold mine of recent browsing history in spite of the users attempts to delete historical artifacts. As investigators, we must continually be looking for new sources of evidence; Automatic Crash Recovery is it.
Leach, P., Mealling, M., & Salz, R. (2005, July). A Universally Unique IDentifier (UUID) URN Namespace (RFC 4122). Internet Engineering Task Force. Retrieved June 25, 2012, from http://www.ietf.org/rfc /rfc4122.txt
Microsoft Corporation. (2008, March). Automatic Crash Recovery: Windows Internet Explorer 8 Beta 1 for Developers. Retrieved June 25, 2012, from http://www.softwaretipspalace.com/whitepapers/microsoft /Automatic%20Crash%20Recovery.pdf
Microsoft Corporation. (2012a, March 28). [MS-CFB]: Compound File Binary File Format. Retrieved June 25, 2012, from http://download.microsoft .com/download/a/e/6/ae6e4142-aa58-45c6-8dcfa657e5900cd3/[MS-CFB].pdf
Microsoft Corporation. (2012b, March 28). [MS-OLEPS]: Object Linking and Embedding (OLE) Property Set Data Structures. Retrieved June 25, 2012, from http://download.microsoft.com/download/a/e/6/ae6e4142-aa58-45c6-8dcfa657e5900cd3/[MS-OLEPS].pdf
Parsonage, H. (2010, July). The Meaning of LIFE. Retrieved June 29, 2012, from http://computerforensics.parsonage.co.uk/downloads /TheMeaningofLIFE.pdf
Moran, John and Orr, Douglas
"Automatic Crash Recovery: Internet Explorer's black box,"
Journal of Digital Forensics, Security and Law: Vol. 7
, Article 3.
Available at: http://commons.erau.edu/jdfsl/vol7/iss3/3