The new HTML5 standard provides much more access to client resources, such as user location and local data storage. Unfortunately, this greater access may create new security risks that potentially can yield new threats to user privacy and web attacks. One of these security risks lies with the HTML5 client-side database. It appears that data stored on the client file system is unencrypted. Therefore, any stored data might be at risk of exposure. This paper explains and performs a security investigation into how the data is stored on client local file systems. The investigation was undertaken using Firefox and Chrome web browsers, and Encase (a computer forensic tool), was used to examine the stored data. This paper describes how the data can be retrieved after an application deletes the client side database. Finally, based on our findings, we propose a solution to correct any potential issues and security risks, and recommend ways to store data securely on local file systems.
|Publication status||Published - 14 Oct 2014|
|Event||System Safety and Cyber Security 2014 (IET Conference) - The Midland Hotel, Manchester, UK|
Duration: 14 Oct 2014 → …
|Conference||System Safety and Cyber Security 2014 (IET Conference)|
|Period||14/10/14 → …|