1. A Forensic Audit of the Tor Browser Bundle
- Author
-
William J Buchanan, Matt Muir, and Petra Leimich
- Subjects
FOS: Computer and information sciences ,Computer Science - Cryptography and Security ,Computer science ,QA75 Electronic computers. Computer science ,02 engineering and technology ,Audit ,Cyber-security ,Computer security ,computer.software_genre ,Encryption ,Footprint ,Digital forensics, Tor, Windows 10 ,Centre for Distributed Computing, Networking and Security ,0202 electrical engineering, electronic engineering, information engineering ,Protocol (object-oriented programming) ,Focus (computing) ,Network connection ,business.industry ,020207 software engineering ,AI and Technologies ,Computer Science Applications ,Medical Laboratory Technology ,005.8 Data security ,Bundle ,020201 artificial intelligence & image processing ,business ,Cryptography and Security (cs.CR) ,Law ,Host (network) ,computer - Abstract
The increasing use of encrypted data within file storage and in network communications leaves investigators with many challenges. One of the most challenging is the Tor protocol, as its main focus is to protect the privacy of the user, in both its local footprint within a host and over a network connection. The Tor browser, though, can leave behind digital artefacts which can be used by an investigator. This paper outlines an experimental methodology and provides results for evidence trails which can be used within real-life investigations.
- Published
- 2019
- Full Text
- View/download PDF