Back to Search Start Over

A Forensic Audit of the Tor Browser Bundle

Authors :
William J Buchanan
Matt Muir
Petra Leimich
Source :
Digital Investigation. 29:118-128
Publication Year :
2019
Publisher :
Elsevier BV, 2019.

Abstract

The increasing use of encrypted data within file storage and in network communications leaves investigators with many challenges. One of the most challenging is the Tor protocol, as its main focus is to protect the privacy of the user, in both its local footprint within a host and over a network connection. The Tor browser, though, can leave behind digital artefacts which can be used by an investigator. This paper outlines an experimental methodology and provides results for evidence trails which can be used within real-life investigations.

Details

ISSN :
17422876
Volume :
29
Database :
OpenAIRE
Journal :
Digital Investigation
Accession number :
edsair.doi.dedup.....abaeb8df974e1de9b593c7e1606bf067
Full Text :
https://doi.org/10.1016/j.diin.2019.03.009