Back to Search
Start Over
A Forensic Audit of the Tor Browser Bundle
- Source :
- Digital Investigation. 29:118-128
- Publication Year :
- 2019
- Publisher :
- Elsevier BV, 2019.
-
Abstract
- The increasing use of encrypted data within file storage and in network communications leaves investigators with many challenges. One of the most challenging is the Tor protocol, as its main focus is to protect the privacy of the user, in both its local footprint within a host and over a network connection. The Tor browser, though, can leave behind digital artefacts which can be used by an investigator. This paper outlines an experimental methodology and provides results for evidence trails which can be used within real-life investigations.
- Subjects :
- FOS: Computer and information sciences
Computer Science - Cryptography and Security
Computer science
QA75 Electronic computers. Computer science
02 engineering and technology
Audit
Cyber-security
Computer security
computer.software_genre
Encryption
Footprint
Digital forensics, Tor, Windows 10
Centre for Distributed Computing, Networking and Security
0202 electrical engineering, electronic engineering, information engineering
Protocol (object-oriented programming)
Focus (computing)
Network connection
business.industry
020207 software engineering
AI and Technologies
Computer Science Applications
Medical Laboratory Technology
005.8 Data security
Bundle
020201 artificial intelligence & image processing
business
Cryptography and Security (cs.CR)
Law
Host (network)
computer
Subjects
Details
- ISSN :
- 17422876
- Volume :
- 29
- Database :
- OpenAIRE
- Journal :
- Digital Investigation
- Accession number :
- edsair.doi.dedup.....abaeb8df974e1de9b593c7e1606bf067
- Full Text :
- https://doi.org/10.1016/j.diin.2019.03.009