Abstract
The Tor Browser bundle is said to maintain user privacy. With many users depending on it, the research interest has grown up in investigating the Tor Browser behavior. This paper researches on the aspects of whether the user privacy is really maintained completely. The experiments conducted reveal that digital traces are left behind which can be later analyzed by the investigators. This paper presents the memory forensic experiments done and the methods used to analyze the digital artifacts left by Tor.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Dewey C (2013) Everything we know about Ross Ulbricht, the outdoorsy libertarian behind Silk Road. The Washington Post. https://www.washingtonpost.com/news/the-switch/wp/2013/10/03/everything-we-know-about-ross-ulbricht-the-outdoorsy-libertarian-behind-silk-road.
Sandvik RA (2013) Forensic analysis of the tor browser bundle on OSX, Linux, and Windows. Technical report. The Tor project. https://research.torproject.org/techreports/tbb-forensic-analysis-2013-06-28.pdf. The TOR Project, https://www.torproject.org/
Darcie W, Boggs RJ, Sammons J, Fenger T (2014). Online anonymity: forensic analysis of the tor browser bundle. Technical Report. Marshall University. https://www.marshall.edu/forensics/files/WinklerDarcie
Montasari R, Peltola P (2015) Computer forensic analysis of private browsing modes, in: global security, safety and sustainability: tomorrow’s challenges of cyber security. In: ICGS3 2015. Communications in Computer and Information Science, vol 534. Springer, pp. 96–109. https://doi.org/10.1007/978-3-319-23276-8_9
Epifani M, Scarito M, Picasso F (2015) Tor forensics on windows OS. In: DFRWS EU, Dublin. https://www.dfrws.org/sites/default/files/session-files/pres-torforensicsonwindowsos.pdf
Dayalamurthy D (2013) Forensic memory dump analysis and recovery of the artifacts of using Tor bundle browser: the need. In: Australian digital forensics conference, pp 71–83. https://doi.org/10.4225/75/57b3c7f3fb86e
Warren A (2017) Tor browser artifacts in windows 10. Retrieved from SANS Institute website: https://www.sans.org/reading-room/whitepapers/forensics/tor-browser-artifacts-windows-10-37642
Findlay C, Leimich P (2014) An assessment of data leakage in Firefox under different conditions. In: 7th International conference on cybercrime forensics education and training (CFET 2014), Canterbury, UK. https://www.researchgate.net/publication/330925976
Muir M, Leimich P, Buchanan WJ A forensic analysis of TOR browser bundle. https://arxiv.org/pdf/1907.10279.pdf
Al-Khaleel A, Bani-Salameh D, Al-Saleh MI (2014) On the memory artifacts of the tor browser bundle. In: The international conference on computing technology and information management (ICCTIM), Society of Digital Information and Wireless Communication, p 41
Jadoon AK, Waseem IM, Faisal AH, Afzal Y, Abbas B Forensic analysis of tor browser: a case study for privacy and anonymity on the web
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Gunapriya, S., Vatsavayi, V.K., Varma, K.S. (2021). Forensic Investigation of Tor Bundled Browser. In: Bhattacharyya, S., Nayak, J., Prakash, K.B., Naik, B., Abraham, A. (eds) International Conference on Intelligent and Smart Computing in Data Analytics. Advances in Intelligent Systems and Computing, vol 1312. Springer, Singapore. https://doi.org/10.1007/978-981-33-6176-8_31
Download citation
DOI: https://doi.org/10.1007/978-981-33-6176-8_31
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-33-6175-1
Online ISBN: 978-981-33-6176-8
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)