Forensic Analysis of Tor Browser: A Case Study for Privacy and Anonymity on the Web.

Forensic Sci Int 2019 Jun 26;299:59-73. Epub 2019 Mar 26.

Department of Information Security, National University of Sciences and Technology (NUST), Islamabad 46000, Pakistan. Electronic address:

Web browsers are among the most commonly used applications to access the web from any platform nowadays. With recent digital incidents involving breach of data, users are becoming more cognizant of the threat posed by malicious actors having access to personal data as well as vulnerable applications which may compromise their data. For this very reason, users are being offered privacy preserving solutions for trust maturity. The onion router (Tor) browser is one such application which not only ensures the privacy preservation goals but also provides promising anonymity. Due to this feature, majority of the users use Tor browser for normal use as well as malign activities. In order to validate the claims of Tor browser and help digital forensic investigators and researchers, we created different scenarios to forensically analyze the Tor browser privacy and anonymity. As a result of the findings, it can be concluded that the Tor browser leaves plethora of sensitive digital artifacts on host machine, which can be further used to compromise user data.

Download full-text PDF

Source
http://dx.doi.org/10.1016/j.forsciint.2019.03.030DOI Listing
June 2019
1 Read

Publication Analysis

Top Keywords

tor browser
24
privacy anonymity
8
browser
6
tor
6
maturity onion
4
trust maturity
4
result findings
4
solutions trust
4
anonymity result
4
browser application
4
application ensures
4
ensures privacy
4
browser privacy
4
preserving solutions
4
router tor
4
onion router
4
offered privacy
4
applications compromise
4
compromise data
4
vulnerable applications
4

Similar Publications