Abstract
The Onion Router is a web browser that uses the Tor network to anonymize web traffic by making it simple to conceal one’s identity on social media. It uses the onion routing technology to access the multiple-level encrypted, Internet-impossible private mode. These features are being abused to engage in a variety of criminal activities, including cyber terrorism and the black market. The TOR erases all browsing history and other network traces, making it impossible for investigators to gather evidence. This study extracts and examines any potential artifacts that the TOR browser may have produced in local system files and memory dumps.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Sajan PP, Balan C, Priya MJD, Sreedeep AL (2021) Tor browser forensics. Turkish J Comput Math Educ 12(11):5599–5608
Mulr M, Lelmich P, Buchanan WJ (2019) A forensic audit of the tor browser bundle. Digital Investig, Research Gate
Darcie W, Boggs RJ, Sammons J, Fenger T (2014) Online anonymity: forensic analysis of the tor browser bundle. Technical Report, pp 1–34
Dingledine R, Mathewson N, Syverson P (2004) Tor: the second-generation onion router. Technical report, Naval Research Lab, Washington, DC
Chivers H (2014) Private browsing, a window of forensic opportunity. Digital Invest 11:20–29
Goldschlag DM, Reed MG, Syverson PF (1996) Hiding routing information. In: International workshop on information hiding, Springer, pp 137–150
Huang MJC, Wan YL et al (2018) Tor browser forensics in exploring invisible evidence. In: 2018 IEEE international conference on systems, man, and cybernetics
Arshad MR, Hussain M, Tahir H, Qadir S, Memon FIA, Javed Y (2021) Forensic analysis of tor browser on windows 10 and android 10 operating systems
Ghafarian A, Seno S (2015) Analysis of privacy of private browsing mode through memory forensics. Int J Comput Appl 132
Dave R, Mistry NR, Dahiya MS (2014) Volatile memory based forensic artifacts and analysis. Int J Res Appl Sci Eng Technol 2(1):120–124
Dayalamurthy D (2013) Forensic memory dump analysis and recovery of the artifacts of using tor bundle browser the need
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Kumar, A. et al. (2024). Forensics Analysis of TOR Browser. In: Patel, S.J., Chaudhary, N.K., Gohil, B.N., Iyengar, S.S. (eds) Information Security, Privacy and Digital Forensics. ICISPD 2022. Lecture Notes in Electrical Engineering, vol 1075. Springer, Singapore. https://doi.org/10.1007/978-981-99-5091-1_24
Download citation
DOI: https://doi.org/10.1007/978-981-99-5091-1_24
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-99-5090-4
Online ISBN: 978-981-99-5091-1
eBook Packages: Computer ScienceComputer Science (R0)