Title | Tor Browser Forensics in Exploring Invisible Evidence |
Publication Type | Conference Paper |
Year of Publication | 2018 |
Authors | Huang, M. Chiu, Wan, Y., Chiang, C., Wang, S. |
Conference Name | 2018 IEEE International Conference on Systems, Man, and Cybernetics (SMC) |
Keywords | browser security, Browsers, compositionality, Computer crime, cryptography, DH-HEMTs, digital evidence, digital forensics, endeavors, Facebook, Forensics, Human Behavior, incognito, information security incidents, information security offenses, Internet, Internet crimes, invisible evidence, Metrics, onion router, onion routing, online front-ends, perpetrators, pubcrawl, Relays, resilience, Resiliency, Tools, Tor, Tor browser forensics |
Abstract | Given the high frequency of information security incidents, feeling that we may soon become innocent victims of these events may be justified. Perpetrators of information security offenses take advantage of several methods to leave no evidence of their crimes, and this pattern of hiding tracks has caused difficulties for investigators searching for digital evidence. Use of the onion router (Tor) is a common way for criminals to conceal their identities and tracks. This paper aims to explain the composition and operation of onion routing; we conduct a forensic experiment to detect the use of the Tor browser and compare several browser modes, including incognito and normal. Through the experimental method described in this paper, investigators can learn to identify perpetrators of Internet crimes, which will be helpful in future endeavors in digital forensics. |
DOI | 10.1109/SMC.2018.00663 |
Citation Key | huang_tor_2018 |