2019
DOI: 10.1016/j.forsciint.2019.03.030
|View full text |Cite
|
Sign up to set email alerts
|

Forensic Analysis of Tor Browser: A Case Study for Privacy and Anonymity on the Web

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
12
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 27 publications
(12 citation statements)
references
References 9 publications
0
12
0
Order By: Relevance
“…This research methodology is primarily based on earlier work by A. Jadoon et.al. [9] and R.Nelson et.al. [10] with NIST SP 800-63 guidelines.…”
Section: Iiiproposed Methodologymentioning
confidence: 98%
See 2 more Smart Citations
“…This research methodology is primarily based on earlier work by A. Jadoon et.al. [9] and R.Nelson et.al. [10] with NIST SP 800-63 guidelines.…”
Section: Iiiproposed Methodologymentioning
confidence: 98%
“…They analyzed the registry settings before and after installation, other filesystem artifacts, and memory of the system to conclude that the Tor browser leaves minimal on-disk evidence. Further, in [9], the authors performed a forensic analysis of Tor privacy browser 7.02 (32-bit) on Windows 8.1 OS in which they analyzed Tor browser artifacts from registry, memory, and storage. However, they only covered normal surface-web based user browsing activities on Tor privacy browser to uncover artifacts related to Tor.…”
Section: Iirelated Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Mailbox [17] shared by multiple nodes to receive packets can hide authentic destination IP addresses, but it lacks source privacy. Onion networks (Tor [18][19][20]) are assumed to be efficient techniques that provide sufficient privacy, but these solutions are challenged by protocol incompatibilities and demanding cryptographic processing on constrained IoT devices [21]. Moreover, they have drawbacks with regard to achieving perfect privacy [22] and high performance.…”
Section: Security and Communication Networkmentioning
confidence: 99%
“…The update period T is a key parameter affecting the overhead of message exchange. Referring to the Tor network, the Tor browser changes its path after every ten minutes to ensure users anonymity 24 ; we can also set the value of T in minute level. If we also assume T is 10 minutes, the authorized user easily sends at least a dozen requests within T. Under the same setting of Section 4.1 (hops is 3 and Td is 10 ms), we can find the time overhead is less than 10 ms.…”
Section: Analysis Of Added Overheadmentioning
confidence: 99%