Private Web Browser Forensics: A Case Study on Epic Privacy Browser
|Title:||Private Web Browser Forensics: A Case Study on Epic Privacy Browser||Authors:||Reed, Alan
|Permanent link:||http://hdl.handle.net/10197/9692||Date:||Mar-2018||Online since:||2019-03-26T12:17:29Z||Abstract:||Organized crime, as well as individual criminals, are benefiting from the protection of private browsers to carry out illegal activity, such as money laundering, drug trafficking, the online exchange of child abuse material, etc. Epic Privacy Browser is one common example. It is currently in use in approximately 180 countries worldwide. In this paper, we outline the location and type of evidence available through live and post-mortem state analysis of the Epic Privacy Browser. This analysis identifies how the browser functions during use and where evidence can be recovered after use, the tools, and effective presentation of the recovered material.||Type of material:||Journal Article||Publisher:||Journal of Information Warfare||Journal:||Journal of Information Warfare||Volume:||17||Issue:||1||Keywords:||Digital forensics; Cybersecurity; Web browser forensics; Epic privacy browser; Live data forensics; Browzar||Language:||en||Status of Item:||Not peer reviewed|
|Appears in Collections:||Computer Science Research Collection|
Show full item record
This item is available under the Attribution-NonCommercial-NoDerivs 3.0 Ireland. No item may be reproduced for commercial purposes. For other possible restrictions on use please refer to the publisher's URL where this is made available, or to notes contained in the item itself. Other terms may apply.