Article

Private Web Browser Forensics: A Case Study on Epic Privacy Browser

Alan Reed; Mark Scanlon; Nhien-An Le-Khac

January 2018 Journal of Information Warfare

Contribution Summary

This research paper presents a case study on the Epic Privacy Browser, a private web browser designed to protect users' privacy. The study aims to investigate the types of evidence left behind by the browser on Windows 10 and Windows 7 operating systems, including live and post-mortem analysis. The researchers used various forensic tools to analyze the browser's artefacts, including Process Monitor, Regshot, and FTK Imager. The study identifies the types of evidence that can be recovered from the browser, including cache, temporary files, and cookies. The researchers also examine the effectiveness of the browser's claim that all traces of user activity are cleared upon closure. The study's findings have implications for forensic investigators and researchers interested in preserving privacy and triage processes.

Keywords: Web Browser Forensics; Epic Privacy Browser; Live Data Forensics; Post-Mortem Web Browser Forensics; Private Browsing; Digital Forensics; Cybersecurity; Forensic Analysis

Abstract

Organized crime, as well as individual criminals, are benefiting from the protection of private browsers to carry out illegal activity, such as money laundering, drug trafficking, the online exchange of child abuse material, etc. Epic Privacy Browser is one common example. It is currently in use in approximately 180 countries worldwide. In this paper, we outline the location and type of evidence available through live and post-mortem state analysis of the Epic Privacy Browser. This analysis identifies how the browser functions during use and where evidence can be recovered after use, the tools, and effective presentation of the recovered material.

BibTeX

@article{reed2018privatebrowsers,
	author={Reed, Alan and Scanlon, Mark and Le-Khac, Nhien-An},
	title="{Private Web Browser Forensics: A Case Study on Epic Privacy Browser}",
	booktitle="{Journal of Information Warfare}",
	year=2018,
	volume="17",
	number="1",
	abstract="Organized crime, as well as individual criminals, are benefiting from the protection of private browsers to carry out illegal activity, such as money laundering, drug trafficking, the online exchange of child abuse material, etc. Epic Privacy Browser is one common example. It is currently in use in approximately 180 countries worldwide. In this paper, we outline the location and type of evidence available through live and post-mortem state analysis of the Epic Privacy Browser. This analysis identifies how the browser functions during use and where evidence can be recovered after use, the tools, and effective presentation of the recovered material."
}