Skip to main content
Article
The forensic investigation of android private browsing sessions using orweb
2013 5th International Conference on Computer Science and Information Technology, CSIT 2013 - Proceedings
  • Nedaa Al Barghouthy, Zayed University
  • Andrew Marrington, Zayed University
  • Ibrahim Baggili, Zayed University
Document Type
Conference Proceeding
Publication Date
10-7-2013
Abstract

The continued increase in the usage of Small Scale Digital Devices (SSDDs) to browse the web has made mobile devices a rich potential for digital evidence. Issues may arise when suspects attempt to hide their browsing habits using applications like Orweb - which intends to anonymize network traffic as well as ensure that no browsing history is saved on the device. In this work, the researchers conducted experiments to examine if digital evidence could be reconstructed when the Orweb browser is used as a tool to hide web browsing activates on an Android smartphone. Examinations were performed on both a non-rooted and a rooted Samsung Galaxy S2 smartphone running Android 2.3.3. The results show that without rooting the device, no private web browsing traces through Orweb were found. However, after rooting the device, the researchers were able to locate Orweb browser history, and important corroborative digital evidence was found. © 2013 IEEE.

ISBN
9781467358255
Publisher
IEEE
Disciplines
Keywords
  • Android forensics,
  • digital forensics,
  • Orweb,
  • private web browsing,
  • Tor
Scopus ID
84884874308
Indexed in Scopus
Yes
Open Access
No
https://doi.org/10.1109/CSIT.2013.6588754
Citation Information
Nedaa Al Barghouthy, Andrew Marrington and Ibrahim Baggili. "The forensic investigation of android private browsing sessions using orweb" 2013 5th International Conference on Computer Science and Information Technology, CSIT 2013 - Proceedings (2013) p. 33 - 37
Available at: http://works.bepress.com/andrew-marrington/32/