Advertisement

A Suite of Tools for the Forensic Analysis of Bitcoin Transactions: Preliminary Report

  • Stefano Bistarelli
  • Ivan MercantiEmail author
  • Francesco Santini
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 11339)

Abstract

Crypto-currencies are nowadays widely known and used by more and more users, principally as a means of investment and payment, outside the restrict circle of technologists and computer scientists. However, as fiat money, they can also be used as a means for illegal activities, exploiting their pseudo-anonymity and easiness/speed in moving capitals. The aim of the suite of tools we propose in this paper is to better analyse and understand money flows in the Bitcoin block-chain, e.g., by clustering addresses, scraping them in the Web, identifying mixing services, and visualising all such information to forensic scientists.

Notes

Acknowledgment

This work is supported by project “REMIX” (funded by Banca d’Italia and Fondazione Cassa di Risparmio di Perugia) and project “ComPAArg” (funded by “Ricerca di Base 2015–2016”, University of Perugia).

References

  1. 1.
    Androulaki, E., Karame, G.O., Roeschlin, M., Scherer, T., Capkun, S.: Evaluating user privacy in bitcoin. In: Sadeghi, A.-R. (ed.) FC 2013. LNCS, vol. 7859, pp. 34–51. Springer, Heidelberg (2013).  https://doi.org/10.1007/978-3-642-39884-1_4CrossRefGoogle Scholar
  2. 2.
    Antonopoulos, A.M.: Mastering Bitcoin: Unlocking Digital Crypto-Currencies. O’Reilly Media Inc., Sebastopol (2014)Google Scholar
  3. 3.
    Battista, G.D., Donato, V.D., Patrignani, M., Pizzonia, M., Roselli, V., Tamassia, R.: Bitconeview: visualization of flows in the bitcoin transaction graph. In: 2015 IEEE Symposium on Visualization for Cyber Security (VizSec), pp. 1–8, October 2015Google Scholar
  4. 4.
    Bistarelli, S., Mercanti, I., Santini, F.: An analysis of non-standard bitcoin transactions. In: Crypto Valley Conference on Blockchain Technology. IEEE Computer Society (2018, to appear)Google Scholar
  5. 5.
    Bistarelli, S., Parroccini, M., Santini, F.: Visualizing bitcoin flows of ransomware: WannaCry one week later. In: Proceedings of the Second Italian Conference on Cyber Security. CEUR Workshop Proceedings, vol. 2058. CEUR-WS.org (2018)Google Scholar
  6. 6.
    Bistarelli, S., Santini, F.: Go with the -bitcoin- flow, with visual analytics. In: Proceedings of the 12th International Conference on Availability, Reliability and Security, pp. 38:1–38:6. ACM (2017)Google Scholar
  7. 7.
    Johnson, D., Menezes, A., Vanstone, S.: The elliptic curve digital signature algorithm (ECDSA). Int. J. Inf. Secur. 1(1), 36–63 (2001)CrossRefGoogle Scholar
  8. 8.
    Kalodner, H.A., Goldfeder, S., Chator, A., Möser, M., Narayanan, A.: BlockSci: design and applications of a blockchain analysis platform. CoRR (2017). http://arxiv.org/abs/1709.02489
  9. 9.
    Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2008). http://www.hashcash.org/papers/hashcash.pdf. Accessed 28 Jan 2018
  10. 10.
    Nick, J.D.: Data-driven de-anonymization in bitcoin. Ph.D. thesis, ETH Zurich (2015). Master thesis. https://jonasnick.github.io/papers/thesis.pdf
  11. 11.
    Rather, E.D., Colburn, D.R., Moore, C.H.: The evolution of forth. In: ACM Sigplan Notices, vol. 28, pp. 177–199. ACM (1993)Google Scholar
  12. 12.
    Reid, F., Harrigan, M.: An analysis of anonymity in the bitcoin system. In: IEEE Third International Conference on Privacy, Security, Risk and Trust and IEEE Third International Conference on Social Computing, pp. 1318–1326 (2011)Google Scholar
  13. 13.
    Sampigethaya, K., Poovendran, R.: A survey on mix networks and their secure applications. Proc. IEEE 94(12), 2142–2181 (2006)CrossRefGoogle Scholar
  14. 14.
    Shumailov, I., Ahmed, M., Anderson, R.: Tendrils of crime: visualizing the diffusion of stolen bitcoins. In: The Fifth International Workshop on Graphical Models for Security (GramSec). LNCS. Springer (2018)Google Scholar
  15. 15.
    Spagnuolo, M., Maggi, F., Zanero, S.: BitIodine: extracting intelligence from the bitcoin network. In: Christin, N., Safavi-Naini, R. (eds.) FC 2014. LNCS, vol. 8437, pp. 457–468. Springer, Heidelberg (2014).  https://doi.org/10.1007/978-3-662-45472-5_29CrossRefGoogle Scholar
  16. 16.
    Wong, P.C., Thomas, J.: Visual analytics. IEEE Comput. Graph. Appl. 24(5), 20–21 (2004)CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  • Stefano Bistarelli
    • 1
  • Ivan Mercanti
    • 1
    Email author
  • Francesco Santini
    • 1
  1. 1.Dipartimento di Matematica e InformaticaUniversity of PerugiaPerugiaItaly

Personalised recommendations