MoneroResearch.info

WIKINDX Resources  

Koerhuis, W., Kechadi, T., & Le-Khac, N.-A. (2020). Forensic analysis of privacy-oriented cryptocurrencies, Forensic Science International: Digital Investigation, 33, 200891. 
Added by: Rucknium (10/09/2022, 19:55)   
Resource type: Journal Article
DOI: https://doi.org/10.1016/j.fsidi.2019.200891
ID no. (ISBN etc.): 2666-2817
BibTeX citation key: Koerhuis2020
View all bibliographic details
Categories: Not Monero-focused
Keywords: Cryptocurrency forensics, Forensic artefacts, Monero, Privacy-oriented cryptocurrency, Verge
Creators: Kechadi, Koerhuis, Le-Khac
Collection: Forensic Science International: Digital Investigation
Views: 54/2822
Attachments   [email protected] [10/538] URLs   https://www.scienc ... /S1742287619302312
Abstract
The privacy-oriented cryptocurrencies have built-in anonymity and privacy features that made them very difficult (nearly impossible) to trace funds back to a particular user or successfully seize funds present in a cryptocurrency wallet. Criminals use these currencies in different kinds of malware and DDOS extortion attacks to launder money. While academic research on Bitcoin is becoming more mainstream, the research on privacy-oriented cryptocurrencies is not very common. In this paper, we address the privacy-oriented cryptocurrencies Monero and Verge and investigate which valuable forensic artefacts the software of these cryptocurrencies leaves behind on a computer system. We examine different sources of potential evidence like the volatile memory, network traffic and hard disks of the system running the cryptocurrency software. In almost all sources of evidence there are valuable forensic artefacts. These artefacts vary from mnemonic seed phrases and plain text passphrases in the volatile memory to indicators of the use of a cryptocurrency in the captured network traffic.
Added by: Rucknium  
WIKINDX 6.10.2 | Total resources: 233 | Username: -- | Bibliography: WIKINDX Master Bibliography | Style: APA Enhanced