Forensic analysis of privacy-oriented cryptocurrencies
【Author】 Koerhuis, Wiebe; Kechadi, Tahar; Le-Khac, Nhien-An
【Source】FORENSIC SCIENCE INTERNATIONAL-DIGITAL INVESTIGATION
【影响因子】1.805
【Abstract】The privacy -oriented cryptocurrencies have built-in anonymity and privacy features that made them very dif fi cult (nearly impossible) to trace funds back to a particular user or successfully seize funds present in a cryptocurrency wallet. Criminals use these currencies in different kinds of malware and DDOS extortion attacks to launder money. While academic research on Bitcoin is becoming more mainstream, the research on privacy -oriented cryptocurrencies is not very common. In this paper, we address the privacy -oriented cryptocurrencies Monero and Verge and investigate which valuable forensic artefacts the software of these cryptocurrencies leaves behind on a computer system. We examine different sources of potential evidence like the volatile memory, network traf fi c and hard disks of the system running the cryptocurrency software. In almost all sources of evidence there are valuable forensic artefacts. These artefacts vary from mnemonic seed phrases and plain text passphrases in the volatile memory to indicators of the use of a cryptocurrency in the captured network traf fi c. (C) 2019 Elsevier Ltd. All rights reserved.
【Keywords】Cryptocurrency forensics; Privacy-oriented cryptocurrency; Monero; Verge; Forensic artefacts
【发表时间】2020 JUN
【收录时间】2022-01-02
【文献类型】
【主题类别】
--
评论