Skip to main content

Internet Forensic platform for tracking the money flow of financially-motivated malware

Deliverables

Optimal model system

A system that, given the characteristics of a particular malware, will compute how close it is to the optimal model and estimate its maximum profitability, and the threat it poses.

Training session 1

A First Training Session will be held to share the training modules with the project partners responsible for the validation.

Project website

Project website, up and running since the beginning of the project, updated regularly.

Training session 2

The targets of the second training session will be students at police colleges/academies and experienced police officers actively engaged in Internet forensics who can function as trainers and facilitators at their home organizations.

Design of the analysis system and specifications

This report will present the functional requirements and the technical specification derived from them.

Ethical and privacy monitoring and evaluation of RAMSES platform

Report on ethical and privacy considerations.

Final report on other cryptocurrencies

This report will collect both the analysis on the usage of alternate cryptocurrencies in cybercrime, and the data and insights gained by applying the methodologies we developed for Bitcoin to other relevant cryptocurrencies.

Ethical Protocol

Internal Protocol for ethical procedures for the consortium to follow with regards to ensuring adequate ethical standards are met and that data protection measures are taken.

Social and ethical implications of digital surveillance

A concise briefing paper for Law Enforcement Agencies to inform them of the various social and ethical implications of digital surveillance practices within forensic investigation online.

Economic improvements over the existing models

Report detailing all possible economic improvements over the existing models

Dissemination materials and final report

A collection of the dissemination materials such as the project brochure, publications of the project results and the presentations at the conferences and at the other forums. Each material will be made available throughout the project at different times, although a compilation will be provided at the end. Besides, a final report will be prepared that will include detailed information on the procedures and the outcomes of the project. This final report will be published as a hard copy and be made available in digital format. Along with the final report, a conference will be organized to expose the results of the project to the relevant audience and stakeholders.

Establishment of RAMSES Advisory Board and sub committees

Report with the Sub Committees members.

Training material and plan of training sessions for law enforcement agents

Digital training materials will facilitate practice and revision through e-learning platforms, both before and after the training sessions.

Stakeholders identification and liaison activities

A report on the stakeholders and the liaison activities with other relevant European projects and initiatives.

Findings on economic modelling of malware as a business model

Report with findings on economic modelling of malware as a business model.

Report on the use and prevalence of image and video steganography over Social Media

Report on the use and prevalence of image and video steganography over Social Media

Overview of existing approaches and best practices for digital surveillance by Law Enforcement Agencies

Overview on current knowledge and best practices for digital surveillance by LEAs.

Publications

Economic Analysis of Ransomware

Author(s): Julio Hernandez-Castro, Edward Cartwright, and Anna Stepanova
Published in: Issue 20. March 2017, 2017

EU-Projekt RAMSES: Internetbetrug effektiv bekämpfen

Author(s): Holger Nitsch, Sarina Ronert
Published in: Europa in Reichweite Die Bayerische Forschungsallianz stellt sich vor, Issue 2017, 2017, Page(s) 20

Economic analysis reveals cyber-criminals make bad business People.

Author(s): Max Metzger
Published in: SC Cybercrime, Issue 31. May 2017, 2017

An Analysis of Bitcoin Laundry Services

Author(s): Thibault de Balthasar Julio Hernandez-Castro
Published in: Nordic Conference on Secure IT Systems, Issue November 2017, 2017, Page(s) 297-312

A Supervised Auto-Tuning Approach for a Banking Fraud Detection System

Author(s): Michele Carminati, Luca Valentini, Stefano Zanero
Published in: Cyber Security Cryptography and Machine Learning, Issue Vol. 10332, 2017, Page(s) 215-233
DOI: 10.1007/978-3-319-60080-2_17

Online masquerade detection resistant to mimicry

Author(s): Jorge Maestre Vidal, Ana Lucila Sandoval Orozco, Luis Javier García Villalba
Published in: Expert Systems with Applications, Issue Volume 61, 1. November 2016, 2017, Page(s) 162-180, ISSN 0957-4174

An algorithm to find relationships between web vulnerabilities


Published in: ISSN 1573-0484

Enlargement of Vulnerable Web Applications for Testing

Author(s): Fernando Román Muñoz, Iván Israel Sabido Cortes, Luis Javier García Villalba
Published in: The Journal of Supercomputing, 2017, Page(s) 1-20, ISSN 0920-8542

Analyzing the traffic of penetration testing tools with an IDS

Author(s): Fernando Román Muñoz, Esteban Alejandro Armas Vega, Luis Javier García Villalba
Published in: The Journal of Supercomputing, 2016, Page(s) 1-16, ISSN 0920-8542

Estimation of Anonymous Email Network Characteristics through Statistical Disclosure Attacks

Author(s): Javier Portela, Luis García Villalba, Alejandra Silva Trujillo, Ana Sandoval Orozco, Tai-Hoon Kim
Published in: Sensors, Issue 16/11, 2016, Page(s) 1832, ISSN 1424-8220
DOI: 10.3390/s16111832

Certifiably Biased: An In-Depth Analysis of a Common Criteria EAL4+ Certified TRNG

Author(s): Darren Hurley-Smith, Julio Hernandez-Castro
Published in: IEEE Transactions on Information Forensics and Security, Issue 13/4, 2018, Page(s) 1031-1041, ISSN 1556-6013
DOI: 10.1109/TIFS.2017.2777342

Security Evaluation of a Banking Fraud Analysis System

Author(s): Michele Carminati, Mario Polino, Andrea Continella, Andrea Lanzi, Federico Maggi, Stefano Zanero
Published in: ACM Transactions on Privacy and Security, Issue 21/3, 2018, Page(s) 1-31, ISSN 2471-2566
DOI: 10.1145/3178370