European Commission logo
English English
CORDIS - EU research results

Internet Forensic platform for tracking the money flow of financially-motivated malware


Optimal model system

A system that, given the characteristics of a particular malware, will compute how close it is to the optimal model and estimate its maximum profitability, and the threat it poses.

Training session 1

A First Training Session will be held to share the training modules with the project partners responsible for the validation.

Project website

Project website up and running since the beginning of the project updated regularly

Training session 2

The targets of the second training session will be students at police colleges/academies and experienced police officers actively engaged in Internet forensics who can function as trainers and facilitators at their home organizations.

Design of the analysis system and specifications

This report will present the functional requirements and the technical specification derived from them.

Ethical and privacy monitoring and evaluation of RAMSES platform

Report on ethical and privacy considerations.

Final report on other cryptocurrencies

This report will collect both the analysis on the usage of alternate cryptocurrencies in cybercrime, and the data and insights gained by applying the methodologies we developed for Bitcoin to other relevant cryptocurrencies.

Ethical Protocol

Internal Protocol for ethical procedures for the consortium to follow with regards to ensuring adequate ethical standards are met and that data protection measures are taken.

Social and ethical implications of digital surveillance

A concise briefing paper for Law Enforcement Agencies to inform them of the various social and ethical implications of digital surveillance practices within forensic investigation online.

Economic improvements over the existing models

Report detailing all possible economic improvements over the existing models

Dissemination materials and final report

A collection of the dissemination materials such as the project brochure, publications of the project results and the presentations at the conferences and at the other forums. Each material will be made available throughout the project at different times, although a compilation will be provided at the end. Besides, a final report will be prepared that will include detailed information on the procedures and the outcomes of the project. This final report will be published as a hard copy and be made available in digital format. Along with the final report, a conference will be organized to expose the results of the project to the relevant audience and stakeholders.

Establishment of RAMSES Advisory Board and sub committees

Report with the Sub Committees members

Training material and plan of training sessions for law enforcement agents

Digital training materials will facilitate practice and revision through e-learning platforms, both before and after the training sessions.

Stakeholders identification and liaison activities

A report on the stakeholders and the liaison activities with other relevant European projects and initiatives.

Findings on economic modelling of malware as a business model

Report with findings on economic modelling of malware as a business model.

Report on the use and prevalence of image and video steganography over Social Media
Overview of existing approaches and best practices for digital surveillance by Law Enforcement Agencies

Overview on current knowledge and best practices for digital surveillance by LEAs.


Economic Analysis of Ransomware

Author(s): Julio Hernandez-Castro, Edward Cartwright, and Anna Stepanova
Published in: Issue 20. March 2017, 2017
Publisher: University of Kent

EU-Projekt RAMSES: Internetbetrug effektiv bekämpfen

Author(s): Holger Nitsch, Sarina Ronert
Published in: Europa in Reichweite Die Bayerische Forschungsallianz stellt sich vor, Issue 2017, 2017, Page(s) 20
Publisher: Bayerisyche Forschungsallianz GmbH

Economic analysis reveals cyber-criminals make bad business People.

Author(s): Max Metzger
Published in: SC Cybercrime, Issue 31. May 2017, 2017
Publisher: SC Media UK

An Analysis of Bitcoin Laundry Services

Author(s): Thibault de Balthasar Julio Hernandez-Castro
Published in: Nordic Conference on Secure IT Systems, Issue November 2017, 2017, Page(s) 297-312
Publisher: Springer

A Supervised Auto-Tuning Approach for a Banking Fraud Detection System

Author(s): Michele Carminati, Luca Valentini, Stefano Zanero
Published in: Cyber Security Cryptography and Machine Learning, Issue Vol. 10332, 2017, Page(s) 215-233
Publisher: Springer International Publishing
DOI: 10.1007/978-3-319-60080-2_17

Online masquerade detection resistant to mimicry

Author(s): Jorge Maestre Vidal, Ana Lucila Sandoval Orozco, Luis Javier García Villalba
Published in: Expert Systems with Applications, Issue Volume 61, 1. November 2016, 2017, Page(s) 162-180, ISSN 0957-4174
Publisher: Pergamon Press Ltd.

An algorithm to find relationships between web vulnerabilities

Author(s): Román Muñoz, Fernando & García Villalba, Luis.
Published in: The Journal of Supercomputing, 2018, ISSN 1573-0484
Publisher: Springer

Enlargement of Vulnerable Web Applications for Testing

Author(s): Fernando Román Muñoz, Iván Israel Sabido Cortes, Luis Javier García Villalba
Published in: The Journal of Supercomputing, 2017, Page(s) 1-20, ISSN 0920-8542
Publisher: Kluwer Academic Publishers

Analyzing the traffic of penetration testing tools with an IDS

Author(s): Fernando Román Muñoz, Esteban Alejandro Armas Vega, Luis Javier García Villalba
Published in: The Journal of Supercomputing, 2016, Page(s) 1-16, ISSN 0920-8542
Publisher: Kluwer Academic Publishers

Estimation of Anonymous Email Network Characteristics through Statistical Disclosure Attacks

Author(s): Javier Portela, Luis García Villalba, Alejandra Silva Trujillo, Ana Sandoval Orozco, Tai-Hoon Kim
Published in: Sensors, Issue 16/11, 2016, Page(s) 1832, ISSN 1424-8220
Publisher: Multidisciplinary Digital Publishing Institute (MDPI)
DOI: 10.3390/s16111832

Certifiably Biased: An In-Depth Analysis of a Common Criteria EAL4+ Certified TRNG

Author(s): Darren Hurley-Smith, Julio Hernandez-Castro
Published in: IEEE Transactions on Information Forensics and Security, Issue 13/4, 2018, Page(s) 1031-1041, ISSN 1556-6013
Publisher: Institute of Electrical and Electronics Engineers
DOI: 10.1109/TIFS.2017.2777342

Security Evaluation of a Banking Fraud Analysis System

Author(s): Michele Carminati, Mario Polino, Andrea Continella, Andrea Lanzi, Federico Maggi, Stefano Zanero
Published in: ACM Transactions on Privacy and Security, Issue 21/3, 2018, Page(s) 1-31, ISSN 2471-2566
Publisher: ACM Transactions on Privacy and Security (TOPS)
DOI: 10.1145/3178370

Searching for OpenAIRE data...

There was an error trying to search data from OpenAIRE

No results available