European Commission logo
español español
CORDIS - Resultados de investigaciones de la UE
CORDIS

Internet Forensic platform for tracking the money flow of financially-motivated malware

Resultado final

Optimal model system

A system that, given the characteristics of a particular malware, will compute how close it is to the optimal model and estimate its maximum profitability, and the threat it poses.

Training session 1

A First Training Session will be held to share the training modules with the project partners responsible for the validation.

Project website

Project website up and running since the beginning of the project updated regularly

Training session 2

The targets of the second training session will be students at police colleges/academies and experienced police officers actively engaged in Internet forensics who can function as trainers and facilitators at their home organizations.

Design of the analysis system and specifications

This report will present the functional requirements and the technical specification derived from them.

Ethical and privacy monitoring and evaluation of RAMSES platform

Report on ethical and privacy considerations.

Final report on other cryptocurrencies

This report will collect both the analysis on the usage of alternate cryptocurrencies in cybercrime, and the data and insights gained by applying the methodologies we developed for Bitcoin to other relevant cryptocurrencies.

Ethical Protocol

Internal Protocol for ethical procedures for the consortium to follow with regards to ensuring adequate ethical standards are met and that data protection measures are taken.

Social and ethical implications of digital surveillance

A concise briefing paper for Law Enforcement Agencies to inform them of the various social and ethical implications of digital surveillance practices within forensic investigation online.

Economic improvements over the existing models

Report detailing all possible economic improvements over the existing models

Dissemination materials and final report

A collection of the dissemination materials such as the project brochure, publications of the project results and the presentations at the conferences and at the other forums. Each material will be made available throughout the project at different times, although a compilation will be provided at the end. Besides, a final report will be prepared that will include detailed information on the procedures and the outcomes of the project. This final report will be published as a hard copy and be made available in digital format. Along with the final report, a conference will be organized to expose the results of the project to the relevant audience and stakeholders.

Establishment of RAMSES Advisory Board and sub committees

Report with the Sub Committees members

Training material and plan of training sessions for law enforcement agents

Digital training materials will facilitate practice and revision through e-learning platforms, both before and after the training sessions.

Stakeholders identification and liaison activities

A report on the stakeholders and the liaison activities with other relevant European projects and initiatives.

Findings on economic modelling of malware as a business model

Report with findings on economic modelling of malware as a business model.

Report on the use and prevalence of image and video steganography over Social Media
Overview of existing approaches and best practices for digital surveillance by Law Enforcement Agencies

Overview on current knowledge and best practices for digital surveillance by LEAs.

Publicaciones

Economic Analysis of Ransomware

Autores: Julio Hernandez-Castro, Edward Cartwright, and Anna Stepanova
Publicado en: Edición 20. March 2017, 2017
Editor: University of Kent

EU-Projekt RAMSES: Internetbetrug effektiv bekämpfen

Autores: Holger Nitsch, Sarina Ronert
Publicado en: Europa in Reichweite Die Bayerische Forschungsallianz stellt sich vor, Edición 2017, 2017, Página(s) 20
Editor: Bayerisyche Forschungsallianz GmbH

Economic analysis reveals cyber-criminals make bad business People.

Autores: Max Metzger
Publicado en: SC Cybercrime, Edición 31. May 2017, 2017
Editor: SC Media UK

An Analysis of Bitcoin Laundry Services

Autores: Thibault de Balthasar Julio Hernandez-Castro
Publicado en: Nordic Conference on Secure IT Systems, Edición November 2017, 2017, Página(s) 297-312
Editor: Springer

A Supervised Auto-Tuning Approach for a Banking Fraud Detection System

Autores: Michele Carminati, Luca Valentini, Stefano Zanero
Publicado en: Cyber Security Cryptography and Machine Learning, Edición Vol. 10332, 2017, Página(s) 215-233
Editor: Springer International Publishing
DOI: 10.1007/978-3-319-60080-2_17

Online masquerade detection resistant to mimicry

Autores: Jorge Maestre Vidal, Ana Lucila Sandoval Orozco, Luis Javier García Villalba
Publicado en: Expert Systems with Applications, Edición Volume 61, 1. November 2016, 2017, Página(s) 162-180, ISSN 0957-4174
Editor: Pergamon Press Ltd.

An algorithm to find relationships between web vulnerabilities

Autores: Román Muñoz, Fernando & García Villalba, Luis.
Publicado en: The Journal of Supercomputing, 2018, ISSN 1573-0484
Editor: Springer

Enlargement of Vulnerable Web Applications for Testing

Autores: Fernando Román Muñoz, Iván Israel Sabido Cortes, Luis Javier García Villalba
Publicado en: The Journal of Supercomputing, 2017, Página(s) 1-20, ISSN 0920-8542
Editor: Kluwer Academic Publishers

Analyzing the traffic of penetration testing tools with an IDS

Autores: Fernando Román Muñoz, Esteban Alejandro Armas Vega, Luis Javier García Villalba
Publicado en: The Journal of Supercomputing, 2016, Página(s) 1-16, ISSN 0920-8542
Editor: Kluwer Academic Publishers

Estimation of Anonymous Email Network Characteristics through Statistical Disclosure Attacks

Autores: Javier Portela, Luis García Villalba, Alejandra Silva Trujillo, Ana Sandoval Orozco, Tai-Hoon Kim
Publicado en: Sensors, Edición 16/11, 2016, Página(s) 1832, ISSN 1424-8220
Editor: Multidisciplinary Digital Publishing Institute (MDPI)
DOI: 10.3390/s16111832

Certifiably Biased: An In-Depth Analysis of a Common Criteria EAL4+ Certified TRNG

Autores: Darren Hurley-Smith, Julio Hernandez-Castro
Publicado en: IEEE Transactions on Information Forensics and Security, Edición 13/4, 2018, Página(s) 1031-1041, ISSN 1556-6013
Editor: Institute of Electrical and Electronics Engineers
DOI: 10.1109/TIFS.2017.2777342

Security Evaluation of a Banking Fraud Analysis System

Autores: Michele Carminati, Mario Polino, Andrea Continella, Andrea Lanzi, Federico Maggi, Stefano Zanero
Publicado en: ACM Transactions on Privacy and Security, Edición 21/3, 2018, Página(s) 1-31, ISSN 2471-2566
Editor: ACM Transactions on Privacy and Security (TOPS)
DOI: 10.1145/3178370

Buscando datos de OpenAIRE...

Se ha producido un error en la búsqueda de datos de OpenAIRE

No hay resultados disponibles