European Commission logo
italiano italiano
CORDIS - Risultati della ricerca dell’UE
CORDIS

Internet Forensic platform for tracking the money flow of financially-motivated malware

Risultati finali

Optimal model system

A system that, given the characteristics of a particular malware, will compute how close it is to the optimal model and estimate its maximum profitability, and the threat it poses.

Training session 1

A First Training Session will be held to share the training modules with the project partners responsible for the validation.

Project website

Project website up and running since the beginning of the project updated regularly

Training session 2

The targets of the second training session will be students at police colleges/academies and experienced police officers actively engaged in Internet forensics who can function as trainers and facilitators at their home organizations.

Design of the analysis system and specifications

This report will present the functional requirements and the technical specification derived from them.

Ethical and privacy monitoring and evaluation of RAMSES platform

Report on ethical and privacy considerations.

Final report on other cryptocurrencies

This report will collect both the analysis on the usage of alternate cryptocurrencies in cybercrime, and the data and insights gained by applying the methodologies we developed for Bitcoin to other relevant cryptocurrencies.

Ethical Protocol

Internal Protocol for ethical procedures for the consortium to follow with regards to ensuring adequate ethical standards are met and that data protection measures are taken.

Social and ethical implications of digital surveillance

A concise briefing paper for Law Enforcement Agencies to inform them of the various social and ethical implications of digital surveillance practices within forensic investigation online.

Economic improvements over the existing models

Report detailing all possible economic improvements over the existing models

Dissemination materials and final report

A collection of the dissemination materials such as the project brochure, publications of the project results and the presentations at the conferences and at the other forums. Each material will be made available throughout the project at different times, although a compilation will be provided at the end. Besides, a final report will be prepared that will include detailed information on the procedures and the outcomes of the project. This final report will be published as a hard copy and be made available in digital format. Along with the final report, a conference will be organized to expose the results of the project to the relevant audience and stakeholders.

Establishment of RAMSES Advisory Board and sub committees

Report with the Sub Committees members

Training material and plan of training sessions for law enforcement agents

Digital training materials will facilitate practice and revision through e-learning platforms, both before and after the training sessions.

Stakeholders identification and liaison activities

A report on the stakeholders and the liaison activities with other relevant European projects and initiatives.

Findings on economic modelling of malware as a business model

Report with findings on economic modelling of malware as a business model.

Report on the use and prevalence of image and video steganography over Social Media
Overview of existing approaches and best practices for digital surveillance by Law Enforcement Agencies

Overview on current knowledge and best practices for digital surveillance by LEAs.

Pubblicazioni

Economic Analysis of Ransomware

Autori: Julio Hernandez-Castro, Edward Cartwright, and Anna Stepanova
Pubblicato in: Numero 20. March 2017, 2017
Editore: University of Kent

EU-Projekt RAMSES: Internetbetrug effektiv bekämpfen

Autori: Holger Nitsch, Sarina Ronert
Pubblicato in: Europa in Reichweite Die Bayerische Forschungsallianz stellt sich vor, Numero 2017, 2017, Pagina/e 20
Editore: Bayerisyche Forschungsallianz GmbH

Economic analysis reveals cyber-criminals make bad business People.

Autori: Max Metzger
Pubblicato in: SC Cybercrime, Numero 31. May 2017, 2017
Editore: SC Media UK

An Analysis of Bitcoin Laundry Services

Autori: Thibault de Balthasar Julio Hernandez-Castro
Pubblicato in: Nordic Conference on Secure IT Systems, Numero November 2017, 2017, Pagina/e 297-312
Editore: Springer

A Supervised Auto-Tuning Approach for a Banking Fraud Detection System

Autori: Michele Carminati, Luca Valentini, Stefano Zanero
Pubblicato in: Cyber Security Cryptography and Machine Learning, Numero Vol. 10332, 2017, Pagina/e 215-233
Editore: Springer International Publishing
DOI: 10.1007/978-3-319-60080-2_17

Online masquerade detection resistant to mimicry

Autori: Jorge Maestre Vidal, Ana Lucila Sandoval Orozco, Luis Javier García Villalba
Pubblicato in: Expert Systems with Applications, Numero Volume 61, 1. November 2016, 2017, Pagina/e 162-180, ISSN 0957-4174
Editore: Pergamon Press Ltd.

An algorithm to find relationships between web vulnerabilities

Autori: Román Muñoz, Fernando & García Villalba, Luis.
Pubblicato in: The Journal of Supercomputing, 2018, ISSN 1573-0484
Editore: Springer

Enlargement of Vulnerable Web Applications for Testing

Autori: Fernando Román Muñoz, Iván Israel Sabido Cortes, Luis Javier García Villalba
Pubblicato in: The Journal of Supercomputing, 2017, Pagina/e 1-20, ISSN 0920-8542
Editore: Kluwer Academic Publishers

Analyzing the traffic of penetration testing tools with an IDS

Autori: Fernando Román Muñoz, Esteban Alejandro Armas Vega, Luis Javier García Villalba
Pubblicato in: The Journal of Supercomputing, 2016, Pagina/e 1-16, ISSN 0920-8542
Editore: Kluwer Academic Publishers

Estimation of Anonymous Email Network Characteristics through Statistical Disclosure Attacks

Autori: Javier Portela, Luis García Villalba, Alejandra Silva Trujillo, Ana Sandoval Orozco, Tai-Hoon Kim
Pubblicato in: Sensors, Numero 16/11, 2016, Pagina/e 1832, ISSN 1424-8220
Editore: Multidisciplinary Digital Publishing Institute (MDPI)
DOI: 10.3390/s16111832

Certifiably Biased: An In-Depth Analysis of a Common Criteria EAL4+ Certified TRNG

Autori: Darren Hurley-Smith, Julio Hernandez-Castro
Pubblicato in: IEEE Transactions on Information Forensics and Security, Numero 13/4, 2018, Pagina/e 1031-1041, ISSN 1556-6013
Editore: Institute of Electrical and Electronics Engineers
DOI: 10.1109/TIFS.2017.2777342

Security Evaluation of a Banking Fraud Analysis System

Autori: Michele Carminati, Mario Polino, Andrea Continella, Andrea Lanzi, Federico Maggi, Stefano Zanero
Pubblicato in: ACM Transactions on Privacy and Security, Numero 21/3, 2018, Pagina/e 1-31, ISSN 2471-2566
Editore: ACM Transactions on Privacy and Security (TOPS)
DOI: 10.1145/3178370

È in corso la ricerca di dati su OpenAIRE...

Si è verificato un errore durante la ricerca dei dati su OpenAIRE

Nessun risultato disponibile