Skip to main content
European Commission logo print header

Tools for the Investigation of Transactions in Underground Markets

Leistungen

Dissemination and communication report - first update

This is a first update of D7.2, a formal review of dissemination activities over the reporting period from M13 to M24.

User documentation and Field Lab plan

This document will describe the context, requirements and conditions that are needed and set by the technical partners for the application to be installed on stakeholders’ premises. In addition it will also produce a training manual of the application that will assist Field Lab users to familiarize themselves with the application and its functionalities.

Report on legal, societal and ethical impact assessment

A report describing the findings of the PIA+ and the proposed technical solutions based on lessons learned in the consultations and trials considering a possible use of the system in practice, including policy recommendations on legal, societal as well as ethical compliance with EU law with references to national law.

Evaluation of training programme

The effectiveness of the training programmes will be determined in terms of measurable training outcomes – objective improvements and subjective benefits of participation.

Dissemination and communication report - final update

This is a second and final update of D7.2, a formal review of dissemination activities over the reporting period from M25 to M36.

Data Management Plan

This deliverable shall provide guidelines for data management and data protection and will specify procedures on the collection, storage, access, and sharing of research data within TITANIUM. It will categorize the various types of data produced in TITANIUM and it will specify how data will be made available to the public. The deliverable will also contain a section on how personal data will be handled in the project.

Report on data sharing and provenance tracking models

A technical report describing and justifying the selection of shared data structures, the technical data model along with rationales for design decisions, a discussion of privacy implications with the developed safeguards, and selected benchmark results to demonstrate the performance trade-offs.

General legal, societal, and ethical impacts of the TITANIUM tools

A report describing the legal, societal and ethical issues raised by the TITANIUM design and development plan and recommended solutions for addressing these issues within the Field Labs.

Training plan

This plan defines the process of training in TITANIUM. It will include identification of target groups and their training needs, training outline and didactic methods. The process for involvement of TITANIUM project partners in both development and execution of training will be part of the training plan, which will also include a timeline for training activities. The training plan will be updated as needed after each evaluation cycle.

Evaluation goals and methodology

This document will describe the methodologies, metrics, size and composition of the target groups, evaluation guidelines and procedures to be adopted during the different phases of the evaluation process.

Data Management Report

This deliverable shall provide guidelines for data management and data protection and will specify procedures on the collection, storage, access, and sharing of research data within TITANIUM. It will categorize the various types of data produced in TITANIUM and it will specify how data will be made available to the public.

Project Handbook

The project quality measures reporting procedures, communication policies and set of templates will be included in the project handbook.

User experience and forensics reporting guidelines

]: A report on guidelines for ensuring a productive and secure user experience for TITANIUM end users and final consumers of investigation results. It will summarize the design principles and rationales agreed upon in Task 3.5 along with example screenshots, lists of terms (if necessary with translations to local languages), and example audit trail (based on synthetic data).

Exploitation plan

This plan formalises the approach for moving from a funded project to a self-sustaining future. It describes the most appropriate ways of exploiting project results, including analysis of market research, commercial exploitation goals, business and governance models and use-cases for sustainability.

Technical reference of TITANIUM interfaces

A report describing all shared interfaces of the TITANIUM architecture including revision history and documentation of design rationales and directions for future extensions. This report will be generated from the working documentation. It includes technical specifications and examples.

Dissemination plan

This plan will develop project branding guidelines, on which a public-facing project website will be designed, developed, launched and periodically maintained throughout the project’s lifecycle. The site will be updated regularly and evaluated on an annual basis. An initial website providing core project information will be made available starting in month five of the project. Offline activities to communicate and disseminate project results will include raising awareness via printed publicity material, posters, leaflets, PowerPoint presentations, press releases, printed journal articles, conferences etc.

Dissemination and communication report

This is a formal annual review of dissemination activities that will cover the entire scope of the Dissemination and Communication plan over the year, including: ● Effectiveness and evolution of project website; ● Effectiveness of social media for various dissemination activities; ● Impact of TITANIUM-related publications, presentations, and events; ● Success in identifying and exploiting “key contacts”; ● Review of challenges faced and ways of addressing them in the following period. This Deliverable will be updated in M25 and in M36.

Veröffentlichungen

Ransomware Payments in the Bitcoin Ecosystem

Autoren: Masarah Paquet-Clouston, Bernhard Haslhofer, Benoit Dupont
Veröffentlicht in: The 17th Annual Workshop on the Economics of Information Security (WEIS), June 2018, Innsbruck, Austria, Issue 1, 2018, Page(s) 1-10
Herausgeber: WEIS

An Empirical Analysis of Anonymity in Zcash

Autoren: Kappos, George; Yousaf, Haaroon; Maller, Mary; Meiklejohn, Sarah
Veröffentlicht in: In: Enck, W and Felt, AP, (eds.) Proceedings of USENIX Security '18, Issue 1, 2018, Page(s) 463-477, ISBN 978-1-931971-46-1
Herausgeber: USENIX Association

In Code We Trust? Measuring the Control Flow Immutability of All Smart Contracts Deployed on Ethereum

Autoren: Michael Fröwis, Rainer Böhme
Veröffentlicht in: In: Garcia-Alfaro, J., Navarro-Arribas, G., Hartenstein, H., Herrera-Joancomartí, J. (Eds.), Data Privacy Management, Cryptocurrencies and Blockchain Technology. ESORICS 2017 International Workshops, DPM 2017 and CBT 2017, September 14-15, 2017, Proceedings, Issue 1, 2017, Page(s) 357-372, ISBN 978-3-319-67816-0
Herausgeber: Springer

Virtual Currencies and Fundamental Rights

Autoren: Christian Rückert
Veröffentlicht in: The 17th Annual Workshop on the Economics of Information Security (WEIS), June 2018, Innsbruck, Austria, 2017
Herausgeber: WEIS

Tracing Transactions Across Cryptocurrency Ledgers

Autoren: Yousaf, Haaroon; Kappos, George; Meiklejohn, Sarah
Veröffentlicht in: Proceedings of the 28th USENIX Security Symposium, Issue 2, 2019
Herausgeber: USENIX

Why is a Ravencoin Like a TokenDesk? An Exploration of Code Diversity in the Cryptocurrency Landscape

Autoren: Reibel, Pierre; Yousaf, Haaroon; Meiklejohn, Sarah
Veröffentlicht in: Preproceedings of the Financial Cryptography and Data Security 2019 Conference, Issue 4, 2019
Herausgeber: International Financial Cryptography Association

An Empirical Analysis of Monero Cross-Chain Traceability

Autoren: Hinteregger, Abraham; Haslhofer, Bernhard
Veröffentlicht in: Preproceedings of the Financial Cryptography and Data Security 2019 Conference, Issue 2, 2019
Herausgeber: International Financial Cryptography Association

Detecting Token Systems on Ethereum

Autoren: Michael Fröwis, Andreas Fuchs, Rainer Böhme
Veröffentlicht in: Preproceedings of the Financial Cryptography and Data Security 2019 Conference, 2019
Herausgeber: International Financial Cryptography Association

Kriptosare.gen, a Dockerized Bitcoin Testbed: Analysis of Server Performance

Autoren: Francesco Zola, Cristina Perez-Sola, Jon Egana Zubia, Maria Eguimendia, Jordi Herrera-Joancomarti
Veröffentlicht in: 2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS), 2019, Page(s) 1-5, ISBN 978-1-7281-1542-9
Herausgeber: IEEE
DOI: 10.1109/ntms.2019.8763809

Changing Costs of Cybercrime

Autoren: Ross Anderson, Chris Barton, Rainer Böhme, Richard Clayton, Carlos Ganan, Tom Grasso, Michael Levi, Typer Moore, Marie Vasek
Veröffentlicht in: Proceedings of the Workshop on the Economics of Information Security (WEIS), Boston, June 2019, 2019
Herausgeber: WEIS

Spams meet Cryptocurrencies: Sextortion in the Bitcoin Ecosystem

Autoren: Paquet-Clouston, Masarah; Romiti, Matteo; Haslhofer, Bernhard; Charvat, Thomas
Veröffentlicht in: ACM conference on Advances in Financial Technologies (AFT’19), Zurich, October 2019, Issue 1, 2019
Herausgeber: ACM

The Opearational Cost of Ethereum Airdrops

Autoren: Michael Fröwis, Rainer Böhme
Veröffentlicht in: 3rd International Workshop on Cryptocurrencies and Blockchain Technology - CBT'19, 2019
Herausgeber: Springer

Cascading Machine Learning to Attack Bitcoin Anonymity

Autoren: Francesco Zola, Maria Eguimendia, Jan Lukas Bruse, Raul Orduna
Veröffentlicht in: 2nd IEEE International Conference on Blockchain held in Atlanta on July 14-17 2019, 2019
Herausgeber: IEEE

"""All that Glitters is not Bitcoin – Unveiling the Centralized Nature of the BTC (IP) Network"""

Autoren: Sami Ben Mariem, Pedro Casas, Matteo Romiti, Benoit Donnety, Rainer Stütz, Bernhard Haslhofer
Veröffentlicht in: Proceedings of the 32nd IEEE/IFIP Network Operations and Management Symposium, 2020
Herausgeber: IEEE/IFIP

Stake Shift in Major Cryptocurrencies: An Empirical Study

Autoren: Rainer Stütz, Peter Gazi, Bernhard Haslhofer, Jacob Illum
Veröffentlicht in: Pre-Proceedings Financial Cryptography and Data Security 2020, 2020
Herausgeber: International Financial Cryptography Association

The costs of consumer-facing cybercrime: an empirical exploration of measurement issues and estimates†

Autoren: Markus Riek, Rainer Böhme
Veröffentlicht in: Journal of Cybersecurity, Issue tyy004, 2018, Page(s) 1, ISSN 2057-2085
Herausgeber: Oxford University Press
DOI: 10.1093/cybsec/tyy004

The contemporary cybercrime ecosystem: A multi-disciplinary overview of the state of affairs and developments

Autoren: Stearns Broadhead
Veröffentlicht in: Computer Law & Security Review, Issue in press, 2018, Page(s) Volume 34, Issue 6, December 2018, Pages 1180-1196, ISSN 0267-3649
Herausgeber: Pergamon Press Ltd.
DOI: 10.1016/j.clsr.2018.08.005

Distributed Ledger, Joint Control? – Blockchains and the GDPR’s Transparency Requirements

Autoren: Paulina Jo Pesch, Christian Sillaber
Veröffentlicht in: Computer Law Review International, Issue 18/6, 2017, Page(s) 166 ff., ISSN 2194-4164
Herausgeber: De Gruyter
DOI: 10.9785/cri-2017-0602

Virtual Currencies and Fundamental Rights

Autoren: Christian Rueckert
Veröffentlicht in: SSRN Electronic Journal, Issue Journal of Cybersecurity 2019, Vol. 5, No. 1, 2019, ISSN 1556-5068
Herausgeber: Oxford University Press
DOI: 10.2139/ssrn.2820634

Safeguarding the evidential value of forensic cryptocurrency investigations

Autoren: Michael Fröwis, Thilo Gottschalk, Bernhard Haslhofer, Christian Rückert, Paulina Pesch
Veröffentlicht in: Forensic Science International: Digital Investigation, 2020, Page(s) 200902, ISSN 2666-2817
Herausgeber: Elsevier ScienceDirect
DOI: 10.1016/j.fsidi.2019.200902

Bitcoin and Cybersecurity: Temporal Dissection of Blockchain Data to Unveil Changes in Entity Behavioral Patterns

Autoren: Francesco Zola, Jan Lukas Bruse, Maria Eguimendia, Mikel Galar, Raul Orduna Urrutia
Veröffentlicht in: Applied Sciences, Issue 9/23, 2019, Page(s) 5003, ISSN 2076-3417
Herausgeber: Mdpi
DOI: 10.3390/app9235003

The Data-Laundromat?

Autoren: T. Gottschalk
Veröffentlicht in: European Data Protection Law Review, Issue 6/1, 2020, Page(s) 21-40, ISSN 2364-2831
Herausgeber: Lexxion
DOI: 10.21552/edpl/2020/1/6

Using Stylometry to Track Cybercriminals inDarknet Forums

Autoren: Anirudh Ekambarana-than, Sarah Meiklejohn, Andreas Peter
Veröffentlicht in: 2018
Herausgeber: University of Twente

An Empirical Analysis of Privacy in the Lightning Network

Autoren: George Kappos, Haaroon Yousaf, Ania M. Piotrowska, Sanket Kanjalkar, Sergi Delgado-Segura, Andrew Miller, Sarah Meiklejohn
Veröffentlicht in: under review, 2020
Herausgeber: ArXiv

Generative Adversarial Networks for Bitcoin Data Augmentation

Autoren: Francesco Zola, Jan Lukas Bruse, Xabier Etxeberria Barrio, Mikel Galar, Raul Orduna Urrutia
Veröffentlicht in: under review, 2020
Herausgeber: ArXiv

Suche nach OpenAIRE-Daten ...

Bei der Suche nach OpenAIRE-Daten ist ein Fehler aufgetreten

Es liegen keine Ergebnisse vor