MoneroResearch.info |
Resource type: Journal Article DOI: https://doi.org/10.1016/j.fsidi.2019.200891 ID no. (ISBN etc.): 2666-2817 BibTeX citation key: Koerhuis2020 View all bibliographic details |
Categories: Not Monero-focused Keywords: Cryptocurrency forensics, Forensic artefacts, Monero, Privacy-oriented cryptocurrency, Verge Creators: Kechadi, Koerhuis, Le-Khac Collection: Forensic Science International: Digital Investigation |
Views: 88/2856
|
Attachments 10.1016@j.fsidi.2019.200891.pdf [18/546] | URLs https://www.scienc ... /S1742287619302312 |
Abstract |
The privacy-oriented cryptocurrencies have built-in anonymity and privacy features that made them very difficult (nearly impossible) to trace funds back to a particular user or successfully seize funds present in a cryptocurrency wallet. Criminals use these currencies in different kinds of malware and DDOS extortion attacks to launder money. While academic research on Bitcoin is becoming more mainstream, the research on privacy-oriented cryptocurrencies is not very common. In this paper, we address the privacy-oriented cryptocurrencies Monero and Verge and investigate which valuable forensic artefacts the software of these cryptocurrencies leaves behind on a computer system. We examine different sources of potential evidence like the volatile memory, network traffic and hard disks of the system running the cryptocurrency software. In almost all sources of evidence there are valuable forensic artefacts. These artefacts vary from mnemonic seed phrases and plain text passphrases in the volatile memory to indicators of the use of a cryptocurrency in the captured network traffic.
Added by: Rucknium |