A framework for live host-based Bitcoin wallet forensics and triage

نویسندگان

چکیده

Organised crime and cybercriminals use Bitcoin, a popular cryptocurrency, to launder money move it across borders with impunity. The UK other countries have legislation recover the proceeds of from criminals. Recent case law has recognised cryptocurrency assets as property that can be seized realised under Proceeds Crime Act (POCA). To seize asset generally requires access private key. Anecdotal evidence suggests if is not quickly after enforcement action taken place, will transferred wallets making difficult at future time. We investigate how Bitcoin could an Electrum or Ledger hardware wallet, during search, using live forensic techniques dictionary attack. conduct literature review examining state-of-the-art in application forensics wallet attacks. Concluding, there gap research on security significant proportion available comes small group academics working industry (Volety et al. 2019; Van Der Horst al., 2017; Zollner 2019). then forensically examine software Nano S establish what artefacts recovered assist recovery wallets. Our main contribution proposed framework for triage, collection tool identifiers, two proof concept dictionary-attack tools written Python OpenCL. evaluate these attack practicable low-cost cluster public cloud-based Graphics Processing Unit (GPU) instances. During our investigation, we find weakness Electrum's storage encrypted keys RAM. leverage this make around 2.4 trillion password guesses. also demonstrate 16.6 billion guesses against protected seed phrase.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

BlueWallet: The Secure Bitcoin Wallet

With the increasing popularity of Bitcoin, a digital decentralized currency and payment system, the number of malicious third parties attempting to steal bitcoins has grown substantially. Attackers have stolen bitcoins worth millions of dollars from victims by using malware to gain access to the private keys stored on the victims’ computers or smart phones. In order to protect the Bitcoin priva...

متن کامل

a framework for identifying and prioritizing factors affecting customers’ online shopping behavior in iran

the purpose of this study is identifying effective factors which make customers shop online in iran and investigating the importance of discovered factors in online customers’ decision. in the identifying phase, to discover the factors affecting online shopping behavior of customers in iran, the derived reference model summarizing antecedents of online shopping proposed by change et al. was us...

15 صفحه اول

Case-Based Reasoning in Live Forensics

The traditional forensic search and seizure process employed by law enforcement is not always appropriate given large data volumes and the potential of hard drive encryption. This paper proposes a framework built on case-based reasoning to support a live forensic response during the search and seizure process. The framework assists a first responder by identifying the risks and the procedures t...

متن کامل

Real-time digital forensics and triage

There are two main reasons the processing speed of current generation digital forensic tools is inadequate for the average case: a) users have failed to formulate explicit performance requirements; and b) developers have failed to put performance, specifically latency, as a top-level concern in line with reliability and correctness. In this work, we formulate forensic triage as a real-time comp...

متن کامل

Data Mining based Crime-Dependent Triage in Digital Forensics Analysis

Over the last few years, law enforcement registered a growing number of crimes related to the worldwide diffusion of high storage capacity low-cost digital devices. As a consequence Computer Forensics, the investigative discipline that aims to find evidence among seized devices is becoming increasingly complex. In this paper, we propose a new approach to digital investigations, based on the app...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Forensic Science International: Digital Investigation

سال: 2023

ISSN: ['2666-2825', '2666-2817']

DOI: https://doi.org/10.1016/j.fsidi.2022.301486