BitIodine: Extracting Intelligence from the Bitcoin Network

被引:167
作者
Spagnuolo, Michele [1 ]
Maggi, Federico [1 ]
Zanero, Stefano [1 ]
机构
[1] Politecn Milan, DEIB, NECSTLab, I-20133 Milan, Italy
来源
FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2014 | 2014年 / 8437卷
关键词
Bitcoin; Financial forensics; Blockchain analysis;
D O I
10.1007/978-3-662-45472-5_29
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Bitcoin, the famous peer-to-peer, decentralized electronic currency system, allows users to benefit from pseudonymity, by generating an arbitrary number of aliases (or addresses) to move funds. However, the complete history of all transactions ever performed, called "blockchain", is public and replicated on each node. The data it contains is difficult to analyze manually, but can yield a high number of relevant information. In this paper we present a modular framework, BitIodine, which parses the blockchain, clusters addresses that are likely to belong to a same user or group of users, classifies such users and labels them, and finally visualizes complex information extracted from the Bitcoin network. BitIodine labels users semi-automatically with information on their identity and actions which is automatically scraped from openly available information sources. BitIodine also supports manual investigation by finding paths and reverse paths between addresses or users. We tested BitIodine on several real-world use cases, identified an address likely to belong to the encrypted Silk Road cold wallet, or investigated the CryptoLocker ransomware and accurately quantified the number of ransoms paid, as well as information about the victims. We release a prototype of BitIodine as a library for building Bitcoin forensic analysis tools.
引用
收藏
页码:457 / 468
页数:12
相关论文
共 11 条
[1]  
Androulaki Elli, 2013, Revised Selected Papers, P34, DOI DOI 10.1007/978-3-642-39884-1
[2]  
Brugere I., 2012, TECHNICAL REPORT
[3]  
Christin N., 2013, Proceedings of the 22nd International Conference on World Wide Web, WWW'13, P213, DOI DOI 10.1145/2488388.2488408
[4]  
Jarvis K., 2013, CryptoLocker Ransomware
[5]  
Meiklejohn S., 2013, Proceedings of the Conference on Internet Measurement Conference, P127, DOI 10.1145/2504730.2504747.10.1145
[6]  
Moser M., 2013, P MUNST BITC C
[7]  
Nakamoto S., 2009, Bitcoin: a peer-to-peer electronic cash system, DOI DOI 10.1007/S10838-008-9062-0
[8]   Structure and Anonymity of the Bitcoin Transaction Graph [J].
Ober, Micha ;
Katzenbeisser, Stefan ;
Hamacher, Kay .
FUTURE INTERNET, 2013, 5 (02) :237-250
[9]  
Reid F., 2011, Proceedings of the 2011 IEEE Third International Conference on Privacy, Security, Risk and Trust and IEEE Third International Conference on Social Computing (PASSAT/SocialCom 2011), P1318, DOI 10.1109/PASSAT/SocialCom.2011.79
[10]  
Spagnuolo M, 2013, THESIS POLITECNICO M