메뉴 건너뛰기




Volumn , Issue , 2013, Pages

An inquiry into money laundering tools in the Bitcoin ecosystem

Author keywords

Bitcoin; Deanonymization; Money Laundering

Indexed keywords

ECOSYSTEMS;

EID: 84900790682     PISSN: 21591237     EISSN: 21591245     Source Type: Conference Proceeding    
DOI: 10.1109/eCRS.2013.6805780     Document Type: Conference Paper
Times cited : (296)

References (41)
  • 1
    • 84900833114 scopus 로고    scopus 로고
    • US Department of Justice, Manhattan U.S. attorney announces charges against Liberty Reserve, 2013(visited on 05/28/2013).
    • US Department of Justice, Manhattan U.S. attorney announces charges against Liberty Reserve, 2013. [Online]. Available http//www.justice.gov/usao/ nys/pressreleases/ May13/LibertyReservePR.php (visited on 05/28/2013).
  • 3
    • 84893082821 scopus 로고    scopus 로고
    • Traveling the silk road a measurement analysis of a large anonymous online marketplace
    • Rio de Janeiro
    • N. Christin, "Traveling the Silk Road A Measurement Analysis of a Large Anonymous Online Marketplace", in Proceedings of the 22nd International World Wide Web Conference, Rio de Janeiro, 2013, pp. 213-224.
    • (2013) Proceedings of the 22nd International World Wide Web Conference , pp. 213-224
    • Christin, N.1
  • 4
    • 84900793167 scopus 로고    scopus 로고
    • visited on 07/12/2013)
    • M. Geuss, Bitcoinica users sue for USD 460k in lost Bitcoins, 2012. [Online]. Available http//arstechnica. com/ tech-policy/2012/08/ bitcoinica-users-sue-for-460k-in-lost-bitcoins/ (visited on 07/12/2013).
    • (2012) Bitcoinica Users Sue for USD 460k in Lost Bitcoins
    • Geusss, M.1
  • 7
    • 84900836184 scopus 로고    scopus 로고
    • visited on 05/23/2013)
    • O. Solon, A simple guide to Bitcoin, 2013. [Online]. Available http//www.wired.co.uk/news/archive/2013-05/7/bitcoin-101 (visited on 05/23/2013).
    • (2013) A Simple Guide to Bitcoin
    • Solon, O.1
  • 8
    • 84900811111 scopus 로고    scopus 로고
    • Donate to WikiLeaks(visited on 05/30/2013).
    • Donate to WikiLeaks. [Online]. Available http//shop. wikileaks.org/donate (visited on 05/30/2013).
  • 9
    • 84900814803 scopus 로고    scopus 로고
    • visited on 05/23/2013)
    • Bitcoin Wiki, Anonymity. [Online]. Available https//en. bitcoin.it/wiki/Anonymity (visited on 05/23/2013).
  • 10
    • 84900825305 scopus 로고    scopus 로고
    • Mt.Gox, Statement Regarding Account Verifications, 2013(visited on 05/31/2013).
    • Mt.Gox, Statement Regarding Account Verifications, 2013. [Online]. Available https//mtgox.com/press- release-20130530.html (visited on 05/31/2013).
  • 11
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return addresses, and digital pseudonyms
    • Feb.
    • D. Chaum, "Untraceable electronic mail, return addresses, and digital pseudonyms", Communications of the ACM, vol. 24, no. 2, pp. 84-90, Feb. 1981.
    • (1981) Communications of the ACM , vol.24 , Issue.2 , pp. 84-90
    • Chaum, D.1
  • 12
    • 84948142629 scopus 로고    scopus 로고
    • An analysis of anonymity in the bitcoin system
    • Y. Altshuler, Y. Elovici, A. Cremers, N. Aharony, and A. Pentland, Eds., New York Springer
    • F. Reid and M. Harrigan, "An Analysis of Anonymity in the Bitcoin System", in Security and Privacy in Social Networks, Y. Altshuler, Y. Elovici, A. Cremers, N. Aharony, and A. Pentland, Eds., New York Springer, 2013, pp. 197-223.
    • (2013) Security and Privacy in Social Networks , pp. 197-223
    • Reid, F.1    Harrigan, M.2
  • 14
    • 84937564790 scopus 로고    scopus 로고
    • Anonymity, unobservability, and pseudonymity-A proposal for terminology
    • Berlin Heidelberg Springer, ser. Lecture Notes in Computer Science, H. Federrath, Ed.
    • A. Pfitzmann and M. Köhntopp, "Anonymity, unobservability, and pseudonymity-A proposal for terminology", in Designing privacy enhancing technologies, ser. Lecture Notes in Computer Science, H. Federrath, Ed., vol. 2009, Berlin Heidelberg Springer, 2001, pp. 1-9.
    • (2001) Designing Privacy Enhancing Technologies , vol.2009 , pp. 1-9
    • Pfitzmann, A.1    Köhntopp, M.2
  • 15
    • 84937555407 scopus 로고    scopus 로고
    • Traffic analysis protocols, attacks, design issues, and open problems
    • Berlin Heidelberg Springer, ser. Lecture Notes in Computer Science, H. Federrath, Ed.
    • J. Raymond, "Traffic analysis Protocols, attacks, design issues, and open problems", in Designing Privacy Enhancing Technologies, ser. Lecture Notes in Computer Science, H. Federrath, Ed., vol. 2009, Berlin Heidelberg Springer, 2001, pp. 10-29.
    • (2001) Designing Privacy Enhancing Technologies , vol.2009 , pp. 10-29
    • Raymond, J.1
  • 16
    • 84947273682 scopus 로고    scopus 로고
    • The sybil attack
    • Berlin Heidelberg Springer, ser. Lecture Notes in Computer Science, P. Druschel, F. Kaashoek, and A. Rowstron, Eds.
    • J. R. Douceur, "The Sybil Attack", in Peer-to-peer Systems, ser. Lecture Notes in Computer Science, P. Druschel, F. Kaashoek, and A. Rowstron, Eds., vol. 2429, Berlin Heidelberg Springer, 2002, pp. 251-260.
    • (2002) Peer-to-peer Systems , vol.2429 , pp. 251-260
    • Douceur, J.R.1
  • 17
    • 84900823230 scopus 로고    scopus 로고
    • visited on 06/22/2013)
    • Bitcoin Fog. [Online]. Available http//bitcoinfog.com/ (visited on 06/22/2013).
  • 18
    • 84957800033 scopus 로고    scopus 로고
    • Towards measuring anonymity
    • Berlin Heidelberg Springer, ser. Lecture Notes in Computer Science, R. Dingledine and P. Syverson, Eds.
    • C. Diaz, S. Seys, J. Claessens, and B. Preneel, "Towards Measuring Anonymity", in Privacy Enhancing Technologies, ser. Lecture Notes in Computer Science, R. Dingledine and P. Syverson, Eds., vol. 2482, Berlin Heidelberg Springer, 2003, pp. 54-68.
    • (2003) Privacy Enhancing Technologies , vol.2482 , pp. 54-68
    • Diaz, C.1    Seys, S.2    Claessens, J.3    Preneel, B.4
  • 19
    • 84957802536 scopus 로고    scopus 로고
    • Towards an information theoretic metric for anonymity
    • Berlin Heidelberg Springer, ser. Lecture Notes in Computer Science, R. Dingledine and P. Syverson, Eds.
    • A. Serjantov and G. Danezis, "Towards an information theoretic metric for anonymity", in Privacy Enhancing Technologies, ser. Lecture Notes in Computer Science, R. Dingledine and P. Syverson, Eds., vol. 2482, Berlin Heidelberg Springer, 2003, pp. 41-53.
    • (2003) Privacy Enhancing Technologies , vol.2482 , pp. 41-53
    • Serjantov, A.1    Danezis, G.2
  • 20
    • 84900811614 scopus 로고    scopus 로고
    • Mt.Gox thinks it's the Fed. Freezes acc based on "tainted" coins. (unlocked now), 2012(visited on 07/12/2013).
    • Mt.Gox thinks it's the Fed. Freezes acc based on "tainted" coins. (unlocked now), 2012. [Online]. Available https//bitcointalk.org/index. php?topic=73385.0 (visited on 07/12/2013).
  • 22
    • 84900811209 scopus 로고    scopus 로고
    • List of Major Bitcoin Heists, Thefts, Hacks, Scams, and Losses(visited on 07/05/2013).
    • List of Major Bitcoin Heists, Thefts, Hacks, Scams, and Losses. [Online]. Available https//bitcointalk.org/index. php?topic=83794 (visited on 07/05/2013).
  • 23
    • 0022145479 scopus 로고
    • Security without identification transaction systems to make big brother obsolete
    • D. Chaum, "Security Without Identification Transaction Systems To Make Big Brother Obsolete", Communications of the ACM, vol. 28, no. 10, pp. 1030-1044, 1985.
    • (1985) Communications of the ACM , vol.28 , Issue.10 , pp. 1030-1044
    • Chaum, D.1
  • 26
    • 84883268487 scopus 로고    scopus 로고
    • Quantitative analysis of the full bitcoin transaction graph
    • Berlin Heidelberg Springer, ser. Lecture Notes in Computer Science, A.-R. Sadeghi, Ed.
    • D. Ron and A. Shamir, "Quantitative Analysis of the Full Bitcoin Transaction Graph", in Financial Cryptography and Data Security, ser. Lecture Notes in Computer Science, A.-R. Sadeghi, Ed., vol. 7859, Berlin Heidelberg Springer, 2013, pp. 6-24.
    • (2013) Financial Cryptography and Data Security , vol.7859 , pp. 6-24
    • Ron, D.1    Shamir, A.2
  • 27
    • 85016109785 scopus 로고    scopus 로고
    • Structure and anonymity of the bitcoin transaction graph
    • M. Ober, S. Katzenbeisser, and K. Hamacher, "Structure and Anonymity of the Bitcoin Transaction Graph", Future Internet, vol. 5, no. 2, pp. 237-250, 2013.
    • (2013) Future Internet , vol.5 , Issue.2 , pp. 237-250
    • Ober, M.1    Katzenbeisser, S.2    Hamacher, K.3
  • 28
    • 84883310811 scopus 로고    scopus 로고
    • Evaluating user privacy in bitcoin
    • Berlin Heidelberg Springer, ser. Lecture Notes in Computer Science, A.-R. Sadeghi, Ed.
    • E. Androulaki, G. O. Karame, M. Roeschlin, T. Scherer, and S. Capkun, "Evaluating User Privacy in Bitcoin.", in Financial Cryptography and Data Security, ser. Lecture Notes in Computer Science, A.-R. Sadeghi, Ed., vol. 7859, Berlin Heidelberg Springer, 2013, pp. 34-51.
    • (2013) Financial Cryptography and Data Security , vol.7859 , pp. 34-51
    • Androulaki, E.1    Karame, G.O.2    Roeschlin, M.3    Scherer, T.4    Capkun, S.5
  • 30
    • 84937578170 scopus 로고    scopus 로고
    • Web mixes a system for anonymous and unobservable internet access
    • Berlin Heidelberg Springer, H. Federrath, Ed., ser. Lecture Notes in Computer Science
    • O. Berthold, H. Federrath, and S. Köpsell, "Web MIXes a system for anonymous and unobservable Internet access", in Designing Privacy Enhancing Technologies, H. Federrath, Ed., ser. Lecture Notes in Computer Science, vol. 2009, Berlin Heidelberg Springer, 2000, pp. 115-129.
    • (2000) Designing Privacy Enhancing Technologies , vol.2009 , pp. 115-129
    • Berthold, O.1    Federrath, H.2    Köpsell, S.3
  • 31
    • 38149112556 scopus 로고    scopus 로고
    • Attacking unlinkability the importance of context
    • Berlin Heidelberg Springer, ser. Lecture Notes in Computer Science, N. Borisov and P. Golle, Eds.
    • M. Franz, B. Meyer, and A. Pashalidis, "Attacking Unlinkability The Importance of Context", in Privacy Enhancing Technologies, ser. Lecture Notes in Computer Science, N. Borisov and P. Golle, Eds., vol. 4776, Berlin Heidelberg Springer, 2007, pp. 1-16.
    • (2007) Privacy Enhancing Technologies , vol.4776 , pp. 1-16
    • Franz, M.1    Meyer, B.2    Pashalidis, A.3
  • 32
    • 77955337124 scopus 로고    scopus 로고
    • Data retention and anonymity services
    • V. MatyáŜ, S. Fischer-Hübner, D. Cvr?cek, and P. Švenda, Eds., Brno, Czech Republic Springer
    • S. Berthold, R. Böhme, and S. Köpsell, "Data retention and anonymity services", in The Future of Identity in the Information Society, V. MatyáŜ, S. Fischer-Hübner, D. Cvr?cek, and P. Švenda, Eds., Brno, Czech Republic Springer, 2009, pp. 92-106.
    • (2009) The Future of Identity in the Information Society , pp. 92-106
    • Berthold, S.1    Böhme, R.2    Köpsell, S.3
  • 33
    • 69949190946 scopus 로고    scopus 로고
    • Using linkability information to attack mix-based anonymity services
    • Berlin Heidelberg Springer, ser. Lecture Notes in Computer Science, I. Goldberg and M. J. Atallah, Eds.
    • S. Schiffner and S. Clauß, "Using linkability information to attack mix-based anonymity services", in Privacy Enhancing Technologies, ser. Lecture Notes in Computer Science, I. Goldberg and M. J. Atallah, Eds., vol. 5672, Berlin Heidelberg Springer, 2009, pp. 94-107.
    • (2009) Privacy Enhancing Technologies , vol.5672 , pp. 94-107
    • Schiffner, S.1    Clauß, S.2
  • 34
    • 80053003862 scopus 로고    scopus 로고
    • Anonymity attacks on mix systems a formal analysis
    • Berlin Heidelberg Springer, ser. Lecture Notes in Computer Science, T. Filler, T. Pevný, S. Craver, and A. Ker, Eds.
    • S. Zhioua, "Anonymity attacks on mix systems a formal analysis", in Information Hiding, ser. Lecture Notes in Computer Science, T. Filler, T. Pevný, S. Craver, and A. Ker, Eds., vol. 6958, Berlin Heidelberg Springer, 2011, pp. 133-147.
    • (2011) Information Hiding , vol.6958 , pp. 133-147
    • Zhioua, S.1
  • 36
    • 84900829116 scopus 로고    scopus 로고
    • Taint checker list, 2012
    • Taint checker list, 2012. [Online]. Available https// bitcointalk.org/index.php?topic=67383.0.
  • 39
    • 84929273746 scopus 로고
    • Untraceable electronic cash
    • ser. Lecture Notes in Computer Science, S. Goldwasser, Ed.New York Springer-Verlag
    • D. Chaum, A. Fiat, and M. Naor, "Untraceable electronic cash", in Advances in Cryptology - CRYPTO' 88, ser. Lecture Notes in Computer Science, S. Goldwasser, Ed., vol. 403, New York Springer-Verlag, 1990, pp. 319-327.
    • (1990) Advances in Cryptology - CRYPTO' 88 , vol.403 , pp. 319-327
    • Chaum, D.1    Fiat, A.2    Naor, M.3
  • 40
    • 84900816175 scopus 로고    scopus 로고
    • visited on 07/12/2013)
    • Digicash.com. [Online]. Available http//digicash.com (visited on 07/12/2013).
  • 41
    • 84863532717 scopus 로고    scopus 로고
    • visited on 07/13/2012)
    • P. Krugman, Golden Cyberfetters, 2011. [Online]. Available http//krugman.blogs.nytimes.com/2011/09/07/ golden-cyberfetters/ (visited on 07/13/2012).
    • (2011) Golden Cyberfetters
    • Krugman, P.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.