Analyzing hack subnetworks in the bitcoin transaction graph

@article{Goldsmith2019AnalyzingHS,
  title={Analyzing hack subnetworks in the bitcoin transaction graph},
  author={D. Goldsmith and Kim Grauer and Yonah Shmalo},
  journal={Applied Network Science},
  year={2019},
  volume={5},
  pages={1-20}
}
  • D. Goldsmith, Kim Grauer, Yonah Shmalo
  • Published 2019
  • Computer Science, Physics, Mathematics
  • Applied Network Science
  • Hacks are one of the most damaging types of cryptocurrency related crime, accounting for billions of dollars in stolen funds since 2009. Professional investigators at Chainalysis have traced these stolen funds from the initial breach on an exchange to off-ramps, i.e. services where criminals are able to convert the stolen funds into fiat or other cryptocurrencies. We analyzed six hack subnetworks of bitcoin transactions known to belong to two prominent hacking groups. We analyze each hack… CONTINUE READING
    2 Citations

    Figures, Tables, and Topics from this paper.

    References

    SHOWING 1-10 OF 23 REFERENCES
    A first estimation of the proportion of cybercriminal entities in the bitcoin ecosystem using supervised machine learning
    • H. Yin, R. Vatrapu
    • Computer Science
    • 2017 IEEE International Conference on Big Data (Big Data)
    • 2017
    • 24
    • PDF
    Network-based indicators of Bitcoin bubbles
    • 13
    • PDF
    A fistful of bitcoins: characterizing payments among men with no names
    • 161
    • PDF
    Tracking Ransomware End-to-end
    • 57
    • PDF
    A Fistful of Bitcoins Characterizing Payments Among Men with No Names
    • S A R A H M E I K L E J O H N, M A R J O R I P O M A R O L E, G R A N T J O R D A N, K I R I L L L E V C H E N K O, D A M O , G E O F F R E, Y M V O E L K E R A N D S T E F A N S A V A
    • 2013
    • 649
    • PDF
    Finding community structure in very large networks.
    • 5,084
    • Highly Influential
    • PDF
    A Complex Networks Approach for Data Clustering
    • 29
    • PDF
    Computing Communities in Large Networks Using Random Walks
    • 1,897
    • PDF