Project Results
-
PUB2020Journal
The Data-Laundromat?
Gottschalk, Thilo. "The Data-Laundromat? Public-Private-Partnerships and Publicly Available Data in the Area of Law Enforcement." European Data Protection Law Review, Volume 6(2020), Issue 1, pages 21-40.
Link » -
PUB2020Conference
Bitcoin Data Augmentation
Zola, Francesco, et al. "Generative Adversarial Networks for Bitcoin Data Augmentation." arXiv preprint, under review, 2020.
Link » -
PUB2020Journal
Safeguarding Evidential Value
Fröwis, Michael et al. "Safeguarding the evidential value of forensic cryptocurrency investigations."Forensic Science International: Digital Investigation (2020): 200902.
Link » -
PUB2020Conference
Stake Shift in Major Cryptocurrencies
Stütz, Rainer, et al. "Stake Shift in Major Cryptocurrencies: An Empirical Study." 24th International Conference on Financial Cryptography and Data Security (FC2020), Konta Kinabalu, Malaysia, February 2020.
Link » -
PUB2020Conference
Privacy in the Lightning Network
Kappos, George, et al. "An Empirical Analysis of Privacy in the Lightning Network." arXiv preprint, under review, 2020.
Link » -
PUB2020Conference
All that Glitters is not Bitcoin
Mariem, Sami Ben et al. "All that Glitters is not Bitcoin -- Unveiling the Centralized Nature of the BTC (IP) Network." NOMS 2020-2020 IEEE/IFIP Network Operations and Management Symposium. IEEE, 2020.
Link » -
PUB2019Conference
Attacking Bitcoin Anonymity
Zola, Francesco et al. "Cascading Machine Learning to Attack Bitcoin Anonymity." 2019 IEEE International Conference on Blockchain (Blockchain). IEEE, 2019.
Link » -
PUB2019Conference
A Dockerized Bitcoin Testbed
Zola, Francesco, et al. "Kriptosare. gen, a dockerized Bitcoin testbed: analysis of server performance." 2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS). IEEE, 2019.
Link » -
PUB2019Journal
Bitcoin and Cybersecurity
Zola, Francesco, et al. "Bitcoin and cybersecurity: temporal dissection of blockchain data to unveil changes in entity behavioral patterns." Applied Sciences 9.23 (2019): 5003.
Link » -
PUB2019Conference
Spams meet Cryptocurrencies
Masarah Paquet-Clouston, Matteo Romiti, Bernhard Haslhofer, Thomas Charvat. "Spams meet Cryptocurrencies: Sextortion in the Bitcoin Ecosystem." ACM conference on Advances in Financial Technologies (AFT’19), Zurich, October 2019
Link » -
PUB2019Conference
The Operational Cost of Ethereum Airdrops
Fröwis, Michael, and Rainer Böhme. "The Operational Cost of Ethereum Airdrops." Data Privacy Management, Cryptocurrencies and Blockchain Technology. Springer, Cham, 2019. 255-270.
Link » -
PUB2019Conference
Measuring the Changing Costs of Cybercrime
Ross Anderson, Rainer Böhme et al. "Measuring the Changing Costs of Cybercrime." Workshop on the Economics of Information Security (WEIS), Boston, June 2019.
Link » -
PUB2019Conference
Tracing Transactions Across Cryptocurrency Ledgers
Yousaf, Haaroon, George Kappos, and Sarah Meiklejohn. "Tracing transactions across cryptocurrency ledgers." 28th {USENIX} Security Symposium ({USENIX} Security 19). 2019.
Link » -
PUB2019Conference
Monero Cross-chain Traceability
Abraham Hinteregger, Bernhard Haslhofer. "An empirical analysis of monero cross-chain traceability." Financial Cryptography and Data Security 2019
Link » -
PUB2019Conference
Detecting Token Systems on Ethereum
Michael Fröwis, Andreas Fuchs, Rainer Böhme. "Detecting Token Systems on Ethereum." Financial Cryptography and Data Security 2019
Link » -
PUB2019Conference
Why is a Ravencoin Like a TokenDesk?
Pierre Reibel, Haaroon Yousaf, Sarah Meiklejohn. "Why is a Ravencoin Like a TokenDesk? An Exploration of Code Diversity in the Cryptocurrency Landscape." Financial Cryptography and Data Security 2019
Link » -
PUB2019Journal
Cryptocurrencies and Fundamental Rights
Christian Rueckert, Cryptocurrencies and fundamental rights, Journal of Cybersecurity, Volume 5, Issue 1, 2019
Link » -
DEL2019Deliverable
D7.6 Dissemination and communication report - first update
This report summarises the dissemination activities in the TITANIUM project during the first two project years (01 May 2017 - 30 April 2019).
Link »
This work is licensed under a Creative Commons Attribution 4.0 International License. -
DEL2018Deliverable
D3.4 Report on data sharing and provenance tracking models
In this deliverable, we focus on the key ingredients of modern cryptocurrency analytic techniques, which are clustering heuristics and attribution tags, and discuss them in the light of internationally accepted legal standards and rules for substantiating suspicions and providing evidence in court. We translate derived key requirements into a data sharing framework that builds on existing standards and strengthens the evidential value of forensic cryptocurrency investigations.
Link »
This work is licensed under a Creative Commons Attribution 4.0 International License. -
PUB2018Conference
An Empirical Analysis of Anonymity in Zcash
Kappos, G., Yousaf, H., Maller, M. and Meiklejohn, S., 2018. An empirical analysis of anonymity in zcash. In 27th {USENIX} Security Symposium ({USENIX} Security 18) (pp. 463-477).
Link » -
PUB2018Conference
Ransomware Payments in the Bitcoin Ecosystem
Paquet-Clouston, M., Haslhofer, B. and Dupont, B., 2018. Ransomware payments in the bitcoin ecosystem. arXiv preprint arXiv:1804.04080.
Link » -
PUB2018Journal
The Contemporary Cybercrime Ecosystem
Broadhead, S., 2018. The contemporary cybercrime ecosystem: A multi-disciplinary overview of the state of affairs and developments. Computer Law & Security Review, 34(6), pp.1180-1196.
Link » -
PUB2018Conference
Virtual Currencies and Fundamental Rights
Rueckert, C., 2016. Virtual Currencies and Fundamental Rights. Available at SSRN 2820634.
Link » -
DEL2018Deliverable
D6.2 User documentation and Field Lab plan
This report provides an overview of tools created within the TITANIUM project. This deliverable is composed by an operation manual and a user guide of each tools developed in TITANIUM project. These documents at assists administrators and practitioners to carry out the Field Lab deployments and end-user evaluation.
Link »
This work is licensed under a Creative Commons Attribution 4.0 International License. -
PUB2018Journal
The Costs of Consumer-Facing Cybercrime
Riek, M. and Böhme, R., 2018. The costs of consumer-facing cybercrime: an empirical exploration of measurement issues and estimates. Journal of Cybersecurity, 4(1), p.tyy004.
Link » -
DEL2018Deliverable
D7.2 Dissemination and communication report
This report summarises the dissemination activities in the TITANIUM project during the first project year (01 May 2017 - 30 April 2018).
Link »
This work is licensed under a Creative Commons Attribution 4.0 International License. -
PUB2017Journal
Distributed Ledger, Joint Control?
Pesch, P.J. and Sillaber, C., 2018. Distributed Ledger, Joint Control?–Blockchains and the GDPR's Transparency Requirements.
Link » -
PUB2017Conference
In Code We Trust?
Fröwis, M. and Böhme, R., 2017. In Code We Trust?. In Data Privacy Management, Cryptocurrencies and Blockchain Technology (pp. 357-372). Springer, Cham.
Link » -
DEL2017Deliverable
D2.1 General legal, societal, and ethical impacts of the TITANIUM tools
This report describes the legal, societal and ethical issues raised by the TITANIUM design and development plan and recommended solutions for addressing these issues.
Link »
This work is licensed under a Creative Commons Attribution 4.0 International License. -
DEL2017Deliverable
D8.2 Data Management Plan
This first iteration of the project DMP describes the TITANIUM data collection, processing and data management lifecycle methodology and standards.
Link »
This work is licensed under a Creative Commons Attribution 4.0 International License. -
DEL2017Deliverable
D7.1 Dissemination plan
This report describes the dissemination process for TITANIUM and the project outcomes, including identification of target groups and dissemination channels.
Link »
This work is licensed under a Creative Commons Attribution 4.0 International License.