{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,12]],"date-time":"2025-09-12T18:28:22Z","timestamp":1757701702559,"version":"3.40.3"},"publisher-location":"Cham","reference-count":31,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030512798"},{"type":"electronic","value":"9783030512804"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-51280-4_1","type":"book-chapter","created":{"date-parts":[[2020,7,17]],"date-time":"2020-07-17T16:08:38Z","timestamp":1595002118000},"page":"3-19","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["Leveraging Bitcoin Testnet for\u00a0Bidirectional Botnet Command and Control Systems"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6697-5431","authenticated-orcid":false,"given":"Federico","family":"Franzoni","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4670-433X","authenticated-orcid":false,"given":"Ivan","family":"Abellan","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0583-7929","authenticated-orcid":false,"given":"Vanesa","family":"Daza","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,7,18]]},"reference":[{"key":"1_CR1","doi-asserted-by":"publisher","unstructured":"Abu Rajab, M., Zarfoss, J., Monrose, F., Terzis, A.: A multifaceted approach to understanding the botnet phenomenon. In: Proceedings of the 6th ACM SIGCOMM Conference on Internet Measurement, IMC 2006, pp. 41\u201352. ACM, New York (2006). \nhttps:\/\/doi.org\/10.1145\/1177080.1177086\n\n. \nhttp:\/\/doi.acm.org\/10.1145\/1177080.1177086","DOI":"10.1145\/1177080.1177086"},{"key":"1_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1007\/978-3-662-48051-9_3","volume-title":"Financial Cryptography and Data Security","author":"ST Ali","year":"2015","unstructured":"Ali, S.T., McCorry, P., Lee, P.H.-J., Hao, F.: ZombieCoin: powering next-generation botnets with bitcoin. In: Brenner, M., Christin, N., Johnson, B., Rohloff, K. (eds.) FC 2015. LNCS, vol. 8976, pp. 34\u201348. Springer, Heidelberg (2015). \nhttps:\/\/doi.org\/10.1007\/978-3-662-48051-9_3"},{"issue":"4","key":"1_CR3","doi-asserted-by":"publisher","first-page":"411","DOI":"10.1007\/s10207-017-0379-8","volume":"17","author":"ST Ali","year":"2017","unstructured":"Ali, S.T., McCorry, P., Lee, P.H.-J., Hao, F.: ZombieCoin 2.0: managing next-generation botnets using Bitcoin. Int. J. Inf. Secur. 17(4), 411\u2013422 (2017). \nhttps:\/\/doi.org\/10.1007\/s10207-017-0379-8","journal-title":"Int. J. Inf. Secur."},{"key":"1_CR4","unstructured":"Antonakakis, M., et al.: Understanding the Mirai botnet. In: 26th USENIX Security Symposium (USENIX Security 2017), pp. 1093\u20131110. USENIX Association, Vancouver, BC, August 2017. \nhttps:\/\/www.usenix.org\/conference\/usenixsecurity17\/technical-sessions\/presentation\/antonakakis"},{"key":"1_CR5","doi-asserted-by":"publisher","unstructured":"Baden, M., Ferreira Torres, C., Fiz Pontiveros, B.B., State, R.: Whispering botnet command and control instructions. In: 2019 Crypto Valley Conference on Blockchain Technology (CVCBT), pp. 77\u201381, June 2019. \nhttps:\/\/doi.org\/10.1109\/CVCBT.2019.00014","DOI":"10.1109\/CVCBT.2019.00014"},{"key":"1_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"218","DOI":"10.1007\/978-3-319-70278-0_14","volume-title":"Financial Cryptography and Data Security","author":"M Bartoletti","year":"2017","unstructured":"Bartoletti, M., Pompianu, L.: An analysis of bitcoin OP$$\\_$$RETURN metadata. In: Brenner, M., et al. (eds.) FC 2017. LNCS, vol. 10323, pp. 218\u2013230. Springer, Cham (2017). \nhttps:\/\/doi.org\/10.1007\/978-3-319-70278-0_14"},{"issue":"02","key":"1_CR7","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1109\/MC.2017.62","volume":"50","author":"E Bertino","year":"2017","unstructured":"Bertino, E., Islam, N.: Botnets and internet of things security. Computer 50(02), 76\u201379 (2017). \nhttps:\/\/doi.org\/10.1109\/MC.2017.62","journal-title":"Computer"},{"key":"1_CR8","first-page":"7","volume":"6","author":"JR Binkley","year":"2006","unstructured":"Binkley, J.R., Singh, S.: An algorithm for anomaly-based botnet detection. SRUTI 6, 7 (2006)","journal-title":"SRUTI"},{"key":"1_CR9","doi-asserted-by":"publisher","unstructured":"Biryukov, A., Khovratovich, D., Pustogarov, I.: Deanonymisation of clients in bitcoin P2P network. In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS 2014, pp. 15\u201329. ACM, New York (2014). \nhttps:\/\/doi.org\/10.1145\/2660267.2660379\n\n. \nhttp:\/\/doi.acm.org\/10.1145\/2660267.2660379","DOI":"10.1145\/2660267.2660379"},{"key":"1_CR10","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1016\/j.protcy.2012.02.030","volume":"1","author":"P Correia","year":"2012","unstructured":"Correia, P., Rocha, E., Nogueira, A., Salvador, P.: Statistical characterization of the botnets C&C traffic. Procedia Technol. 1, 158\u2013166 (2012)","journal-title":"Procedia Technol."},{"key":"1_CR11","unstructured":"Delgado-Segura, S., et al.: TxProbe: discovering bitcoin\u2019s network topology using orphan transactions. CoRR abs\/1812.00942 (2018)"},{"key":"1_CR12","doi-asserted-by":"publisher","unstructured":"Feily, M., Shahrestani, A., Ramadass, S.: A survey of botnet and botnet detection. In: 2009 Third International Conference on Emerging Security Information, Systems and Technologies, pp. 268\u2013273, June 2009. \nhttps:\/\/doi.org\/10.1109\/SECURWARE.2009.48","DOI":"10.1109\/SECURWARE.2009.48"},{"key":"1_CR13","doi-asserted-by":"publisher","unstructured":"Frkat, D., Annessi, R., Zseby, T.: Chainchannels: private botnet communication over public blockchains. In: 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), pp. 1244\u20131252, July 2018. \nhttps:\/\/doi.org\/10.1109\/Cybermatics_2018.2018.00219","DOI":"10.1109\/Cybermatics_2018.2018.00219"},{"key":"1_CR14","unstructured":"Gu, G., Zhang, J., Lee, W.: BotSniffer: detecting botnet command and control channels in network traffic (2008)"},{"issue":"7","key":"1_CR15","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1109\/MC.2017.201","volume":"50","author":"C Kolias","year":"2017","unstructured":"Kolias, C., Kambourakis, G., Stavrou, A., Voas, J.: DDoS in the IoT: mirai and other botnets. Computer 50(7), 80\u201384 (2017)","journal-title":"Computer"},{"key":"1_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1007\/978-3-662-45472-5_30","volume-title":"Financial Cryptography and Data Security","author":"P Koshy","year":"2014","unstructured":"Koshy, P., Koshy, D., McDaniel, P.: An analysis of anonymity in bitcoin using P2P network traffic. In: Christin, N., Safavi-Naini, R. (eds.) FC 2014. LNCS, vol. 8437, pp. 469\u2013485. Springer, Heidelberg (2014). \nhttps:\/\/doi.org\/10.1007\/978-3-662-45472-5_30"},{"issue":"1","key":"1_CR17","doi-asserted-by":"publisher","first-page":"692654","DOI":"10.1155\/2009\/692654","volume":"2009","author":"J Liu","year":"2009","unstructured":"Liu, J., Xiao, Y., Ghaboosi, K., Deng, H., Zhang, J.: Botnet: classification, attacks, detection, tracing, and preventive measures. EURASIP J. Wirel. Commun. Netw. 2009(1), 692654 (2009). \nhttps:\/\/doi.org\/10.1155\/2009\/692654","journal-title":"EURASIP J. Wirel. Commun. Netw."},{"key":"1_CR18","doi-asserted-by":"publisher","unstructured":"Livadas, C., Walsh, R., Lapsley, D., Strayer, W.T.: Using machine learning techniques to identify botnet traffic. In: Proceedings of the 2006 31st IEEE Conference on Local Computer Networks, pp. 967\u2013974, November 2006. \nhttps:\/\/doi.org\/10.1109\/LCN.2006.322210","DOI":"10.1109\/LCN.2006.322210"},{"key":"1_CR19","unstructured":"Lopp, J.: How to solo mine on bitcoin\u2019s testnet (2015). \nhttps:\/\/blog.lopp.net\/how-to-solo-mine-on-bitcoin-s-testnet"},{"issue":"3","key":"1_CR20","first-page":"264","volume":"17","author":"M Mahmoud","year":"2015","unstructured":"Mahmoud, M., Nir, M., Matrawy, A., et al.: A survey on botnet architectures, detection and defences. IJ Netw. Secur. 17(3), 264\u2013281 (2015)","journal-title":"IJ Netw. Secur."},{"key":"1_CR21","unstructured":"Mascheck, S.: Arg$$\\_$$max, maximum length of arguments for a new process (2016). \nhttps:\/\/www.in-ulm.de\/~mascheck\/various\/argmax"},{"key":"1_CR22","unstructured":"Nagaraja, S., Mittal, P., Hong, C.Y., Caesar, M., Borisov, N.: BotGrep: finding P2P bots with structured graph analysis. In: Proceedings of the 19th USENIX Conference on Security, USENIX Security 2010, p. 7. USENIX Association, Berkeley (2010). \nhttp:\/\/dl.acm.org\/citation.cfm?id=1929820.1929830"},{"key":"1_CR23","unstructured":"Nakamoto, S., et al.: Bitcoin: a peer-to-peer electronic cash system (2008)"},{"issue":"3","key":"1_CR24","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1007\/s12599-017-0467-3","volume":"59","author":"M Nofer","year":"2017","unstructured":"Nofer, M., Gomber, P., Hinz, O., Schiereck, D.: Blockchain. Bus. Inf. Syst. Eng. 59(3), 183\u2013187 (2017). \nhttps:\/\/doi.org\/10.1007\/s12599-017-0467-3","journal-title":"Bus. Inf. Syst. Eng."},{"key":"1_CR25","doi-asserted-by":"publisher","unstructured":"Saad, S., et al.: Detecting P2P botnets through network behavior analysis and machine learning. In: 2011 Ninth Annual International Conference on Privacy, Security and Trust, pp. 174\u2013180, July 2011. \nhttps:\/\/doi.org\/10.1109\/PST.2011.5971980","DOI":"10.1109\/PST.2011.5971980"},{"key":"1_CR26","unstructured":"Sheinix: The bitcoin network (2018). \nhttps:\/\/medium.com\/coinmonks\/the-bitcoin-network-6713cb8713d"},{"issue":"2","key":"1_CR27","doi-asserted-by":"publisher","first-page":"378","DOI":"10.1016\/j.comnet.2012.07.021","volume":"57","author":"SS Silva","year":"2013","unstructured":"Silva, S.S., Silva, R.M., Pinto, R.C., Salles, R.M.: Botnets: a survey. Comput. Netw. 57(2), 378\u2013403 (2013)","journal-title":"Comput. Netw."},{"key":"1_CR28","doi-asserted-by":"publisher","unstructured":"Wang, P., Wu, L., Aslam, B., Zou, C.C.: A systematic study on peer-to-peer botnets. In: 2009 Proceedings of 18th International Conference on Computer Communications and Networks, pp. 1\u20138, August 2009. \nhttps:\/\/doi.org\/10.1109\/ICCCN.2009.5235360","DOI":"10.1109\/ICCCN.2009.5235360"},{"key":"1_CR29","unstructured":"Westervelt, R.: Botnet masters turn to google, social networks to avoid detection (2009)"},{"key":"1_CR30","unstructured":"Bitcoin Wiki: Op$$\\_$$return (2018). \nhttps:\/\/en.bitcoin.it\/wiki\/OP_RETURN"},{"key":"1_CR31","unstructured":"Bitcoin Wiki: Testnet (2019). \nhttps:\/\/en.bitcoin.it\/wiki\/Testnet"}],"container-title":["Lecture Notes in Computer Science","Financial Cryptography and Data Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-51280-4_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,7,17]],"date-time":"2020-07-17T16:10:32Z","timestamp":1595002232000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-51280-4_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030512798","9783030512804"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-51280-4_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"18 July 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"FC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Financial Cryptography and Data Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Kota Kinabalu","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Malaysia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 February 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 February 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"fc2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/fc20.ifca.ai\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"HotCRP","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"162","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"34","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"21% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.6","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"8.1","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}