{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T15:04:46Z","timestamp":1773414286714,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":38,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,10,21]],"date-time":"2019-10-21T00:00:00Z","timestamp":1571616000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"European Union Horizon 2020 research and innovation programme","award":["TITANIUM (No. 740558)"],"award-info":[{"award-number":["TITANIUM (No. 740558)"]}]},{"name":"Austrian FFG?s KIRAS programme","award":["VIRTCRIME (No. 860672)"],"award-info":[{"award-number":["VIRTCRIME (No. 860672)"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,10,21]]},"DOI":"10.1145\/3318041.3355466","type":"proceedings-article","created":{"date-parts":[[2019,10,21]],"date-time":"2019-10-21T13:34:22Z","timestamp":1571664862000},"page":"76-88","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":46,"title":["Spams meet Cryptocurrencies"],"prefix":"10.1145","author":[{"given":"Masarah","family":"Paquet-Clouston","sequence":"first","affiliation":[{"name":"GoSecure"}]},{"given":"Matteo","family":"Romiti","sequence":"additional","affiliation":[{"name":"Austrian Institute of Technology"}]},{"given":"Bernhard","family":"Haslhofer","sequence":"additional","affiliation":[{"name":"Austrian Institute of Technology"}]},{"given":"Thomas","family":"Charvat","sequence":"additional","affiliation":[{"name":"Excello"}]}],"member":"320","published-online":{"date-parts":[[2019,10,21]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"1","volume-title":"Proceedings of the workshop \"Machine Learning and Textual Information Access\" (2000","author":"Androutsopoulos I.","year":"2000","unstructured":"Androutsopoulos , I. , Paliouras , G. , Karkaletsis , V. , Sakkis , G. , Spyropoulos , C. D. , and Stamatopoulos , P . Learning to filter spam e-mail: A comparison of a naive bayesian and a memory-based approach . In Proceedings of the workshop \"Machine Learning and Textual Information Access\" (2000 ), 4th European Conference on Principles and Practice of Knowledge Discovery in Databases (PKDD- 2000 ), pp. 1 -- 11 . Androutsopoulos, I., Paliouras, G., Karkaletsis, V., Sakkis, G., Spyropoulos, C. D., and Stamatopoulos, P. Learning to filter spam e-mail: A comparison of a naive bayesian and a memory-based approach. In Proceedings of the workshop \"Machine Learning and Textual Information Access\" (2000), 4th European Conference on Principles and Practice of Knowledge Discovery in Databases (PKDD-2000), pp. 1--11."},{"key":"e_1_3_2_1_2_1","volume-title":"https:\/\/en.bitcoin.it\/wiki\/Privacy","author":"Bitcoin-Wiki","year":"2019","unstructured":"Bitcoin-Wiki . Privacy. https:\/\/en.bitcoin.it\/wiki\/Privacy , 2019 . Retrieved May 17, 2019. Bitcoin-Wiki. Privacy. https:\/\/en.bitcoin.it\/wiki\/Privacy, 2019. Retrieved May 17, 2019."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2015.7249453"},{"key":"e_1_3_2_1_4_1","volume-title":"Internet organized crime threat assessment report IOCTA. https:\/\/www.europol.europa.eu\/activities-services\/main-reports\/internet-organised-crime-threat-assessment","author":"EUROPOL.","year":"2018","unstructured":"EUROPOL. Internet organized crime threat assessment report IOCTA. https:\/\/www.europol.europa.eu\/activities-services\/main-reports\/internet-organised-crime-threat-assessment , 2018 . Retrieved March 6, 2019. EUROPOL. Internet organized crime threat assessment report IOCTA. https:\/\/www.europol.europa.eu\/activities-services\/main-reports\/internet-organised-crime-threat-assessment, 2018. Retrieved March 6, 2019."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/PASSAT\/SocialCom.2011.79"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-658-19287-7_11"},{"key":"e_1_3_2_1_7_1","volume-title":"DEF CON conference, https:\/\/www.cs.auckland.ac.nz\/~pgut001\/pubs\/malwarebiz.pdf, 2007","author":"Gutmann P.","year":"2019","unstructured":"Gutmann , P. The commercial malware industry . DEF CON conference, https:\/\/www.cs.auckland.ac.nz\/~pgut001\/pubs\/malwarebiz.pdf, 2007 . Retrieved February 2, 2019 . Gutmann, P. The commercial malware industry. DEF CON conference, https:\/\/www.cs.auckland.ac.nz\/~pgut001\/pubs\/malwarebiz.pdf, 2007. Retrieved February 2, 2019."},{"key":"e_1_3_2_1_8_1","first-page":"368","volume-title":"Internet of People, and Smart World Congress (UIC\/ATC\/ScalCom\/CBDCom\/IoP\/SmartWorld)","author":"Harrigan M.","year":"2016","unstructured":"Harrigan , M. , and Fretter , C . The unreasonable effectiveness of address clustering. In 2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing , Internet of People, and Smart World Congress (UIC\/ATC\/ScalCom\/CBDCom\/IoP\/SmartWorld) ( 2016 ), IEEE , pp. 368 -- 373 . Harrigan, M., and Fretter, C. The unreasonable effectiveness of address clustering. In 2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People, and Smart World Congress (UIC\/ATC\/ScalCom\/CBDCom\/IoP\/SmartWorld) (2016), IEEE, pp. 368--373."},{"key":"e_1_3_2_1_9_1","volume-title":"SEMANTiCS (Posters, Demos, SuCCESS)","author":"Haslhofer B.","year":"2016","unstructured":"Haslhofer , B. , Karl , R. , and Filtz , E . O bitcoin where art thou? insight into large-scale transaction graphs . In SEMANTiCS (Posters, Demos, SuCCESS) ( 2016 ). Haslhofer, B., Karl, R., and Filtz, E. O bitcoin where art thou? insight into large-scale transaction graphs. In SEMANTiCS (Posters, Demos, SuCCESS) (2016)."},{"key":"e_1_3_2_1_10_1","volume-title":"Economic analysis of ransomware. Available at SSRN 2937641","author":"Hernandez-Castro J.","year":"2017","unstructured":"Hernandez-Castro , J. , Cartwright , E. , and Stepanova , A . Economic analysis of ransomware. Available at SSRN 2937641 , 2017 . Retrieved March 6, 2019. Hernandez-Castro, J., Cartwright, E., and Stepanova, A. Economic analysis of ransomware. Available at SSRN 2937641, 2017. Retrieved March 6, 2019."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2014.12.029"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00047"},{"key":"e_1_3_2_1_13_1","volume-title":"Sept","author":"Force-Exchange","year":"2018","unstructured":"IBM-X- Force-Exchange . Necurs delivers language targeted porn scams. IBM, https:\/\/exchange.xforce.ibmcloud.com\/collection\/Necurs-delivers-language-targeted-porn-scams-fdb9d6b7941506807cbe56dd06e142d0 , Sept 2018 . Retrieved February 7, 2019. IBM-X-Force-Exchange. Necurs delivers language targeted porn scams. IBM, https:\/\/exchange.xforce.ibmcloud.com\/collection\/Necurs-delivers-language-targeted-porn-scams-fdb9d6b7941506807cbe56dd06e142d0, Sept 2018. Retrieved February 7, 2019."},{"key":"e_1_3_2_1_14_1","volume-title":"USENIX Symposium on Networked Systems Design and Implementation (NSDI)","volume":"9","author":"John J. P.","year":"2009","unstructured":"John , J. P. , Moshchuk , A. , Gribble , S. D. , Krishnamurthy , A. , Studying spamming botnets using botlab . In USENIX Symposium on Networked Systems Design and Implementation (NSDI) ( 2009 ), vol. 9 . John, J. P., Moshchuk, A., Gribble, S. D., Krishnamurthy, A., et al. Studying spamming botnets using botlab. In USENIX Symposium on Networked Systems Design and Implementation (NSDI) (2009), vol. 9."},{"key":"e_1_3_2_1_15_1","volume-title":"Blocksci: Design and applications of a blockchain analysis platform. Retrieved","author":"Kalodner H. A.","year":"2019","unstructured":"Kalodner , H. A. , Goldfeder , S. , Chator , A. , M\u00f6ser , M. , and Narayanan , A . Blocksci: Design and applications of a blockchain analysis platform. Retrieved March 6, 2019 . Kalodner, H. A., Goldfeder, S., Chator, A., M\u00f6ser, M., and Narayanan, A. Blocksci: Design and applications of a blockchain analysis platform. Retrieved March 6, 2019."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455774"},{"key":"e_1_3_2_1_17_1","first-page":"15","volume-title":"USENIX Security Symposium","author":"Kanich C.","year":"2011","unstructured":"Kanich , C. , Weaver , N. , McCoy , D. , Halvorson , T. , Kreibich , C. , Levchenko , K. , Paxson , V. , Voelker , G. M. , and Savage , S . Show me the money: Characterizing spam-advertised revenue . In USENIX Security Symposium ( 2011 ), pp. 15 -- 15 . Kanich, C., Weaver, N., McCoy, D., Halvorson, T., Kreibich, C., Levchenko, K., Paxson, V., Voelker, G. M., and Savage, S. Show me the money: Characterizing spam-advertised revenue. In USENIX Security Symposium (2011), pp. 15--15."},{"key":"e_1_3_2_1_18_1","volume-title":"April","author":"Kessem L.","year":"2017","unstructured":"Kessem , L. The necurs botnet: A pandora's box of malicious spam. IBM, https:\/\/securityintelligence.com\/the-necurs-botnet-a-pandoras-box-of-malicious-spam\/ , April 2017 . Retrieved March 6, 2019. Kessem, L. The necurs botnet: A pandora's box of malicious spam. IBM, https:\/\/securityintelligence.com\/the-necurs-botnet-a-pandoras-box-of-malicious-spam\/, April 2017. Retrieved March 6, 2019."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","first-page":"431","DOI":"10.1109\/SP.2011.24","volume-title":"Click trajectories: End-to-end analysis of the spam value chain. In 2011 ieee symposium on security and privacy","author":"Levchenko K.","year":"2011","unstructured":"Levchenko , K. , Pitsillidis , A. , Chachra , N. , Enright , B. , F\u00e9legyh\u00e1zi , M. , Grier , C. , Halvorson , T. , Kanich , C. , Kreibich , C. , Liu , H. , Click trajectories: End-to-end analysis of the spam value chain. In 2011 ieee symposium on security and privacy ( 2011 ), IEEE , pp. 431 -- 446 . Levchenko, K., Pitsillidis, A., Chachra, N., Enright, B., F\u00e9legyh\u00e1zi, M., Grier, C., Halvorson, T., Kanich, C., Kreibich, C., Liu, H., et al. Click trajectories: End-to-end analysis of the spam value chain. In 2011 ieee symposium on security and privacy (2011), IEEE, pp. 431--446."},{"key":"e_1_3_2_1_20_1","volume-title":"The importance of the normality assumption in large public health data sets. Annual review of public health 23, 1","author":"Lumley T.","year":"2002","unstructured":"Lumley , T. , Diehr , P. , Emerson , S. , and Chen , L . The importance of the normality assumption in large public health data sets. Annual review of public health 23, 1 ( 2002 ), 151--169. Lumley, T., Diehr, P., Emerson, S., and Chen, L. The importance of the normality assumption in large public health data sets. Annual review of public health 23, 1 (2002), 151--169."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2504730.2504747"},{"key":"e_1_3_2_1_22_1","first-page":"9457","article-title":"Identifying bitcoin users by transaction behavior","author":"Monaco J. V","year":"2015","unstructured":"Monaco , J. V . Identifying bitcoin users by transaction behavior . In Biometric and Surveillance Technology for Human and Activity Identification XII ( 2015 ), vol. 9457 , International Society for Optics and Photonics, p. 945704. Monaco, J. V. Identifying bitcoin users by transaction behavior. In Biometric and Surveillance Technology for Human and Activity Identification XII (2015), vol. 9457, International Society for Optics and Photonics, p. 945704.","journal-title":"Biometric and Surveillance Technology for Human and Activity Identification"},{"key":"e_1_3_2_1_23_1","volume-title":"Proceedings of the Workshop on the Economics of Information Security (WEIS) (University of California at Berkeley, 2016","author":"M\u00f6ser M.","year":"2019","unstructured":"M\u00f6ser , M. , and B\u00f6hme , R . Join me on a market for anonymity . In Proceedings of the Workshop on the Economics of Information Security (WEIS) (University of California at Berkeley, 2016 ). Retrieved March 7, 2019 . M\u00f6ser, M., and B\u00f6hme, R. Join me on a market for anonymity. In Proceedings of the Workshop on the Economics of Information Security (WEIS) (University of California at Berkeley, 2016). Retrieved March 7, 2019."},{"key":"e_1_3_2_1_24_1","first-page":"1","volume-title":"IEEE","author":"M\u00f6ser M.","year":"2019","unstructured":"M\u00f6ser , M. , B\u00f6hme , R. , and Breuker , D . An inquiry into money laundering tools in the bitcoin ecosystem. In 2013 APWG eCrime Researchers Summit (2013) , IEEE , pp. 1 -- 14 . Retreived March 20, 2019 . M\u00f6ser, M., B\u00f6hme, R., and Breuker, D. An inquiry into money laundering tools in the bitcoin ecosystem. In 2013 APWG eCrime Researchers Summit (2013), IEEE, pp. 1--14. Retreived March 20, 2019."},{"key":"e_1_3_2_1_25_1","volume-title":"Bitcoin: A peer-to-peer electronic cash system. https:\/\/bitcoin.org\/bitcoin. pdf","author":"Nakamoto S.","year":"2008","unstructured":"Nakamoto , S. Bitcoin: A peer-to-peer electronic cash system. https:\/\/bitcoin.org\/bitcoin. pdf , 2008 . Retrieved January 4, 2019. Nakamoto, S. Bitcoin: A peer-to-peer electronic cash system. https:\/\/bitcoin.org\/bitcoin. pdf, 2008. Retrieved January 4, 2019."},{"key":"e_1_3_2_1_26_1","volume-title":"ETH-Z\u00fcrich, 2015","author":"Nick J. D.","year":"2019","unstructured":"Nick , J. D. Data-driven de-anonymization in bitcoin. Master's thesis , ETH-Z\u00fcrich, 2015 . Retrieved March 11, 2019 . Nick, J. D. Data-driven de-anonymization in bitcoin. Master's thesis, ETH-Z\u00fcrich, 2015. Retrieved March 11, 2019."},{"key":"e_1_3_2_1_27_1","volume-title":"Tests that are robust against variance heterogeneity in kx 2 designs with unequal cell frequencies. Psychological reports 76, 3","author":"Overall J. E.","year":"1995","unstructured":"Overall , J. E. , Atlas , R. S. , and Gibson , J. M . Tests that are robust against variance heterogeneity in kx 2 designs with unequal cell frequencies. Psychological reports 76, 3 ( 1995 ), 1011--1017. Overall, J. E., Atlas, R. S., and Gibson, J. M. Tests that are robust against variance heterogeneity in kx 2 designs with unequal cell frequencies. Psychological reports 76, 3 (1995), 1011--1017."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1093\/cybsec\/tyz003"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1257\/jep.26.3.87"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-4139-7_10"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39884-1_2"},{"key":"e_1_3_2_1_32_1","volume-title":"Retrieved","author":"Schultz J.","year":"2019","unstructured":"Schultz , J. Anatomy of a sextortion scam. Cisco Talos Intelligence, https:\/\/blog.talosintelligence.com\/2018\/10\/anatomy-of-sextortion-scam.html, Oct 2018 . Retrieved January 17, 2019 . Schultz, J. Anatomy of a sextortion scam. Cisco Talos Intelligence, https:\/\/blog.talosintelligence.com\/2018\/10\/anatomy-of-sextortion-scam.html, Oct 2018. Retrieved January 17, 2019."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2766462.2767701"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-45472-5_29"},{"key":"e_1_3_2_1_35_1","first-page":"4","article-title":"The underground economy of spam: A botmaster's perspective of coordinating large-scale spam campaigns","volume":"11","author":"Stone-Gross B.","year":"2011","unstructured":"Stone-Gross , B. , Holz , T. , Stringhini , G. , and Vigna , G . The underground economy of spam: A botmaster's perspective of coordinating large-scale spam campaigns . LEET 11 ( 2011 ), 4 -- 4 . Stone-Gross, B., Holz, T., Stringhini, G., and Vigna, G. The underground economy of spam: A botmaster's perspective of coordinating large-scale spam campaigns. LEET 11 (2011), 4--4.","journal-title":"LEET"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2590296.2590302"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.27"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"crossref","unstructured":"Zimmerman D. W. and Zumbo B. D. Rank transformations and the power of the student t test and welch t'test for non-normal populations with unequal variances. Canadian Journal of Experimental Psychology\/Revue canadienne de psychologie exp\u00e9rimentale 47 3 (1993) 523.  Zimmerman D. W. and Zumbo B. D. Rank transformations and the power of the student t test and welch t'test for non-normal populations with unequal variances. Canadian Journal of Experimental Psychology\/Revue canadienne de psychologie exp\u00e9rimentale 47 3 (1993) 523.","DOI":"10.1037\/h0078850"}],"event":{"name":"AFT '19: 1st ACM Conference on Advances in Financial Technologies","location":"Zurich Switzerland","acronym":"AFT '19","sponsor":["ACM Association for Computing Machinery"]},"container-title":["Proceedings of the 1st ACM Conference on Advances in Financial Technologies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3318041.3355466","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3318041.3355466","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T17:49:33Z","timestamp":1750268973000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3318041.3355466"}},"subtitle":["Sextortion in the Bitcoin Ecosystem"],"short-title":[],"issued":{"date-parts":[[2019,10,21]]},"references-count":38,"alternative-id":["10.1145\/3318041.3355466","10.1145\/3318041"],"URL":"https:\/\/doi.org\/10.1145\/3318041.3355466","relation":{},"subject":[],"published":{"date-parts":[[2019,10,21]]},"assertion":[{"value":"2019-10-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}