{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T10:07:36Z","timestamp":1775815656365,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":72,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,11,7]],"date-time":"2022-11-07T00:00:00Z","timestamp":1667779200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100012818","name":"Comunidad de Madrid","doi-asserted-by":"publisher","award":["S2018\/TCS-4339, RTI2018-102043-B-I00 MCIN\/AEI\/10.13039\/501100011033\/ERDF, PRE2019-088472\/MCIN\/AEI\/10.13039\/501100011033, IJC2020-043391-I\/MCIN\/AEI\/10.13039\/501100011033"],"award-info":[{"award-number":["S2018\/TCS-4339, RTI2018-102043-B-I00 MCIN\/AEI\/10.13039\/501100011033\/ERDF, PRE2019-088472\/MCIN\/AEI\/10.13039\/501100011033, IJC2020-043391-I\/MCIN\/AEI\/10.13039\/501100011033"]}],"id":[{"id":"10.13039\/100012818","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000006","name":"Office of Naval Research","doi-asserted-by":"publisher","award":["N00014-19-1-2292"],"award-info":[{"award-number":["N00014-19-1-2292"]}],"id":[{"id":"10.13039\/100000006","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,11,7]]},"DOI":"10.1145\/3548606.3560587","type":"proceedings-article","created":{"date-parts":[[2022,11,7]],"date-time":"2022-11-07T11:41:28Z","timestamp":1667821288000},"page":"1291-1305","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":22,"title":["Watch Your Back"],"prefix":"10.1145","author":[{"given":"Gibran","family":"Gomez","sequence":"first","affiliation":[{"name":"IMDEA Software Institute &amp; Universidad Polit\u00e9cnica de Madrid, Madrid, Spain"}]},{"given":"Pedro","family":"Moreno-Sanchez","sequence":"additional","affiliation":[{"name":"IMDEA Software Institute, Madrid, Spain"}]},{"given":"Juan","family":"Caballero","sequence":"additional","affiliation":[{"name":"IMDEA Software Institute, Madrid, Spain"}]}],"member":"320","published-online":{"date-parts":[[2022,11,7]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2014. BTC-E and Bitcointalk.org Hacked? https:\/\/www.reddit.com\/r\/Bitcoin\/comments\/2mc8nc.  2014. BTC-E and Bitcointalk.org Hacked? https:\/\/www.reddit.com\/r\/Bitcoin\/comments\/2mc8nc."},{"key":"e_1_3_2_1_2_1","unstructured":"2014. Warning: New email scam people are apparently falling for - \"secret doubling address\". https:\/\/www.reddit.com\/r\/Bitcoin\/comments\/2fq3uc.  2014. Warning: New email scam people are apparently falling for - \"secret doubling address\". https:\/\/www.reddit.com\/r\/Bitcoin\/comments\/2fq3uc."},{"key":"e_1_3_2_1_3_1","unstructured":"2019. Brief analysis of Redaman Banking Malware (v0.6.0.2) Sample. http: \/\/www.peppermalware.com\/2019\/11\/brief-analysis-of-redaman-banking.html.  2019. Brief analysis of Redaman Banking Malware (v0.6.0.2) Sample. http: \/\/www.peppermalware.com\/2019\/11\/brief-analysis-of-redaman-banking.html."},{"key":"e_1_3_2_1_4_1","unstructured":"2019. Coinpayments - Service Restriction Notice. https:\/\/bitcointalk.org\/index. php?topic=5156686.  2019. Coinpayments - Service Restriction Notice. https:\/\/bitcointalk.org\/index. php?topic=5156686."},{"key":"e_1_3_2_1_5_1","unstructured":"2019. Linux mining virus-sysupdate. https:\/\/programmerclick.com\/article\/47131149819\/.  2019. Linux mining virus-sysupdate. https:\/\/programmerclick.com\/article\/47131149819\/."},{"key":"e_1_3_2_1_6_1","unstructured":"2019. LocalBitcoins Statement on the Coming AML regulations and Compliance. https:\/\/localbitcoins.com\/blog\/aml-regulations-compliance.  2019. LocalBitcoins Statement on the Coming AML regulations and Compliance. https:\/\/localbitcoins.com\/blog\/aml-regulations-compliance."},{"key":"e_1_3_2_1_7_1","unstructured":"2020. Bitcoin Porn Scam and Sextortion. https:\/\/www.onlinethreatalerts.com\/article\/2020\/4\/9\/bitcoin-porn-scam-and-sextortion\/.  2020. Bitcoin Porn Scam and Sextortion. https:\/\/www.onlinethreatalerts.com\/article\/2020\/4\/9\/bitcoin-porn-scam-and-sextortion\/."},{"key":"e_1_3_2_1_8_1","unstructured":"2020. pr0fessionalcrackers telegram channel. https:\/\/ru.tgchannels.org\/channel\/MrPr0gr4mmer.  2020. pr0fessionalcrackers telegram channel. https:\/\/ru.tgchannels.org\/channel\/MrPr0gr4mmer."},{"key":"e_1_3_2_1_9_1","unstructured":"2022. Bitcoin Abuse. https:\/\/www.bitcoinabuse.com.  2022. Bitcoin Abuse. https:\/\/www.bitcoinabuse.com."},{"key":"e_1_3_2_1_10_1","unstructured":"2022. Bitcoin Explorer. https:\/\/www.blockchain.com\/explorer.  2022. Bitcoin Explorer. https:\/\/www.blockchain.com\/explorer."},{"key":"e_1_3_2_1_11_1","unstructured":"2022. Bitcoin OTC. https:\/\/bitcoin-otc.com.  2022. Bitcoin OTC. https:\/\/bitcoin-otc.com."},{"key":"e_1_3_2_1_12_1","unstructured":"2022. Bitcoin Talk Forum. https:\/\/bitcointalk.org.  2022. Bitcoin Talk Forum. https:\/\/bitcointalk.org."},{"key":"e_1_3_2_1_13_1","unstructured":"2022. Chainalysis. https:\/\/www.chainalysis.com\/.  2022. Chainalysis. https:\/\/www.chainalysis.com\/."},{"key":"e_1_3_2_1_14_1","unstructured":"2022. Elliptic. https:\/\/www.elliptic.co\/.  2022. Elliptic. https:\/\/www.elliptic.co\/."},{"key":"e_1_3_2_1_15_1","unstructured":"2022. MINE.exchange. https:\/\/mine.exchange.  2022. MINE.exchange. https:\/\/mine.exchange."},{"key":"e_1_3_2_1_16_1","unstructured":"2022. Satoshi DICE. https:\/\/satoshidice.com\/.  2022. Satoshi DICE. https:\/\/satoshidice.com\/."},{"key":"e_1_3_2_1_17_1","unstructured":"2022. Wallet Explorer. https:\/\/www.walletexplorer.com\/info.  2022. Wallet Explorer. https:\/\/www.walletexplorer.com\/info."},{"key":"e_1_3_2_1_18_1","unstructured":"2022. Wasabi Wallet. https:\/\/wasabiwallet.io\/.  2022. Wasabi Wallet. https:\/\/wasabiwallet.io\/."},{"key":"e_1_3_2_1_19_1","unstructured":"2022. Watch your back repository. https:\/\/github.com\/cybersec-code\/watchyourback.  2022. Watch your back repository. https:\/\/github.com\/cybersec-code\/watchyourback."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"crossref","unstructured":"Elli Androulaki Ghassan O. Karame Marc Roeschlin Tobias Scherer and Srdjan Capkun. 2013. Evaluating User Privacy in Bitcoin. In Financial Cryptography and Data Security.  Elli Androulaki Ghassan O. Karame Marc Roeschlin Tobias Scherer and Srdjan Capkun. 2013. Evaluating User Privacy in Bitcoin. In Financial Cryptography and Data Security.","DOI":"10.1007\/978-3-642-39884-1_4"},{"key":"e_1_3_2_1_21_1","volume-title":"Data Mining for Detecting Bitcoin Ponzi Schemes. In Crypto Valley Conference on Blockchain Technology.","author":"Bartoletti M.","unstructured":"M. Bartoletti , B. Pes , and S. Serusi . 2018 . Data Mining for Detecting Bitcoin Ponzi Schemes. In Crypto Valley Conference on Blockchain Technology. M. Bartoletti, B. Pes, and S. Serusi. 2018. Data Mining for Detecting Bitcoin Ponzi Schemes. In Crypto Valley Conference on Blockchain Technology."},{"key":"e_1_3_2_1_22_1","unstructured":"Devon Beckett. 2021. Bitcoin Fog Affidavit by Internal Revenue Service. https:\/\/storage.courtlistener.com\/recap\/gov.uscourts.dcd.230456\/gov.uscourts.dcd.2 30456.1.11.pdf.  Devon Beckett. 2021. Bitcoin Fog Affidavit by Internal Revenue Service. https:\/\/storage.courtlistener.com\/recap\/gov.uscourts.dcd.230456\/gov.uscourts.dcd.2 30456.1.11.pdf."},{"key":"e_1_3_2_1_23_1","volume-title":"GoodFATR: A Platform for Automated Threat Report Collection and IOC Extraction. CoRR abs\/2208.00042 (July","author":"Caballero Juan","year":"2022","unstructured":"Juan Caballero , Gibran Gomez , Srdjan Matic , Gustavo S\u00e1nchez , Silvia Sebasti\u00e1n , and Arturo Villaca\u00f1as . 2022. GoodFATR: A Platform for Automated Threat Report Collection and IOC Extraction. CoRR abs\/2208.00042 (July 2022 ). https: \/\/doi.org\/10.48550\/arXiv.2208.00042 10.48550\/arXiv.2208.00042 Juan Caballero, Gibran Gomez, Srdjan Matic, Gustavo S\u00e1nchez, Silvia Sebasti\u00e1n, and Arturo Villaca\u00f1as. 2022. GoodFATR: A Platform for Automated Threat Report Collection and IOC Extraction. CoRR abs\/2208.00042 (July 2022). https: \/\/doi.org\/10.48550\/arXiv.2208.00042"},{"key":"e_1_3_2_1_24_1","unstructured":"CERT Polska. 2015. Case Study of Malicious Actors: Going Postal. https: \/\/maldroid.github.io\/docs\/ThePostalGroup.pdf.  CERT Polska. 2015. Case Study of Malicious Actors: Going Postal. https: \/\/maldroid.github.io\/docs\/ThePostalGroup.pdf."},{"key":"e_1_3_2_1_25_1","volume-title":"The World Wide Web Conference.","author":"Christin Nicolas","year":"2013","unstructured":"Nicolas Christin . 2013 . Traveling the Silk Road: A measurement analysis of a large anonymous online marketplace . In The World Wide Web Conference. Nicolas Christin. 2013. Traveling the Silk Road: A measurement analysis of a large anonymous online marketplace. In The World Wide Web Conference."},{"key":"e_1_3_2_1_26_1","volume-title":"Concentrating Correctly on Cybercrime Concentration. In Workshop on Economics of the Information Society.","author":"Clayton Richard","year":"2015","unstructured":"Richard Clayton , Tyler Moore , and Nicolas Christin . 2015 . Concentrating Correctly on Cybercrime Concentration. In Workshop on Economics of the Information Society. Richard Clayton, Tyler Moore, and Nicolas Christin. 2015. Concentrating Correctly on Cybercrime Concentration. In Workshop on Economics of the Information Society."},{"key":"e_1_3_2_1_27_1","unstructured":"UK Gambling Commission. 2020. LCCP Condition 17.1.1 - Customer identity verification. https:\/\/www.gamblingcommission.gov.uk\/licensees-and-businesses\/lccp\/condition\/17-1-1-customer-identity-verification.  UK Gambling Commission. 2020. LCCP Condition 17.1.1 - Customer identity verification. https:\/\/www.gamblingcommission.gov.uk\/licensees-and-businesses\/lccp\/condition\/17-1-1-customer-identity-verification."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.08.008"},{"key":"e_1_3_2_1_29_1","unstructured":"Nikhilesh De. 2021. US Officials Arrest Alleged Operator of $336M Bitcoin Mixing Service. https:\/\/www.coindesk.com\/us-officials-arrest-alleged-operator-of- 336m-bitcoin-mixing-service.  Nikhilesh De. 2021. US Officials Arrest Alleged Operator of $336M Bitcoin Mixing Service. https:\/\/www.coindesk.com\/us-officials-arrest-alleged-operator-of- 336m-bitcoin-mixing-service."},{"key":"e_1_3_2_1_30_1","unstructured":"Kobi Eisenkraft and Arie Olshtein. 2019. Pony's C&C servers hidden inside the Bitcoin blockchain. https:\/\/research.checkpoint.com\/2019\/ponys-cc-servers-hidden-inside-the-bitcoin-blockchain\/.  Kobi Eisenkraft and Arie Olshtein. 2019. Pony's C&C servers hidden inside the Bitcoin blockchain. https:\/\/research.checkpoint.com\/2019\/ponys-cc-servers-hidden-inside-the-bitcoin-blockchain\/."},{"key":"e_1_3_2_1_31_1","unstructured":"Europol. 2019. Multi-million euro cryptocurrency laundering service Bestmixer.iotaken down. https:\/\/www.europol.europa.eu\/newsroom\/news\/multi-million-euro-cryptocurrency-laundering-service-bestmixerio-taken-down.  Europol. 2019. Multi-million euro cryptocurrency laundering service Bestmixer.iotaken down. https:\/\/www.europol.europa.eu\/newsroom\/news\/multi-million-euro-cryptocurrency-laundering-service-bestmixerio-taken-down."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1093\/bjc\/azh019"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2018-0038"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560587"},{"key":"e_1_3_2_1_35_1","volume-title":"Breaking Bad: De-Anonymising Entity Types on the Bitcoin Blockchain Using Supervised Machine Learning. In Hawaii International Conference on System Sciences.","author":"Harlev Mikkel Alexander","year":"2018","unstructured":"Mikkel Alexander Harlev , Haohua Sun Yin , Klaus Christian Langenheldt , Raghava Rao Mukkamala , and Ravi Vatrapu . 2018 . Breaking Bad: De-Anonymising Entity Types on the Bitcoin Blockchain Using Supervised Machine Learning. In Hawaii International Conference on System Sciences. Mikkel Alexander Harlev, Haohua Sun Yin, Klaus Christian Langenheldt, Raghava Rao Mukkamala, and Ravi Vatrapu. 2018. Breaking Bad: De-Anonymising Entity Types on the Bitcoin Blockchain Using Supervised Machine Learning. In Hawaii International Conference on System Sciences."},{"key":"e_1_3_2_1_36_1","unstructured":"David Harley and Aleksandr Matrosov. 2011. TDL4 and Glupteba: Piggyback PiggyBugs. https:\/\/www.welivesecurity.com\/2011\/03\/02\/tdl4-and-glubteba-piggyback-piggybugs\/h.  David Harley and Aleksandr Matrosov. 2011. TDL4 and Glupteba: Piggyback PiggyBugs. https:\/\/www.welivesecurity.com\/2011\/03\/02\/tdl4-and-glubteba-piggyback-piggybugs\/h."},{"key":"e_1_3_2_1_37_1","volume-title":"SEMANTiCS Conference.","author":"Haslhofer Bernhard","year":"2016","unstructured":"Bernhard Haslhofer , Roman Karl , and Erwin Filtz . 2016 . O Bitcoin Where Art Thou? Insight into Large-Scale Transaction Graphs . In SEMANTiCS Conference. Bernhard Haslhofer, Roman Karl, and Erwin Filtz. 2016. O Bitcoin Where Art Thou? Insight into Large-Scale Transaction Graphs. In SEMANTiCS Conference."},{"key":"e_1_3_2_1_38_1","unstructured":"Jaromir Horejsi and Joseph C Chen Salgado. 2019. Glupteba Hits Routers and Updates C&C Servers. https:\/\/www.trendmicro.com\/enus\/research\/19\/i\/glupteba-campaign-hits-network-routers-and-updates-cc-servers-with-data-from-bitcoin-transactions.html.  Jaromir Horejsi and Joseph C Chen Salgado. 2019. Glupteba Hits Routers and Updates C&C Servers. https:\/\/www.trendmicro.com\/enus\/research\/19\/i\/glupteba-campaign-hits-network-routers-and-updates-cc-servers-with-data-from-bitcoin-transactions.html."},{"key":"e_1_3_2_1_39_1","volume-title":"Tracking Ransomware End-to-end. In IEEE Symposium on Security and Privacy.","author":"Huang D. Y.","unstructured":"D. Y. Huang , M. M. Aliapoulios , V. G. Li , L. Invernizzi , E. Bursztein , K. McRoberts , J. Levin , K. Levchenko , A. C. Snoeren , and D. McCoy . 2018 . Tracking Ransomware End-to-end. In IEEE Symposium on Security and Privacy. D. Y. Huang, M. M. Aliapoulios, V. G. Li, L. Invernizzi, E. Bursztein, K. McRoberts, J. Levin, K. Levchenko, A. C. Snoeren, and D. McCoy. 2018. Tracking Ransomware End-to-end. In IEEE Symposium on Security and Privacy."},{"key":"e_1_3_2_1_40_1","unstructured":"Shane Huntley and Luca Nagy. 2021. Disrupting the Glupteba operation. https:\/\/blog.google\/threat-analysis-group\/disrupting-glupteba-operation\/.  Shane Huntley and Luca Nagy. 2021. Disrupting the Glupteba operation. https:\/\/blog.google\/threat-analysis-group\/disrupting-glupteba-operation\/."},{"key":"e_1_3_2_1_41_1","unstructured":"Augusto Remillano II Jakub Urbanec and Wilbert Luy Saias. 2019. Skidmap Malware Uses Rootkit to Hide Mining Payload. https:\/\/www.trendmicro.com\/enus\/research\/19\/i\/skidmap-linux-malware-uses-rootkit-capabilities-to-hide-cryptocurrency-mining-payload.html.  Augusto Remillano II Jakub Urbanec and Wilbert Luy Saias. 2019. Skidmap Malware Uses Rootkit to Hide Mining Payload. https:\/\/www.trendmicro.com\/enus\/research\/19\/i\/skidmap-linux-malware-uses-rootkit-capabilities-to-hide-cryptocurrency-mining-payload.html."},{"key":"e_1_3_2_1_42_1","volume-title":"Characterizing Entities in the Bitcoin Blockchain. In IEEE International Conference on Data Mining Workshops.","author":"Jourdan Marc","year":"2018","unstructured":"Marc Jourdan , Sebastien Blandin , Laura Wynter , and Pralhad Deshpande . 2018 . Characterizing Entities in the Bitcoin Blockchain. In IEEE International Conference on Data Mining Workshops. Marc Jourdan, Sebastien Blandin, Laura Wynter, and Pralhad Deshpande. 2018. Characterizing Entities in the Bitcoin Blockchain. In IEEE International Conference on Data Mining Workshops."},{"key":"e_1_3_2_1_43_1","volume-title":"USENIX Security Symposium.","author":"Kalodner Harry","year":"2020","unstructured":"Harry Kalodner , Malte M\u00f6ser , Kevin Lee , Steven Goldfeder , Martin Plattner , Alishah Chator , and Arvind Narayanan . 2020 . BlockSci: Design and Applications of a Blockchain Analysis Platform . In USENIX Security Symposium. Harry Kalodner, Malte M\u00f6ser, Kevin Lee, Steven Goldfeder, Martin Plattner, Alishah Chator, and Arvind Narayanan. 2020. BlockSci: Design and Applications of a Blockchain Analysis Platform. In USENIX Security Symposium."},{"key":"e_1_3_2_1_44_1","volume-title":"Masad Stealer: Exfiltrating using Telegram. https:\/\/blogs.juniper.net\/en-us\/threat-research\/masad-stealer-exfiltrating-using-telegram.","author":"Kimayong Paul","year":"2019","unstructured":"Paul Kimayong . 2019 . Masad Stealer: Exfiltrating using Telegram. https:\/\/blogs.juniper.net\/en-us\/threat-research\/masad-stealer-exfiltrating-using-telegram. Paul Kimayong. 2019. Masad Stealer: Exfiltrating using Telegram. https:\/\/blogs.juniper.net\/en-us\/threat-research\/masad-stealer-exfiltrating-using-telegram."},{"key":"e_1_3_2_1_45_1","unstructured":"Brian Krebs. 2022. Conti Ransomware Group Diaries Part I: Evasion. https:\/\/krebsonsecurity.com\/2022\/03\/conti-ransomware-group-diaries-part-i-evasion\/.  Brian Krebs. 2022. Conti Ransomware Group Diaries Part I: Evasion. https:\/\/krebsonsecurity.com\/2022\/03\/conti-ransomware-group-diaries-part-i-evasion\/."},{"key":"e_1_3_2_1_46_1","volume-title":"Cybercriminal Minds: An Investigative Study of Cryptocurrency Abuses in the Dark Web. In Network and Distributed Systems Security Symposium.","author":"Lee Seunghyeon","year":"2019","unstructured":"Seunghyeon Lee , Changhoon Yoon , Heedo Kang , Yeonkeun Kim , Yongdae Kim , Dongsu Han , Sooel Son , and Seungwon Shin . 2019 . Cybercriminal Minds: An Investigative Study of Cryptocurrency Abuses in the Dark Web. In Network and Distributed Systems Security Symposium. Seunghyeon Lee, Changhoon Yoon, Heedo Kang, Yeonkeun Kim, Yongdae Kim, Dongsu Han, Sooel Son, and Seungwon Shin. 2019. Cybercriminal Minds: An Investigative Study of Cryptocurrency Abuses in the Dark Web. In Network and Distributed Systems Security Symposium."},{"key":"e_1_3_2_1_47_1","volume-title":"Behind Closed Doors: Measurement and Analysis of CryptoLocker Ransoms in Bitcoin. In APWG Symposium on Electronic Crime Research.","author":"Liao K.","unstructured":"K. Liao , Z. Zhao , A. Doupe , and G. Ahn . 2016 . Behind Closed Doors: Measurement and Analysis of CryptoLocker Ransoms in Bitcoin. In APWG Symposium on Electronic Crime Research. K. Liao, Z. Zhao, A. Doupe, and G. Ahn. 2016. Behind Closed Doors: Measurement and Analysis of CryptoLocker Ransoms in Bitcoin. In APWG Symposium on Electronic Crime Research."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978315"},{"key":"e_1_3_2_1_49_1","volume-title":"IEEE International Conference on Blockchain and Cryptocurrency.","author":"Lin Y.","unstructured":"Y. Lin , P. Wu , C. Hsu , I. Tu , and S. Liao . 2019. An Evaluation of Bitcoin Address Classification based on Transaction History Summarization . In IEEE International Conference on Blockchain and Cryptocurrency. Y. Lin, P. Wu, C. Hsu, I. Tu, and S. Liao. 2019. An Evaluation of Bitcoin Address Classification based on Transaction History Summarization. In IEEE International Conference on Blockchain and Cryptocurrency."},{"key":"e_1_3_2_1_50_1","unstructured":"Gil Mansharov and Alexey Bukhteyev. 2019. In the footsteps of a sextortion campaign. https:\/\/research.checkpoint.com\/2019\/in- the-footsteps-of-a-sextortion-campaign\/.  Gil Mansharov and Alexey Bukhteyev. 2019. In the footsteps of a sextortion campaign. https:\/\/research.checkpoint.com\/2019\/in- the-footsteps-of-a-sextortion-campaign\/."},{"key":"e_1_3_2_1_51_1","unstructured":"Gregory Maxwell. 2013. CoinJoin: Bitcoin privacy for the real world. https:\/\/bitcointalk.org\/index.php?topic=279249.0.  Gregory Maxwell. 2013. CoinJoin: Bitcoin privacy for the real world. https:\/\/bitcointalk.org\/index.php?topic=279249.0."},{"key":"e_1_3_2_1_52_1","volume-title":"PharmaLeaks: Understanding the Business of Online Pharmaceutical Affiliate Programs. In USENIX Security Symposium.","author":"McCoy Damon","year":"2012","unstructured":"Damon McCoy , Andreas Pitsillidis , Jordan Grant , Nicholas Weaver , Christian Kreibich , Brian Krebs , Geoffrey Voelker , Stefan Savage , and Kirill Levchenko . 2012 . PharmaLeaks: Understanding the Business of Online Pharmaceutical Affiliate Programs. In USENIX Security Symposium. Damon McCoy, Andreas Pitsillidis, Jordan Grant, Nicholas Weaver, Christian Kreibich, Brian Krebs, Geoffrey Voelker, Stefan Savage, and Kirill Levchenko. 2012. PharmaLeaks: Understanding the Business of Online Pharmaceutical Affiliate Programs. In USENIX Security Symposium."},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/2504730.2504747"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"crossref","unstructured":"M. M\u00f6ser R. B\u00f6hme and D. Breuker. 2013. An Inquiry into Money Laundering Tools in the Bitcoin Ecosystem. In APWG eCrime Researchers Summit.  M. M\u00f6ser R. B\u00f6hme and D. Breuker. 2013. An Inquiry into Money Laundering Tools in the Bitcoin Ecosystem. In APWG eCrime Researchers Summit.","DOI":"10.1109\/eCRS.2013.6805780"},{"key":"e_1_3_2_1_55_1","volume-title":"Glupteba: Hidden Malware Delivery in Plain Sight. https:\/\/news.sophos.com\/wp-content\/uploads\/2020\/06\/gluptebaf inal.pdf.","author":"Nagy Luca","year":"2020","unstructured":"Luca Nagy . 2020 . Glupteba: Hidden Malware Delivery in Plain Sight. https:\/\/news.sophos.com\/wp-content\/uploads\/2020\/06\/gluptebaf inal.pdf. Luca Nagy. 2020. Glupteba: Hidden Malware Delivery in Plain Sight. https:\/\/news.sophos.com\/wp-content\/uploads\/2020\/06\/gluptebaf inal.pdf."},{"key":"e_1_3_2_1_56_1","volume-title":"Bitcoin: A Peer-to-Peer Electronic Cash System.","author":"Nakamoto Satoshi","year":"2008","unstructured":"Satoshi Nakamoto . 2008 . Bitcoin: A Peer-to-Peer Electronic Cash System. (2008). https:\/\/bitcoin.org\/bitcoin.pdf. Satoshi Nakamoto. 2008. Bitcoin: A Peer-to-Peer Electronic Cash System. (2008). https:\/\/bitcoin.org\/bitcoin.pdf."},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1093\/cybsec\/tyz003"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/3318041.3355466"},{"key":"e_1_3_2_1_59_1","volume-title":"IEEE Conference on Communications and Network Security.","author":"Pletinckx S.","unstructured":"S. Pletinckx , C. Trap , and C. Doerr . 2018. Malware Coordination using the Blockchain: An Analysis of the Cerber Ransomware . In IEEE Conference on Communications and Network Security. S. Pletinckx, C. Trap, and C. Doerr. 2018. Malware Coordination using the Blockchain: An Analysis of the Cerber Ransomware. In IEEE Conference on Communications and Network Security."},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/3097983.3098082"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"crossref","unstructured":"Dorit Ron and Adi Shamir. 2013. Quantitative Analysis of the Full Bitcoin Transaction Graph. In Financial Cryptography and Data Security.  Dorit Ron and Adi Shamir. 2013. Quantitative Analysis of the Full Bitcoin Transaction Graph. In Financial Cryptography and Data Security.","DOI":"10.1007\/978-3-642-39884-1_2"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"crossref","unstructured":"Dorit Ron and Adi Shamir. 2014. How Did Dread Pirate Roberts Acquire and Protect his Bitcoin Wealth?. In Financial Cryptography and Data Security.  Dorit Ron and Adi Shamir. 2014. How Did Dread Pirate Roberts Acquire and Protect his Bitcoin Wealth?. In Financial Cryptography and Data Security.","DOI":"10.1007\/978-3-662-44774-1_1"},{"key":"e_1_3_2_1_63_1","unstructured":"Jan Rub\u00edn. 2019. Clipsa - Multipurpose password stealer. https:\/\/decoded.avast.io\/janrubin\/clipsa-multipurpose-password-stealer\/.  Jan Rub\u00edn. 2019. Clipsa - Multipurpose password stealer. https:\/\/decoded.avast.io\/janrubin\/clipsa-multipurpose-password-stealer\/."},{"key":"e_1_3_2_1_64_1","unstructured":"Evyatar Saias. 2021. Bitcoins blockchains and botnets. https:\/\/blogs.akamai.com\/sitr\/2021\/02\/bitcoins-blockchains-and-botnets.html.  Evyatar Saias. 2021. Bitcoins blockchains and botnets. https:\/\/blogs.akamai.com\/sitr\/2021\/02\/bitcoins-blockchains-and-botnets.html."},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"crossref","unstructured":"Michele Spagnuolo Federico Maggi and Stefano Zanero. 2014. BitIodine: Extracting Intelligence from the Bitcoin Network. In Financial Cryptography and Data Security.  Michele Spagnuolo Federico Maggi and Stefano Zanero. 2014. BitIodine: Extracting Intelligence from the Bitcoin Network. In Financial Cryptography and Data Security.","DOI":"10.1007\/978-3-662-45472-5_29"},{"key":"e_1_3_2_1_66_1","volume-title":"Analysis and Takeover of the Bitcoin-Coordinated Pony Malware. In ACM ASIA Conference on Computer and Communications Security.","author":"Taniguchi Tsuyoshi","year":"2021","unstructured":"Tsuyoshi Taniguchi , Harm Griffioen , and Christian Doerr . 2021 . Analysis and Takeover of the Bitcoin-Coordinated Pony Malware. In ACM ASIA Conference on Computer and Communications Security. Tsuyoshi Taniguchi, Harm Griffioen, and Christian Doerr. 2021. Analysis and Takeover of the Bitcoin-Coordinated Pony Malware. In ACM ASIA Conference on Computer and Communications Security."},{"key":"e_1_3_2_1_67_1","volume-title":"SoK: Cryptojacking Malware. In IEEE European Symposium on Security and Privacy.","author":"Tekiner Ege","year":"2021","unstructured":"Ege Tekiner , Abbas Acar , A. Selcuk Uluagac , Engin Kirda , and Ali Aydin Sel\u00e7uk . 2021 . SoK: Cryptojacking Malware. In IEEE European Symposium on Security and Privacy. Ege Tekiner, Abbas Acar, A. Selcuk Uluagac, Engin Kirda, and Ali Aydin Sel\u00e7uk. 2021. SoK: Cryptojacking Malware. In IEEE European Symposium on Security and Privacy."},{"key":"e_1_3_2_1_68_1","volume-title":"Best Crypto Exchanges For","author":"Tepper Taylor","year":"2021","unstructured":"Taylor Tepper and John Schmidt . 2021. Best Crypto Exchanges For 2021 . https: \/\/www.forbes.com\/advisor\/investing\/best-crypto-exchanges\/. Taylor Tepper and John Schmidt. 2021. Best Crypto Exchanges For 2021. https: \/\/www.forbes.com\/advisor\/investing\/best-crypto-exchanges\/."},{"key":"e_1_3_2_1_69_1","unstructured":"US Department of Justice. 2017. Russian National And Bitcoin Exchange Charged In 21-Count Indictment For Operating Alleged International Money Laundering Scheme And Allegedly Laundering Funds From Hack Of Mt. Gox. https: \/\/www.justice.gov\/usao-ndca\/pr\/russian-national-and-bitcoin-exchange-charged-21-count-indictment-operating-alleged.  US Department of Justice. 2017. Russian National And Bitcoin Exchange Charged In 21-Count Indictment For Operating Alleged International Money Laundering Scheme And Allegedly Laundering Funds From Hack Of Mt. Gox. https: \/\/www.justice.gov\/usao-ndca\/pr\/russian-national-and-bitcoin-exchange-charged-21-count-indictment-operating-alleged."},{"key":"e_1_3_2_1_70_1","unstructured":"Shaun Waterman. 2017. European police take down criminals behind two big ransomware strains. https:\/\/www.cyberscoop.com\/ctb-locker-cerber-ransomware-arrests-europol-mcafee\/.  Shaun Waterman. 2017. European police take down criminals behind two big ransomware strains. https:\/\/www.cyberscoop.com\/ctb-locker-cerber-ransomware-arrests-europol-mcafee\/."},{"key":"e_1_3_2_1_71_1","volume-title":"IEEE International Conference on Big Data.","author":"Yin Haohua Sun","year":"2017","unstructured":"Haohua Sun Yin and Ravi Vatrapu . 2017 . A First Estimation of the Proportion of Cybercriminal Entities in the Bitcoin Ecosystem using Supervised Machine Learning . In IEEE International Conference on Big Data. Haohua Sun Yin and Ravi Vatrapu. 2017. A First Estimation of the Proportion of Cybercriminal Entities in the Bitcoin Ecosystem using Supervised Machine Learning. In IEEE International Conference on Big Data."},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2018.00039"}],"event":{"name":"CCS '22: 2022 ACM SIGSAC Conference on Computer and Communications Security","location":"Los Angeles CA USA","acronym":"CCS '22","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3548606.3560587","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3548606.3560587","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3548606.3560587","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:50:57Z","timestamp":1750182657000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3548606.3560587"}},"subtitle":["Identifying Cybercrime Financial Relationships in Bitcoin through Back-and-Forth Exploration"],"short-title":[],"issued":{"date-parts":[[2022,11,7]]},"references-count":72,"alternative-id":["10.1145\/3548606.3560587","10.1145\/3548606"],"URL":"https:\/\/doi.org\/10.1145\/3548606.3560587","relation":{},"subject":[],"published":{"date-parts":[[2022,11,7]]},"assertion":[{"value":"2022-11-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}