{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,15]],"date-time":"2026-01-15T09:37:48Z","timestamp":1768469868462,"version":"3.49.0"},"reference-count":38,"publisher":"Institute of Electronics, Information and Communications Engineers (IEICE)","issue":"7","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEICE Trans. Inf. &amp; Syst."],"published-print":{"date-parts":[[2022,7,1]]},"DOI":"10.1587\/transinf.2021edp7182","type":"journal-article","created":{"date-parts":[[2022,6,30]],"date-time":"2022-06-30T22:18:29Z","timestamp":1656627509000},"page":"1296-1307","source":"Crossref","is-referenced-by-count":5,"title":["A Large-Scale Bitcoin Abuse Measurement and Clustering Analysis Utilizing Public Reports"],"prefix":"10.1587","volume":"E105.D","author":[{"given":"Jinho","family":"CHOI","sequence":"first","affiliation":[{"name":"KAIST"}]},{"given":"Jaehan","family":"KIM","sequence":"additional","affiliation":[{"name":"KAIST"}]},{"given":"Minkyoo","family":"SONG","sequence":"additional","affiliation":[{"name":"KAIST"}]},{"given":"Hanna","family":"KIM","sequence":"additional","affiliation":[{"name":"KAIST"}]},{"given":"Nahyeon","family":"PARK","sequence":"additional","affiliation":[{"name":"KAIST"}]},{"given":"Minjae","family":"SEO","sequence":"additional","affiliation":[{"name":"KAIST"}]},{"given":"Youngjin","family":"JIN","sequence":"additional","affiliation":[{"name":"KAIST"}]},{"given":"Seungwon","family":"SHIN","sequence":"additional","affiliation":[{"name":"KAIST"}]}],"member":"532","reference":[{"key":"1","unstructured":"[1] S. Nakamoto, \u201cBitcoin: A peer-to-peer electronic cash system,\u201d Decentralized Business Review, 21260, 2008."},{"key":"2","unstructured":"[2] G. Wood, \u201cEthereum: A secure decentralised generalised transaction ledger,\u201d Ethereum project yellow paper, vol.151, no.2014, pp.1-32, 2014."},{"key":"3","doi-asserted-by":"crossref","unstructured":"[3] P.M. Krafft, N.D. Penna, and A.S. Pentland, \u201cAn experimental study of cryptocurrency market dynamics,\u201d Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, pp.1-13, 2018. 10.1145\/3173574.3174179","DOI":"10.1145\/3173574.3174179"},{"key":"4","doi-asserted-by":"crossref","unstructured":"[4] N. Christin, \u201cTraveling the Silk Road: A measurement analysis of a large anonymous online marketplace,\u201d Proceedings of the 22nd international conference on World Wide Web, pp.213-224, 2013. 10.1145\/2488388.2488408","DOI":"10.1145\/2488388.2488408"},{"key":"5","doi-asserted-by":"publisher","unstructured":"[5] S. Kethineni, Y. Cao, and C. Dodge, \u201cUse of bitcoin in darknet markets: Examining facilitative factors on bitcoin-related crimes,\u201d American Journal of Criminal Justice, vol.43, no.2, pp.141-157, 2018. 10.1007\/s12103-017-9394-6","DOI":"10.1007\/s12103-017-9394-6"},{"key":"6","unstructured":"[6] T. Pham and S. Lee, \u201cAnomaly detection in bitcoin network using unsupervised learning methods,\u201d arXiv preprint arXiv:1611.03941, 2016."},{"key":"7","doi-asserted-by":"crossref","unstructured":"[7] P. Monamo, V. Marivate, and B. Twala, \u201cUnsupervised learning for robust Bitcoin fraud detection,\u201d 2016 Information Security for South Africa (ISSA), IEEE, 2016. 10.1109\/issa.2016.7802939","DOI":"10.1109\/ISSA.2016.7802939"},{"key":"8","unstructured":"[8] R. Grinberg, \u201cBitcoin: An innovative alternative digital currency,\u201d Hastings Science &amp; Technology Law Journal, vol.4, p.160, 2011."},{"key":"9","unstructured":"[9] D.L.K. Chuen, ed., Handbook of Digital Currency: Bitcoin, innovation, financial instruments, and big data, Academic Press, 2015."},{"key":"10","unstructured":"[10] S. Ahamad, M. Nair, and B. Varghese, \u201cA survey on crypto currencies,\u201d 4th International Conference on Advances in Computer Science, AETACS, Citeseer, 2013."},{"key":"11","doi-asserted-by":"crossref","unstructured":"[11] S. Foley, J.R. Karlsen, and T.J. Putni\u0146\u0161, \u201cSex, drugs, and bitcoin: How much illegal activity is financed through cryptocurrencies?,\u201d The Review of Financial Studies, vol.32, no.5, pp.1798-1853, 2019. 10.1093\/rfs\/hhz015","DOI":"10.1093\/rfs\/hhz015"},{"key":"12","doi-asserted-by":"crossref","unstructured":"[12] T. de Balthasar and J. Hernandez-Castro, \u201cAn analysis of bitcoin laundry services,\u201d Nordic Conference on Secure IT Systems. Springer, Cham, 2017. 10.1007\/978-3-319-70290-2_18","DOI":"10.1007\/978-3-319-70290-2_18"},{"key":"13","doi-asserted-by":"publisher","unstructured":"[13] M. Paquet-Clouston, B. Haslhofer, and B. Dupont, \u201cRansomware payments in the bitcoin ecosystem,\u201d Journal of Cybersecurity, vol.5, no.1, tyz003, 2019. 10.1093\/cybsec\/tyz003","DOI":"10.1093\/cybsec\/tyz003"},{"key":"14","doi-asserted-by":"crossref","unstructured":"[14] M. Paquet-Clouston, M. Romiti, B. Haslhofer, and T. Charvat, \u201cSpams meet cryptocurrencies: Sextortion in the bitcoin ecosystem,\u201d Proceedings of the 1st ACM conference on advances in financial technologies, pp.76-88, 2019. 10.1145\/3318041.3355466","DOI":"10.1145\/3318041.3355466"},{"key":"15","doi-asserted-by":"crossref","unstructured":"[15] P. Xia, et al., \u201cDon&apos;t fish in troubled waters! characterizing coronavirus-themed cryptocurrency scams,\u201d arXiv preprint arXiv:2007.13639, 2020.","DOI":"10.1109\/eCrime51433.2020.9493255"},{"key":"16","unstructured":"[16] H. Kalodner, et al., \u201cBlocksci: Design and applications of a blockchain analysis platform,\u201d 29th USENIX Security Symposium (USENIX Security 20), 2020."},{"key":"17","doi-asserted-by":"crossref","unstructured":"[17] T. Tironsakkul, M. Maarek, A. Eross, and M. Just, \u201cTracking mixed bitcoins,\u201d Data Privacy Management, Cryptocurrencies and Blockchain Technology. Springer, Cham, pp.447-457, 2020. 10.1007\/978-3-030-66172-4_29","DOI":"10.1007\/978-3-030-66172-4_29"},{"key":"18","doi-asserted-by":"crossref","unstructured":"[18] Y. Zhang, J. Wang, and F. Zhao, \u201cTransaction Community Identification in Bitcoin,\u201d 2020 13th International Symposium on Computational Intelligence and Design (ISCID), IEEE, 2020. 10.1109\/iscid51228.2020.00038","DOI":"10.1109\/ISCID51228.2020.00038"},{"key":"19","doi-asserted-by":"publisher","unstructured":"[19] Y. Zhang, J. Wang, and J. Luo, \u201cHeuristic-Based Address Clustering in Bitcoin,\u201d IEEE Access, vol.8, pp.210582-210591, 2020. 10.1109\/access.2020.3039570","DOI":"10.1109\/ACCESS.2020.3039570"},{"key":"20","doi-asserted-by":"crossref","unstructured":"[20] D.Y. Huang, M.M. Aliapoulios, V.G. Li, L. Invernizzi, E. Bursztein, K. McRoberts, J. Levin, K. Levchenko, A.C. Snoeren, and D. McCoy, \u201cTracking ransomware end-to-end,\u201d 2018 IEEE Symposium on Security and Privacy (SP), IEEE, 2018. 10.1109\/sp.2018.00047","DOI":"10.1109\/SP.2018.00047"},{"key":"21","doi-asserted-by":"crossref","unstructured":"[21] M. Bartoletti, B. Pes, and S. Serusi, \u201cData mining for detecting bitcoin ponzi schemes,\u201d 2018 Crypto Valley Conference on Blockchain Technology (CVCBT), IEEE, 2018. 10.1109\/cvcbt.2018.00014","DOI":"10.1109\/CVCBT.2018.00014"},{"key":"22","doi-asserted-by":"crossref","unstructured":"[22] S. Lee, C. Yoon, H. Kang, Y. Kim, Y. Kim, D. Han, S. Son, and S. Shin, \u201cCybercriminal minds: an investigative study of cryptocurrency abuses in the dark web,\u201d Network &amp; Distributed System Security Symposium, Internet Society, 2019. 10.14722\/ndss.2019.23055","DOI":"10.14722\/ndss.2019.23055"},{"key":"23","doi-asserted-by":"publisher","unstructured":"[23] S. Choi, K.-S. Choi, Y. Sungu-Eryilmaz, and H.-K. Park, \u201cIllegal Gambling and Its Operation via the Darknet and Bitcoin: An Application of Routine Activity Theory,\u201d International Journal of Cybersecurity Intelligence &amp; Cybercrime, vol.3, no.1, pp.3-23, 2020. 10.52306\/03010220htli7653","DOI":"10.52306\/03010220HTLI7653"},{"key":"24","unstructured":"[24] T.B. Team, Bitcoin abuse database, accessed 2020-10-30, available: https:\/\/www.bitcoinabuse.com\/, 2020."},{"key":"25","unstructured":"[25] Octolus and Zigi, GeoIPLookup, accessed 2021-05-04, available: https:\/\/geoiplookup.io\/, 2020."},{"key":"26","unstructured":"[26] IPQualityScore, accessed 2021-01-12, available: https:\/\/www.ipqualityscore.com\/free-ip-lookup-proxy-vpn-test"},{"key":"27","unstructured":"[27] J. Davies, Understanding IPv6: Understanding IPv6 _p3, Pearson Education, 2012."},{"key":"28","doi-asserted-by":"crossref","unstructured":"[28] R. Phillips and H. Wilder, \u201cTracing cryptocurrency scams: Clustering replicated advance-fee and phishing websites,\u201d 2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), IEEE, 2020. 10.1109\/icbc48266.2020.9169433","DOI":"10.1109\/ICBC48266.2020.9169433"},{"key":"29","doi-asserted-by":"publisher","unstructured":"[29] H.S. Lallie, L.A. Shepherd, J.R.C. Nurse, A. Erola, G. Epiphaniou, C. Maple, and X. Bellekens, \u201cCyber security in the age of covid-19: A timeline and analysis of cyber-crime and cyber-attacks during the pandemic,\u201d Computers &amp; Security, vol.105, 102248, 2021. 10.1016\/j.cose.2021.102248","DOI":"10.1016\/j.cose.2021.102248"},{"key":"30","unstructured":"[30] H. Partz, Scammers impersonate world health organization to steal btc covid-19 donations, accessed 2021-05-11, available: https:\/\/cointelegraph.com\/news\/scammers-impersonate-world-health-organization-to-steal-btc-covid-19-donations, 2020."},{"key":"31","unstructured":"[31] Y. Sapkale, Sextortion scams surging during COVID-19 pandemic and work from home environment, accessed 2021-05-11, available: https:\/\/www.moneylife.in\/article\/sextortion-scams-surging-during-covid-19-pandemic-and-work-from-home-environment\/62993.html, 2021."},{"key":"32","unstructured":"[32] FBI.gov., FBI expects a rise in scams involving cryptocurrency related to the COVID-19 pandemic, accessed 2021-12-11, available: https:\/\/www.fbi.gov\/news\/pressrel\/press-releases\/fbi-expects-a-rise-in-scams-involving-cryptocurrency-related-to-the-covid-19-pandemic, 2020."},{"key":"33","unstructured":"[33] J. Gil-Pulgar, Brazil: Highest inflation in 4 year propels bitcoin volume to record highs, accessed 2021-05-13, available: https:\/\/bitcoinist.com\/brazil-highest-inflation-in-4-years-amid-record-bitcoin-trading-volume\/, 2019."},{"key":"34","unstructured":"[34] S. Shinde and N. Alawadhi, India becomes favourite destination for cyber criminals amid covid-19, accessed 2021-05-13, available: https:\/\/www.business-standard.com\/article\/technology\/india-becomes-favourite-destination-for-cyber-criminals-amid-covid-19-121040501218_1.html, 2021."},{"key":"35","unstructured":"[35] A. Akwagyiram and T. Wilson, How bitcoin met the real world in Africa, accessed 2021-05-13, available: https:\/\/www.reuters.com\/article\/us-crypto-currencies-africa-insight-idUSKBN25Z0Q8, 2020."},{"key":"36","unstructured":"[36] C. Cimpanu, Bitcoin wallet update trick has netted criminals more than $22 million, accessed 2021-05-15, available: https:\/\/www.zdnet.com\/article\/bitcoin-wallet-trick-has-netted-criminals-more-than-22-million\/, 2020."},{"key":"37","unstructured":"[37] Googlesite, Cloud token wallet: Decentralized wallet-is cloud token Ponzi scheme or scam?, accessed 2021-05-15, available: https:\/\/sites.google.com\/view\/cloud-tokenwallet\/blogs\/is-cloud-token-ponzi-scheme-or-scam, 2019."},{"key":"38","doi-asserted-by":"publisher","unstructured":"[38] J. Choi, T. Lee, K. Kim, M. Seo, J. Cui, and S. Shin, \u201cDiscovering message templates on large scale Bitcoin abuse reports using a two-fold NLP-based clustering method,\u201d IEICE Trans. Inf. &amp; Syst., vol.E105-D, no.4, pp.824-827, April 2022. DOI:10.1587\/transinf. 2021EDL8092 10.1587\/transinf.2021edl8092","DOI":"10.1587\/transinf.2021EDL8092"}],"container-title":["IEICE Transactions on Information and Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E105.D\/7\/E105.D_2021EDP7182\/_pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,2]],"date-time":"2022-07-02T04:40:45Z","timestamp":1656736845000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E105.D\/7\/E105.D_2021EDP7182\/_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,1]]},"references-count":38,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2022]]}},"URL":"https:\/\/doi.org\/10.1587\/transinf.2021edp7182","relation":{},"ISSN":["0916-8532","1745-1361"],"issn-type":[{"value":"0916-8532","type":"print"},{"value":"1745-1361","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,7,1]]},"article-number":"2021EDP7182"}}