Cited 5 time in
Forensic investigation framework for cryptocurrency wallet in the end device
| DC Field | Value | Language |
|---|---|---|
| dc.contributor.author | Park, Ah-hyun | - |
| dc.contributor.author | Ryu, Hyejin | - |
| dc.contributor.author | Park, Woobeen | - |
| dc.contributor.author | Jeong, Doowon | - |
| dc.date.accessioned | 2024-08-08T10:00:48Z | - |
| dc.date.available | 2024-08-08T10:00:48Z | - |
| dc.date.issued | 2023-10 | - |
| dc.identifier.issn | 0167-4048 | - |
| dc.identifier.issn | 1872-6208 | - |
| dc.identifier.uri | https://scholarworks.dongguk.edu/handle/sw.dongguk/21088 | - |
| dc.description.abstract | Cryptocurrency is increasingly being utilized in criminal activities such as money laundering and the acquisition of illicit goods from darknet markets, due in part to its pseudonymous and decentralized nature. Despite this, there is currently no widely accepted digital forensic framework to assist in the investigation of cryptocurrency-related crimes. To address this gap, we propose a three-phase framework for the forensic examination of cryptocurrency wallets. This framework consists of three distinct stages: Forensic Readiness, Acquisition, and Investigation. The aim of this study is to offer investigators a standardized methodology for conducting cryptocurrency investigations. To assess the validity of our proposed framework, we conducted experiments using three well-known cryptocurrency wallets. The results of these experiments indicate that the proposed framework holds significant potential as a general framework for cryptocurrency forensics. | - |
| dc.format.extent | 13 | - |
| dc.language | 영어 | - |
| dc.language.iso | ENG | - |
| dc.publisher | ELSEVIER | - |
| dc.title | Forensic investigation framework for cryptocurrency wallet in the end device | - |
| dc.type | Article | - |
| dc.publisher.location | 네델란드 | - |
| dc.identifier.doi | 10.1016/j.cose.2023.103392 | - |
| dc.identifier.scopusid | 2-s2.0-85166285592 | - |
| dc.identifier.wosid | 001051676300001 | - |
| dc.identifier.bibliographicCitation | Computers & Security, v.133, pp 1 - 13 | - |
| dc.citation.title | Computers & Security | - |
| dc.citation.volume | 133 | - |
| dc.citation.startPage | 1 | - |
| dc.citation.endPage | 13 | - |
| dc.type.docType | Article | - |
| dc.description.isOpenAccess | Y | - |
| dc.description.journalRegisteredClass | scie | - |
| dc.description.journalRegisteredClass | scopus | - |
| dc.relation.journalResearchArea | Computer Science | - |
| dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
| dc.subject.keywordAuthor | Digital forensics | - |
| dc.subject.keywordAuthor | Cryptocurrency | - |
| dc.subject.keywordAuthor | Framework | - |
| dc.subject.keywordAuthor | Memory forensics | - |
| dc.subject.keywordAuthor | Disk forensics | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
30, Pildong-ro 1-gil, Jung-gu, Seoul, 04620, Republic of Korea+82-2-2260-3114
Copyright(c) 2023 DONGGUK UNIVERSITY. ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.
