Skip to main content

Tendrils of Crime: Visualizing the Diffusion of Stolen Bitcoins

  • Conference paper
  • First Online:
Graphical Models for Security (GraMSec 2018)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 11086))

Included in the following conference series:

Abstract

The first six months of 2018 have seen cryptocurrency thefts of $761 million, and the technology is also the latest and greatest tool for money laundering. This increase in crime has caused both researchers and law enforcement to look for ways to trace criminal proceeds. Although tracing algorithms have improved recently, they still yield an enormous amount of data of which very few datapoints are relevant or interesting to investigators, let alone ordinary bitcoin owners interested in provenance. In this work we describe efforts to visualize relevant data on a blockchain. To accomplish this we come up with a graphical model to represent the stolen coins and then implement this using a variety of visualization techniques.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Accessible at: https://github.com/TaintChain.

References

  1. Aghaseyedjavadi, A., Bloomer, B., Giudici, S.: Coin viz

    Google Scholar 

  2. Anderson, R., Shumailov, I., Ahmed, M.: Making bitcoin legal. In: Twenty-Sixth International Security Protocols Workshop (2018)

    Google Scholar 

  3. Anderson, R., Shumailov, I., Ahmed, M., Rietmann, A.: Bitcoin redux. In: 17th Annual Workshop on the Economics of Information Security (2018)

    Google Scholar 

  4. Battista, G.D., Donato, V.D., Patrignani, M., Pizzonia, M., Roselli, V., Tamassia, R.: Bitconeview: visualization of flows in the Bitcoin transaction graph. In: 2015 IEEE Symposium on Visualization for Cyber Security (VizSec), pp. 1–8 (2015)

    Google Scholar 

  5. McGinn, D., Birch, D., Akroyd, D., Molina-Solana, M., Guo, Y., Knottenbelt, W.J.: Visualizing dynamic bitcoin transaction patterns. Big Data 4(2), 109–119 (2016)

    Article  Google Scholar 

  6. Kinkeldey, C., Fekete, J.D., Isenberg, P.: BitConduite: visualizing and analyzing activity on the Bitcoin network. In: EuroVis 2017 - Eurographics Conference on Visualization, Posters Track (2017)

    Google Scholar 

  7. Lee, T.: A brief history of Bitcoin hacks and frauds. Ars Technica, 12 May 2017

    Google Scholar 

  8. Lu., W.: Bitcoin-tx-graph-visualizer. http://www.npmjs.com/package/bitcoin-tx-graphvisualizer

  9. Meiklejohn, S., et al.: A fistful of Bitcoins: characterizing payments among men with no names. In: Proceedings of the 2013 Conference on Internet Measurement Conference, IMC 2013, pp. 127–140. ACM, New York (2013). https://doi.org/10.1145/2504730.2504747

  10. Molina-Solana, M., Birch, D., Guo, Y.K.: Improving data exploration in graphs with fuzzy logic and large-scale visualisation. Appl. Soft Comput. 53, 227–235 (2017)

    Article  Google Scholar 

  11. Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2008). http://bitcoin.org/bitcoin.pdf

  12. Narayanan, A., Bonneau, J., Felten, E., Miller, A., Goldfeder, S.: Bitcoin and Cryptocurrency Technologies: A Comprehensive Introduction. Princeton University Press, Princeton (2016). https://books.google.co.uk/books?id=LchFDAAAQBAJ

  13. Reid, F., Harrigan, M.: An analysis of anonymity in the Bitcoin system. In: 2011 IEEE Third International Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third International Conference on Social Computing, pp. 1318–1326 (2011)

    Google Scholar 

  14. Reuters: Cryptocurrency exchange theft surges in first half of 2018: report. https://reut.rs/2KLI3ow

  15. Spagnuolo, M., Maggi, F., Zanero, S.: BitIodine: extracting intelligence from the Bitcoin network. In: Christin, N., Safavi-Naini, R. (eds.) FC 2014. LNCS, vol. 8437, pp. 457–468. Springer, Heidelberg (2014). https://doi.org/10.1007/978-3-662-45472-5_29

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mansoor Ahmed .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Ahmed, M., Shumailov, I., Anderson, R. (2019). Tendrils of Crime: Visualizing the Diffusion of Stolen Bitcoins. In: Cybenko, G., Pym, D., Fila, B. (eds) Graphical Models for Security. GraMSec 2018. Lecture Notes in Computer Science(), vol 11086. Springer, Cham. https://doi.org/10.1007/978-3-030-15465-3_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-15465-3_1

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-15464-6

  • Online ISBN: 978-3-030-15465-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics