An Automated Live Forensic and Postmortem Analysis Tool for Bitcoin on Windows Systems
Title | An Automated Live Forensic and Postmortem Analysis Tool for Bitcoin on Windows Systems |
Publication Type | Journal Article |
Year of Publication | 2019 |
Authors | Zollner, Stephan, Choo, Kim-Kwang Raymond, Le-Khac, Nhien-An |
Journal | IEEE Access |
Volume | 7 |
Pagination | 158250—158263 |
ISSN | 2169-3536 |
Keywords | automated forensic process, automated live forensic, bitcoin, Bitcoin clients, Bitcoin forensics, bitcoin web wallet, Browsers, composability, Computer crime, cryptocurrencies, cryptocurrency forensics, Cryptographic Hash Function, digital forensics, forensic acquisition, forensic research, forensic traces, Forensics, Internet, live data forensics, Metrics, Microsoft Windows, Microsoft Windows (operating systems), online front-ends, open source tool, postmortem analysis, pubcrawl, public domain software, Public key, resilience, Resiliency, Web Wallets, Windows Operating System Security, Windows systems |
Abstract | Bitcoin is popular not only with consumers, but also with cybercriminals (e.g., in ransomware and online extortion, and commercial online child exploitation). Given the potential of Bitcoin to be involved in a criminal investigation, the need to have an up-to-date and in-depth understanding on the forensic acquisition and analysis of Bitcoins is crucial. However, there has been limited forensic research of Bitcoin in the literature. The general focus of existing research is on postmortem analysis of specific locations (e.g. wallets on mobile devices), rather than a forensic approach that combines live data forensics and postmortem analysis to facilitate the identification, acquisition, and analysis of forensic traces relating to the use of Bitcoins on a system. Hence, the latter is the focus of this paper where we present an open source tool for live forensic and postmortem analysing automatically. Using this open source tool, we describe a list of target artifacts that can be obtained from a forensic investigation of popular Bitcoin clients and Web Wallets on different web browsers installed on Windows 7 and Windows 10 platforms. |
URL | https://ieeexplore.ieee.org/document/8878085/ |
DOI | 10.1109/ACCESS.2019.2948774 |
Citation Key | zollner_automated_2019 |
- pubcrawl
- internet
- live data forensics
- Metrics
- microsoft windows
- Microsoft Windows (operating systems)
- online front-ends
- open source tool
- postmortem analysis
- Forensics
- public domain software
- Public key
- resilience
- Resiliency
- Web Wallets
- Windows Operating System Security
- Windows systems
- automated forensic process
- forensic traces
- forensic research
- forensic acquisition
- Digital Forensics
- Cryptographic Hash Function
- cryptocurrency forensics
- cryptocurrencies
- Computer crime
- composability
- Browsers
- bitcoin web wallet
- Bitcoin forensics
- Bitcoin clients
- bitcoin
- automated live forensic