{"metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00218872","sets":["1164:6389:10832:10943"]},"path":["10943"],"owner":"44499","recid":"218872","title":["サイバー犯罪エコノミーを把握するための暗号資産分析システムの提案"],"pubdate":{"attribute_name":"公開日","attribute_value":"2022-07-12"},"_buckets":{"deposit":"cb917e61-b82b-46de-89b6-436efe0f975d"},"_deposit":{"id":"218872","pid":{"type":"depid","value":"218872","revision_id":0},"owners":[44499],"status":"published","created_by":44499},"item_title":"サイバー犯罪エコノミーを把握するための暗号資産分析システムの提案","author_link":["570175","570178","570171","570173","570177","570179","570180","570181","570172","570174","570168","570169","570176","570170"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"サイバー犯罪エコノミーを把握するための暗号資産分析システムの提案"},{"subitem_title":"Cryptocurrency Analysis System for Investigating Cyber Crime Economy","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"ICSS","subitem_subject_scheme":"Other"}]},"item_type_id":"4","publish_date":"2022-07-12","item_4_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"デロイトトーマツ サイバー合同会社"},{"subitem_text_value":"デロイトトーマツ サイバー合同会社"},{"subitem_text_value":"デロイトトーマツ サイバー合同会社"},{"subitem_text_value":"デロイトトーマツ サイバー合同会社::デロイトトーマツ サイバー合同会社"},{"subitem_text_value":"デロイトトーマツ サイバー合同会社"},{"subitem_text_value":"デロイトトーマツ サイバー合同会社"}]},"item_4_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Deloitte Tohmatsu Cyber","subitem_text_language":"en"},{"subitem_text_value":"Deloitte Tohmatsu Cyber","subitem_text_language":"en"},{"subitem_text_value":"Deloitte Tohmatsu Cyber","subitem_text_language":"en"},{"subitem_text_value":"Deloitte Tohmatsu Cyber","subitem_text_language":"en"},{"subitem_text_value":"Deloitte Tohmatsu Cyber","subitem_text_language":"en"},{"subitem_text_value":"Deloitte Tohmatsu Cyber","subitem_text_language":"en"},{"subitem_text_value":"Deloitte Tohmatsu Cyber ","subitem_text_language":"en"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/218872/files/IPSJ-SPT22048028.pdf","label":"IPSJ-SPT22048028.pdf"},"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-SPT22048028.pdf","filesize":[{"value":"3.1 MB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"0","billingrole":"46"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_login","version_id":"644bc519-6b79-4ffd-b7e7-88a81a4c75a6","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2022 by the Institute of Electronics, Information and Communication Engineers This SIG report is only available to those in membership of the SIG."}]},"item_4_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"森, 博志"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"熊谷, 裕志"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"インミン, パパ"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"高田, 雄太"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"古川, 凌也"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"櫻井, 悠次"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"神薗, 雅紀"}],"nameIdentifiers":[{}]}]},"item_4_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Hiroshi, Mori","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Hiroshi, Kumagai","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"YinMinn, Papa","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Yuta, Takata","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Ryoya, Fuurukawa","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Yuji, Sakurai","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Masaki, Kamizono","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_4_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AA12628305","subitem_source_identifier_type":"NCID"}]},"item_4_textarea_12":{"attribute_name":"Notice","attribute_value_mlt":[{"subitem_textarea_value":"SIG Technical Reports are nonrefereed and hence may later appear in any journals, conferences, symposia, etc."}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_18gh","resourcetype":"technical report"}]},"item_4_source_id_11":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"2188-8671","subitem_source_identifier_type":"ISSN"}]},"item_4_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"Bitcoin は資産の流れを追跡することが難しく,登場以来サイバー犯罪に悪用され,サイバー犯罪における経済基盤の1つとなっている.そこで著者らは Bitcoin を用いたサイバー犯罪エコノミーを把握するための分析システムを開発した.当該システムはブロックチェーンから悪性アドレスを中心としたアドレス間の関係性を分析し,可視化することができる.本稿では著者らが開発した分析システムについて説明する.そして当該システムによる分析事例を示し,有効性について考察する.","subitem_description_type":"Other"}]},"item_4_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"Bitcoin has been a major cryptocurrency of cybercriminals to obfuscate their money flows. As it becomes more sophisticated in their use of cryptocurrency, it is challenging to understand the economy behind them. Thus, we propose a visual analysis system of Bitcoin transactions to trace malicious addresses and their related ones. In this paper, we will explain how our system investigate cybercriminals’ economy efficiently with examples.","subitem_description_type":"Other"}]},"item_4_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"6","bibliographic_titles":[{"bibliographic_title":"研究報告セキュリティ心理学とトラスト(SPT)"}],"bibliographicPageStart":"1","bibliographicIssueDates":{"bibliographicIssueDate":"2022-07-12","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"28","bibliographicVolumeNumber":"2022-SPT-48"}]},"relation_version_is_last":true,"weko_creator_id":"44499"},"id":218872,"updated":"2025-01-19T15:00:13.007079+00:00","links":{},"created":"2025-01-19T01:19:12.973748+00:00"}