{"id":"https://openalex.org/W4415003570","doi":"https://doi.org/10.1109/acit65614.2025.11185653","title":"Selected Aspects of Law Enforcement Investigations into the Modus Operandi of Potential Offenses Involving Ethereum Smart Contracts","display_name":"Selected Aspects of Law Enforcement Investigations into the Modus Operandi of Potential Offenses Involving Ethereum Smart Contracts","publication_year":2025,"publication_date":"2025-09-17","ids":{"openalex":"https://openalex.org/W4415003570","doi":"https://doi.org/10.1109/acit65614.2025.11185653"},"language":"en","primary_location":{"id":"doi:10.1109/acit65614.2025.11185653","is_oa":false,"landing_page_url":"https://doi.org/10.1109/acit65614.2025.11185653","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 15th International Conference on Advanced Computer Information Technologies (ACIT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5064849377","display_name":"\u0412\u0456\u0442\u0430\u043b\u0456\u0439 \u041d\u043e\u0441\u043e\u0432","orcid":"https://orcid.org/0000-0002-7848-6448"},"institutions":[{"id":"https://openalex.org/I4210120219","display_name":"Kharkiv National University of Internal Affairs","ror":"https://ror.org/02pkshz09","country_code":"UA","type":"education","lineage":["https://openalex.org/I4210120219"]}],"countries":["UA"],"is_corresponding":true,"raw_author_name":"Vitalii Nosov","raw_affiliation_strings":["Kharkiv National University of Internal Affairs,Educational and Research Institute &#x2116;4,Department of Combating Cybercrime,Kharkiv,Ukraine"],"affiliations":[{"raw_affiliation_string":"Kharkiv National University of Internal Affairs,Educational and Research Institute &#x2116;4,Department of Combating Cybercrime,Kharkiv,Ukraine","institution_ids":["https://openalex.org/I4210120219"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5019721287","display_name":"Oleksandr Manzhai","orcid":"https://orcid.org/0000-0001-5435-5921"},"institutions":[{"id":"https://openalex.org/I4210120219","display_name":"Kharkiv National University of Internal Affairs","ror":"https://ror.org/02pkshz09","country_code":"UA","type":"education","lineage":["https://openalex.org/I4210120219"]}],"countries":["UA"],"is_corresponding":false,"raw_author_name":"Oleksandr Manzhai","raw_affiliation_strings":["Kharkiv National University of Internal Affairs,Educational and Research Institute &#x2116;4,Department of Combating Cybercrime,Kharkiv,Ukraine"],"affiliations":[{"raw_affiliation_string":"Kharkiv National University of Internal Affairs,Educational and Research Institute &#x2116;4,Department of Combating Cybercrime,Kharkiv,Ukraine","institution_ids":["https://openalex.org/I4210120219"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5079803502","display_name":"Svitlana Luchyk","orcid":"https://orcid.org/0000-0003-0757-1140"},"institutions":[{"id":"https://openalex.org/I4210120219","display_name":"Kharkiv National University of Internal Affairs","ror":"https://ror.org/02pkshz09","country_code":"UA","type":"education","lineage":["https://openalex.org/I4210120219"]},{"id":"https://openalex.org/I3132613009","display_name":"Kamianets-Pod\u0456lskyi Ivan Ohiienko National University","ror":"https://ror.org/05b4xwc96","country_code":"UA","type":"education","lineage":["https://openalex.org/I3132613009"]}],"countries":["UA"],"is_corresponding":false,"raw_author_name":"Svitlana Luchyk","raw_affiliation_strings":["Kharkiv National University of Internal Affairs,Educational and Research Institute &#x2116;4,Department of Information Systems and Technologies,Kamianets-Podolskyi,Ukraine"],"affiliations":[{"raw_affiliation_string":"Kharkiv National University of Internal Affairs,Educational and Research Institute &#x2116;4,Department of Information Systems and Technologies,Kamianets-Podolskyi,Ukraine","institution_ids":["https://openalex.org/I4210120219","https://openalex.org/I3132613009"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5108060520","display_name":"Vasyl Luchyk","orcid":"https://orcid.org/0000-0002-1997-0272"},"institutions":[{"id":"https://openalex.org/I4210120219","display_name":"Kharkiv National University of Internal Affairs","ror":"https://ror.org/02pkshz09","country_code":"UA","type":"education","lineage":["https://openalex.org/I4210120219"]}],"countries":["UA"],"is_corresponding":false,"raw_author_name":"Vasyl Luchyk","raw_affiliation_strings":["Kharkiv National University of Internal Affairs,Educational and Research Institute &#x2116;4,Department of Combating Cybercrime,Kamianets-Podolskyi,Ukraine"],"affiliations":[{"raw_affiliation_string":"Kharkiv National University of Internal Affairs,Educational and Research Institute &#x2116;4,Department of Combating Cybercrime,Kamianets-Podolskyi,Ukraine","institution_ids":["https://openalex.org/I4210120219"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5064849377"],"corresponding_institution_ids":["https://openalex.org/I4210120219"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.37985809,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"578","last_page":"583"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12394","display_name":"Insurance and Financial Risk Management","score":0.9075000286102295,"subfield":{"id":"https://openalex.org/subfields/2002","display_name":"Economics and Econometrics"},"field":{"id":"https://openalex.org/fields/20","display_name":"Economics, Econometrics and Finance"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T12394","display_name":"Insurance and Financial Risk Management","score":0.9075000286102295,"subfield":{"id":"https://openalex.org/subfields/2002","display_name":"Economics and Econometrics"},"field":{"id":"https://openalex.org/fields/20","display_name":"Economics, Econometrics and Finance"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/bytecode","display_name":"Bytecode","score":0.7059999704360962},{"id":"https://openalex.org/keywords/consistency","display_name":"Consistency (knowledge bases)","score":0.6385999917984009},{"id":"https://openalex.org/keywords/enforcement","display_name":"Enforcement","score":0.6144999861717224},{"id":"https://openalex.org/keywords/law-enforcement","display_name":"Law enforcement","score":0.5250999927520752},{"id":"https://openalex.org/keywords/security-token","display_name":"Security token","score":0.49219998717308044},{"id":"https://openalex.org/keywords/source-code","display_name":"Source code","score":0.4652000069618225},{"id":"https://openalex.org/keywords/asset","display_name":"Asset (computer security)","score":0.4586000144481659}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7426000237464905},{"id":"https://openalex.org/C2779818221","wikidata":"https://www.wikidata.org/wiki/Q837330","display_name":"Bytecode","level":3,"score":0.7059999704360962},{"id":"https://openalex.org/C2776436953","wikidata":"https://www.wikidata.org/wiki/Q5163215","display_name":"Consistency (knowledge bases)","level":2,"score":0.6385999917984009},{"id":"https://openalex.org/C2779777834","wikidata":"https://www.wikidata.org/wiki/Q4202277","display_name":"Enforcement","level":2,"score":0.6144999861717224},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5670999884605408},{"id":"https://openalex.org/C2780262971","wikidata":"https://www.wikidata.org/wiki/Q44554","display_name":"Law enforcement","level":2,"score":0.5250999927520752},{"id":"https://openalex.org/C48145219","wikidata":"https://www.wikidata.org/wiki/Q1335365","display_name":"Security token","level":2,"score":0.49219998717308044},{"id":"https://openalex.org/C43126263","wikidata":"https://www.wikidata.org/wiki/Q128751","display_name":"Source code","level":2,"score":0.4652000069618225},{"id":"https://openalex.org/C76178495","wikidata":"https://www.wikidata.org/wiki/Q4808784","display_name":"Asset (computer security)","level":2,"score":0.4586000144481659},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.4401000142097473},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.43639999628067017},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.3747999966144562},{"id":"https://openalex.org/C2779950589","wikidata":"https://www.wikidata.org/wiki/Q7544035","display_name":"Smart contract","level":3,"score":0.36660000681877136},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.35089999437332153},{"id":"https://openalex.org/C2778137410","wikidata":"https://www.wikidata.org/wiki/Q2732820","display_name":"Government (linguistics)","level":2,"score":0.3231000006198883},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.314300000667572},{"id":"https://openalex.org/C2777351106","wikidata":"https://www.wikidata.org/wiki/Q49371","display_name":"Legislation","level":2,"score":0.3043000102043152},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.2989000082015991},{"id":"https://openalex.org/C2776529561","wikidata":"https://www.wikidata.org/wiki/Q157833","display_name":"Embezzlement","level":3,"score":0.2815000116825104},{"id":"https://openalex.org/C4924752","wikidata":"https://www.wikidata.org/wiki/Q184148","display_name":"Plug-in","level":2,"score":0.2793999910354614},{"id":"https://openalex.org/C75949130","wikidata":"https://www.wikidata.org/wiki/Q848010","display_name":"Database transaction","level":2,"score":0.25679999589920044}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/acit65614.2025.11185653","is_oa":false,"landing_page_url":"https://doi.org/10.1109/acit65614.2025.11185653","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 15th International Conference on Advanced Computer Information Technologies (ACIT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":9,"referenced_works":["https://openalex.org/W3091755869","https://openalex.org/W3116484444","https://openalex.org/W3118219298","https://openalex.org/W4206573979","https://openalex.org/W4281681780","https://openalex.org/W4283080319","https://openalex.org/W4318474365","https://openalex.org/W4320496187","https://openalex.org/W4362663576"],"related_works":[],"abstract_inverted_index":{"With":[0],"the":[1,34,38,45,51,67,74,80,83,86,90,163,168,184,188],"rapid":[2],"advancement":[3],"of":[4,17,40,85,191],"smart":[5,30,117,155,194],"contracts,":[6,195],"ensuring":[7],"their":[8],"security":[9],"has":[10],"become":[11],"critically":[12],"important.":[13],"A":[14],"key":[15],"aspect":[16],"this":[18],"security-both":[19],"for":[20,24,119],"potential":[21,129],"users":[22],"and":[23,43,50,100,175],"law":[25,181],"enforcement":[26,182],"investigating":[27],"offenses":[28,192],"involving":[29,131,193],"contracts":[31,42],"(modus":[32],"operandi)-is":[33],"ability":[35],"to":[36,134,157,186],"interpret":[37],"logic":[39],"published":[41,97],"verify":[44],"consistency":[46,84],"between":[47],"deployed":[48,87],"bytecode":[49,88],"original":[52],"source":[53,92],"code.":[54],"The":[55,125,173],"authors'":[56],"research":[57],"demonstrates":[58],"that":[59,159],"such":[60],"verification":[61],"was":[62,95],"successfully":[63],"achieved":[64],"only":[65],"within":[66],"Remix":[68],"integrated":[69],"development":[70],"environment":[71],"(IDE)":[72],"using":[73],"Contract":[75],"Verification-Etherscan":[76],"plugin.":[77],"Upon":[78],"activation,":[79],"plugin":[81],"verified":[82],"with":[89,115,167,183],"contract's":[91],"code,":[93],"which":[94],"subsequently":[96],"on":[98,171],"Etherscan":[99],"marked":[101],"as":[102],"\"Contract":[103],"Source":[104],"Code":[105],"Verified":[106],"(Exact":[107],"Match).\"":[108],"Similar":[109],"results":[110],"were":[111],"obtained":[112],"during":[113,143],"testing":[114,176],"a":[116,140],"contract":[118,156],"issuing":[120],"non-fungible":[121],"ERC721":[122],"tokens":[123],"(NFTs).":[124],"study":[126],"also":[127],"identified":[128],"vulnerabilities":[130],"NFTs":[132],"linked":[133],"digital":[135,165],"assets":[136],"stored":[137],"off-chain":[138],"at":[139],"URI":[141],"defined":[142],"token":[144],"issuance.":[145],"These":[146],"risks":[147],"can":[148],"be":[149],"mitigated":[150],"by":[151],"employing":[152],"an":[153],"additional":[154],"ensure":[158],"NFT":[160],"transfers":[161],"include":[162],"associated":[164],"asset,":[166],"asset":[169],"hosted":[170],"IPFS.":[172],"analysis":[174],"tools":[177],"presented":[178],"herein":[179],"provide":[180],"means":[185],"understand":[187],"modus":[189],"operandi":[190],"thereby":[196],"aiding":[197],"in":[198],"criminal":[199],"investigations.":[200]},"counts_by_year":[],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-10-10T00:00:00"}
