{"id":"https://openalex.org/W7151375790","doi":"https://doi.org/10.48550/arxiv.2604.04211","title":"LOCARD: An Agentic Framework for Blockchain Forensics","display_name":"LOCARD: An Agentic Framework for Blockchain Forensics","publication_year":2026,"publication_date":"2026-04-05","ids":{"openalex":"https://openalex.org/W7151375790","doi":"https://doi.org/10.48550/arxiv.2604.04211"},"language":null,"primary_location":{"id":"doi:10.48550/arxiv.2604.04211","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2604.04211","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"type":"preprint","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.48550/arxiv.2604.04211","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101681278","display_name":"Xiaohang Yu","orcid":"https://orcid.org/0009-0002-8447-2963"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Yu, Xiaohang","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5133099014","display_name":"William Knottenbelt","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Knottenbelt, William","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5101681278"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.7099999785423279,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.7099999785423279,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.029899999499320984,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.029500000178813934,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/blockchain","display_name":"Blockchain","score":0.6082000136375427},{"id":"https://openalex.org/keywords/inference","display_name":"Inference","score":0.5281999707221985},{"id":"https://openalex.org/keywords/database-transaction","display_name":"Database transaction","score":0.5127000212669373},{"id":"https://openalex.org/keywords/tracing","display_name":"Tracing","score":0.49889999628067017},{"id":"https://openalex.org/keywords/task","display_name":"Task (project management)","score":0.4943999946117401},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.4537999927997589},{"id":"https://openalex.org/keywords/benchmark","display_name":"Benchmark (surveying)","score":0.3970000147819519},{"id":"https://openalex.org/keywords/state","display_name":"State (computer science)","score":0.3287000060081482}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7764999866485596},{"id":"https://openalex.org/C2779687700","wikidata":"https://www.wikidata.org/wiki/Q20514253","display_name":"Blockchain","level":2,"score":0.6082000136375427},{"id":"https://openalex.org/C2776214188","wikidata":"https://www.wikidata.org/wiki/Q408386","display_name":"Inference","level":2,"score":0.5281999707221985},{"id":"https://openalex.org/C75949130","wikidata":"https://www.wikidata.org/wiki/Q848010","display_name":"Database transaction","level":2,"score":0.5127000212669373},{"id":"https://openalex.org/C138673069","wikidata":"https://www.wikidata.org/wiki/Q322229","display_name":"Tracing","level":2,"score":0.49889999628067017},{"id":"https://openalex.org/C2780451532","wikidata":"https://www.wikidata.org/wiki/Q759676","display_name":"Task (project management)","level":2,"score":0.4943999946117401},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.47440001368522644},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4571000039577484},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.4537999927997589},{"id":"https://openalex.org/C185798385","wikidata":"https://www.wikidata.org/wiki/Q1161707","display_name":"Benchmark (surveying)","level":2,"score":0.3970000147819519},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.3287000060081482},{"id":"https://openalex.org/C153876917","wikidata":"https://www.wikidata.org/wiki/Q899704","display_name":"Traceability","level":2,"score":0.32269999384880066},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.32179999351501465},{"id":"https://openalex.org/C12713177","wikidata":"https://www.wikidata.org/wiki/Q1900281","display_name":"Perspective (graphical)","level":2,"score":0.3215000033378601},{"id":"https://openalex.org/C120936955","wikidata":"https://www.wikidata.org/wiki/Q2155640","display_name":"Empirical research","level":2,"score":0.31189998984336853},{"id":"https://openalex.org/C2780005421","wikidata":"https://www.wikidata.org/wiki/Q151900","display_name":"Money laundering","level":2,"score":0.311599999666214},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.2957000136375427},{"id":"https://openalex.org/C167221231","wikidata":"https://www.wikidata.org/wiki/Q672307","display_name":"NetLogo","level":2,"score":0.2939000129699707},{"id":"https://openalex.org/C166052673","wikidata":"https://www.wikidata.org/wiki/Q83021","display_name":"Empirical evidence","level":2,"score":0.2928999960422516},{"id":"https://openalex.org/C89611455","wikidata":"https://www.wikidata.org/wiki/Q6804646","display_name":"Mechanism (biology)","level":2,"score":0.2809000015258789},{"id":"https://openalex.org/C75291252","wikidata":"https://www.wikidata.org/wiki/Q1315756","display_name":"TRACE (psycholinguistics)","level":2,"score":0.26969999074935913},{"id":"https://openalex.org/C20854674","wikidata":"https://www.wikidata.org/wiki/Q4386060","display_name":"Cognitive architecture","level":3,"score":0.2535000145435333},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.25099998712539673}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.48550/arxiv.2604.04211","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2604.04211","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"doi:10.48550/arxiv.2604.04211","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2604.04211","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.8155785799026489,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Blockchain":[0,26],"forensics":[1,156],"inherently":[2,104],"involves":[3],"dynamic":[4],"and":[5,66,84,124,165,183,190],"iterative":[6],"investigations,":[7],"while":[8],"many":[9],"existing":[10],"approaches":[11,176],"primarily":[12],"model":[13],"it":[14,73],"through":[15,55],"static":[16],"inference":[17],"pipelines.":[18],"We":[19,111],"propose":[20],"a":[21,33,56,75,114,170],"paradigm":[22],"shift":[23],"towards":[24],"Agentic":[25],"Forensics":[27],"(ABF),":[28],"modeling":[29,154],"forensic":[30,82,122,180],"investigation":[31],"as":[32,157],"sequential":[34],"decision-making":[35],"process.":[36],"To":[37,91],"instantiate":[38],"this":[39,53],"paradigm,":[40,98],"we":[41,99],"introduce":[42,112],"LOCARD,":[43],"the":[44,93,96,103,128,142],"first":[45],"agentic":[46,160,175],"framework":[47],"for":[48,132,173],"blockchain":[49,155,179],"forensics.":[50],"LOCARD":[51,101,126,145],"operationalizes":[52],"perspective":[54],"Tri-Core":[57],"Cognitive":[58],"Architecture":[59],"that":[60,153],"decouples":[61],"strategic":[62],"planning,":[63],"operational":[64],"execution,":[65],"evaluative":[67],"validation.":[68],"Unlike":[69],"generic":[70],"LLM-based":[71],"agents,":[72],"incorporates":[74],"Structured":[76],"Belief":[77],"State":[78],"mechanism":[79],"to":[80,102,177],"enforce":[81],"rigor":[83],"guide":[85],"exploration":[86],"under":[87],"explicit":[88],"state":[89],"constraints.":[90],"demonstrate":[92],"efficacy":[94],"of":[95,107],"ABF":[97],"apply":[100],"complex":[105],"domain":[106],"cross-chain":[108,121],"transaction":[109],"tracing.":[110],"Thor25,":[113],"benchmark":[115],"dataset":[116,184],"comprising":[117],"over":[118],"151k":[119],"real-world":[120],"records,":[123],"evaluate":[125],"on":[127],"Group-Transfer":[129],"Tracing":[130],"task":[131,161],"dismantling":[133],"Sybil":[134],"clusters.":[135],"Validated":[136],"against":[137],"representative":[138],"laundering":[139],"sub-flows":[140],"from":[141],"Bybit":[143],"hack,":[144],"achieves":[146],"high-fidelity":[147],"tracing":[148],"results,":[149],"providing":[150],"empirical":[151],"evidence":[152],"an":[158],"autonomous":[159],"is":[162],"both":[163],"viable":[164],"effective.":[166],"These":[167],"results":[168],"establish":[169],"concrete":[171],"foundation":[172],"future":[174],"large-scale":[178],"analysis.":[181],"Code":[182],"are":[185],"publicly":[186],"available":[187],"at":[188],"https://github.com/xhyumiracle/locard":[189],"https://github.com/xhyumiracle/thorchain-crosschain-data.":[191]},"counts_by_year":[],"updated_date":"2026-04-08T06:07:18.267832","created_date":"2026-04-08T00:00:00"}
