Blockchain is Watching You: Profiling and Deanonymizing Ethereum Users
- URL: http://arxiv.org/abs/2005.14051v2
- Date: Tue, 13 Oct 2020 08:25:43 GMT
- Title: Blockchain is Watching You: Profiling and Deanonymizing Ethereum Users
- Authors: Ferenc B\'eres, Istv\'an Andr\'as Seres, Andr\'as A. Bencz\'ur,
Mikerah Quintyne-Collins
- Abstract summary: We propose and implement user profiling techniques based on quasi-identifiers.
We describe a malicious value-fingerprinting attack, a variant of the Danaan-gift attack, applicable for the confidential transaction overlays.
- Score: 0.0
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Ethereum is the largest public blockchain by usage. It applies an
account-based model, which is inferior to Bitcoin's unspent transaction output
model from a privacy perspective. Due to its privacy shortcomings, recently
several privacy-enhancing overlays have been deployed on Ethereum, such as
non-custodial, trustless coin mixers and confidential transactions. In our
privacy analysis of Ethereum's account-based model, we describe several
patterns that characterize only a limited set of users and successfully apply
these quasi-identifiers in address deanonymization tasks. Using Ethereum Name
Service identifiers as ground truth information, we quantitatively compare
algorithms in recent branch of machine learning, the so-called graph
representation learning, as well as time-of-day activity and transaction fee
based user profiling techniques. As an application, we rigorously assess the
privacy guarantees of the Tornado Cash coin mixer by discovering strong
heuristics to link the mixing parties. To the best of our knowledge, we are the
first to propose and implement Ethereum user profiling techniques based on
quasi-identifiers. Finally, we describe a malicious value-fingerprinting
attack, a variant of the Danaan-gift attack, applicable for the confidential
transaction overlays on Ethereum. By incorporating user activity statistics
from our data set, we estimate the success probability of such an attack.
Related papers
- BlockFound: Customized blockchain foundation model for anomaly detection [47.04595143348698]
BlockFound is a customized foundation model for anomaly blockchain transaction detection.
We introduce a series of customized designs to model the unique data structure of blockchain transactions.
BlockFound is the only method that successfully detects anomalous transactions on Solana with high accuracy.
arXiv Detail & Related papers (2024-10-05T05:11:34Z) - The Latency Price of Threshold Cryptosystem in Blockchains [52.359230560289745]
We study the interplay between threshold cryptography and a class of blockchains that use Byzantine-fault tolerant (BFT) consensus protocols.
Existing approaches for threshold cryptosystems introduce a latency overhead of at least one message delay for running the threshold cryptographic protocol.
We propose a mechanism to eliminate this overhead for blockchain-native threshold cryptosystems with tight thresholds.
arXiv Detail & Related papers (2024-07-16T20:53:04Z) - FRAD: Front-Running Attacks Detection on Ethereum using Ternary
Classification Model [3.929929061618338]
Front-running attacks, a unique form of security threat, pose significant challenges to the integrity of blockchain transactions.
In these attack scenarios, malicious actors monitor other users' transaction activities, then strategically submit their own transactions with higher fees.
We introduce a novel detection method named FRAD (Front-Running Attacks Detection on using Ternary Classification Model)
Our experimental validation reveals that the Multilayer Perceptron (MLP) classifier offers the best performance in detecting front-running attacks, achieving an impressive accuracy rate of 84.59% and F1-score of 84.60%.
arXiv Detail & Related papers (2023-11-24T14:42:29Z) - PTTS: Zero-Knowledge Proof-based Private Token Transfer System on Ethereum Blockchain and its Network Flow Based Balance Range Privacy Attack Analysis [0.0]
We propose a Private Token Transfer System (PTTS) for the public blockchain.
For the proposed framework, zero-knowledge based protocol has been designed using Zokrates and integrated into our private token smart contract.
In the second part of the paper, we provide security and privacy analysis including the replay attack and the balance range privacy attack.
arXiv Detail & Related papers (2023-08-29T09:13:31Z) - Blockchain Large Language Models [65.7726590159576]
This paper presents a dynamic, real-time approach to detecting anomalous blockchain transactions.
The proposed tool, BlockGPT, generates tracing representations of blockchain activity and trains from scratch a large language model to act as a real-time Intrusion Detection System.
arXiv Detail & Related papers (2023-04-25T11:56:18Z) - Smooth Anonymity for Sparse Graphs [69.1048938123063]
differential privacy has emerged as the gold standard of privacy, however, when it comes to sharing sparse datasets.
In this work, we consider a variation of $k$-anonymity, which we call smooth-$k$-anonymity, and design simple large-scale algorithms that efficiently provide smooth-$k$-anonymity.
arXiv Detail & Related papers (2022-07-13T17:09:25Z) - Token Spammers, Rug Pulls, and SniperBots: An Analysis of the Ecosystem of Tokens in Ethereum and in the Binance Smart Chain (BNB) [50.888293380932616]
We study the ecosystem of the tokens and liquidity pools.
We find that about 60% of tokens are active for less than one day.
We estimate that 1-day rug pulls generated $240 million in profits.
arXiv Detail & Related papers (2022-06-16T14:20:19Z) - TTAGN: Temporal Transaction Aggregation Graph Network for Ethereum
Phishing Scams Detection [11.20384152151594]
Existing phishing scams detection technology mostly uses machine learning or network representation learning to mine the key information from the transaction network to identify phishing addresses.
We propose a Temporal Transaction Aggregation Graph Network (TTAGN) to enhance phishing detection performance.
Our TTAGN (92.8% AUC, and 81.6% F1score) outperforms the state-of-the-art methods, and the effectiveness of temporal edges representation and edge2node module is also demonstrated.
arXiv Detail & Related papers (2022-04-28T12:17:00Z) - Tutela: An Open-Source Tool for Assessing User-Privacy on Ethereum and
Tornado Cash [6.862106529464183]
Tutela is an application built on expert's to report the true anonymity of an address.
It computes the true size of the anonymity pool of each Tornado Cash mixer.
arXiv Detail & Related papers (2022-01-18T08:31:12Z) - Chaos Engineering of Ethereum Blockchain Clients [13.131269677617286]
We present ChaosETH, a chaos engineering approach for resilience assessment of blockchain clients.
Our results reveal a broad spectrum of resilience characteristics of clients w.r.t. system call invocation errors, ranging from direct crashes to full resilience.
arXiv Detail & Related papers (2021-10-30T10:03:19Z) - Quantum Multi-Solution Bernoulli Search with Applications to Bitcoin's
Post-Quantum Security [67.06003361150228]
A proof of work (PoW) is an important cryptographic construct enabling a party to convince others that they invested some effort in solving a computational task.
In this work, we examine the hardness of finding such chain of PoWs against quantum strategies.
We prove that the chain of PoWs problem reduces to a problem we call multi-solution Bernoulli search, for which we establish its quantum query complexity.
arXiv Detail & Related papers (2020-12-30T18:03:56Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.