How to Not Get Caught When You Launder Money on Blockchain?
- URL: http://arxiv.org/abs/2010.15082v1
- Date: Tue, 22 Sep 2020 02:12:15 GMT
- Title: How to Not Get Caught When You Launder Money on Blockchain?
- Authors: Cuneyt G. Akcora, Sudhanva Purusotham, Yulia R. Gel, Mitchell
Krawiec-Thayer, Murat Kantarcioglu
- Abstract summary: Public blockchains have become a hotbed of research for developing AI tools to detect and trace users and transactions that are related to e-crime.
We argue that following a few select strategies can make money laundering on blockchain virtually undetectable with most of the existing tools and algorithms.
- Score: 20.970223434542508
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: The number of blockchain users has tremendously grown in recent years. As an
unintended consequence, e-crime transactions on blockchains has been on the
rise. Consequently, public blockchains have become a hotbed of research for
developing AI tools to detect and trace users and transactions that are related
to e-crime.
We argue that following a few select strategies can make money laundering on
blockchain virtually undetectable with most of the existing tools and
algorithms. As a result, the effective combating of e-crime activities
involving cryptocurrencies requires the development of novel analytic
methodology in AI.
Related papers
- BlockFound: Customized blockchain foundation model for anomaly detection [47.04595143348698]
BlockFound is a customized foundation model for anomaly blockchain transaction detection.
We introduce a series of customized designs to model the unique data structure of blockchain transactions.
BlockFound is the only method that successfully detects anomalous transactions on Solana with high accuracy.
arXiv Detail & Related papers (2024-10-05T05:11:34Z) - The Latency Price of Threshold Cryptosystem in Blockchains [52.359230560289745]
We study the interplay between threshold cryptography and a class of blockchains that use Byzantine-fault tolerant (BFT) consensus protocols.
Existing approaches for threshold cryptosystems introduce a latency overhead of at least one message delay for running the threshold cryptographic protocol.
We propose a mechanism to eliminate this overhead for blockchain-native threshold cryptosystems with tight thresholds.
arXiv Detail & Related papers (2024-07-16T20:53:04Z) - A Novel Classification of Attacks on Blockchain Layers: Vulnerabilities, Attacks, Mitigations, and Research Directions [0.8540657305162735]
This survey proposes a novel classification of blockchain attacks and an in-depth investigation of blockchain data security.
We reveal the deep dynamics of these security concerns by closely investigating the fundamental causes of attacks at various blockchain tiers.
We also discuss the implications of quantum computing in blockchain and the weaknesses in the current technology that can be exploited in the future.
arXiv Detail & Related papers (2024-04-28T06:40:50Z) - Generative AI-enabled Blockchain Networks: Fundamentals, Applications,
and Case Study [73.87110604150315]
Generative Artificial Intelligence (GAI) has emerged as a promising solution to address challenges of blockchain technology.
In this paper, we first introduce GAI techniques, outline their applications, and discuss existing solutions for integrating GAI into blockchains.
arXiv Detail & Related papers (2024-01-28T10:46:17Z) - SoK: Security of Cross-chain Bridges: Attack Surfaces, Defenses, and Open Problems [43.80265187232706]
Cross-chain bridges are used to facilitate token and data exchanges across blockchains.
Although bridges are becoming increasingly popular, they are still in their infancy and have been attacked multiple times recently.
This paper analyzes the security landscape of cross-chain bridges in a holistic manner.
arXiv Detail & Related papers (2023-12-19T20:13:21Z) - BlockChain I/O: Enabling Cross-Chain Commerce [2.391161450948918]
We present BlockChain I/O, a framework for cross-chain commerce.
We show how to use BlockChain I/O to implement a cross-chain marketplace.
We also discuss how its desirable properties continue to hold in the end-to-end system.
arXiv Detail & Related papers (2023-08-04T06:51:50Z) - Novel Architecture to Create and Maintain Personal Blockchains [0.685316573653194]
We outline a potential blockchain use case for tracking financial transactions across multiple financial institutions.
We show the downsides of traditional centralized approaches and that blockchain approaches fail to give all the privacy and accessibility required for this use case.
This novel architecture combines the ease of use of public blockchains with the privacy of private blockchains by allowing users to create personal blockchains.
arXiv Detail & Related papers (2022-12-12T02:05:59Z) - Reputation-based PoS for the Restriction of Illicit Activities on
Blockchain: Algorand Usecase [2.94824047753242]
In recent times, different machine learning-based techniques can detect such criminal elements based on blockchain transaction data.
We propose a reputation-based methodology for response to the users detected carrying out the aforementioned illicit activities.
arXiv Detail & Related papers (2021-12-21T07:32:22Z) - Quantum-resistance in blockchain networks [46.63333997460008]
This paper describes the work carried out by the Inter-American Development Bank, the IDB Lab, LACChain, Quantum Computing (CQC), and Tecnologico de Monterrey to identify and eliminate quantum threats in blockchain networks.
The advent of quantum computing threatens internet protocols and blockchain networks because they utilize non-quantum resistant cryptographic algorithms.
arXiv Detail & Related papers (2021-06-11T23:39:25Z) - Quantum Multi-Solution Bernoulli Search with Applications to Bitcoin's
Post-Quantum Security [67.06003361150228]
A proof of work (PoW) is an important cryptographic construct enabling a party to convince others that they invested some effort in solving a computational task.
In this work, we examine the hardness of finding such chain of PoWs against quantum strategies.
We prove that the chain of PoWs problem reduces to a problem we call multi-solution Bernoulli search, for which we establish its quantum query complexity.
arXiv Detail & Related papers (2020-12-30T18:03:56Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.