Token Spammers, Rug Pulls, and SniperBots: An Analysis of the Ecosystem of Tokens in Ethereum and the Binance Smart Chain (BNB)
- URL: http://arxiv.org/abs/2206.08202v2
- Date: Tue, 14 May 2024 13:34:39 GMT
- Title: Token Spammers, Rug Pulls, and SniperBots: An Analysis of the Ecosystem of Tokens in Ethereum and the Binance Smart Chain (BNB)
- Authors: Federico Cernera, Massimo La Morgia, Alessandro Mei, Francesco Sassi,
- Abstract summary: We study the ecosystem of the tokens and liquidity pools, highlighting analogies and differences between the two blockchains.
We estimate the lifetime of the tokens, discovering that about 60% of them are active for less than one day.
We present an exit scam fraud and quantify its prevalence on both blockchains.
- Score: 50.888293380932616
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: In this work, we perform a longitudinal analysis of the BNB Smart Chain and Ethereum blockchain from their inception to March 2022. We study the ecosystem of the tokens and liquidity pools, highlighting analogies and differences between the two blockchains. We estimate the lifetime of the tokens, discovering that about 60% of them are active for less than one day. Moreover, we find that 1% of addresses create an anomalous number of tokens (between 20% and 25%). We present an exit scam fraud and quantify its prevalence on both blockchains. We find that token spammers use short lifetime tokens as disposable tokens to perpetrate these frauds serially. Finally, we present a new kind of trader bot involved in these activities, and we detect their presence and quantify their activity in the exit scam operations.
Related papers
- The Latency Price of Threshold Cryptosystem in Blockchains [52.359230560289745]
We study the interplay between threshold cryptography and a class of blockchains that use Byzantine-fault tolerant (BFT) consensus protocols.
Existing approaches for threshold cryptosystems introduce a latency overhead of at least one message delay for running the threshold cryptographic protocol.
We propose a mechanism to eliminate this overhead for blockchain-native threshold cryptosystems with tight thresholds.
arXiv Detail & Related papers (2024-07-16T20:53:04Z) - The Writing is on the Wall: Analyzing the Boom of Inscriptions and its Impact on EVM-compatible Blockchains [8.744676168760394]
This work examines the applications of inscription transactions in and its impact on blockchain scalability during periods of sudden transaction surges.
Unlike L1 blockchains, during periods of transaction surges, zkSync and Arbitrum experienced lower median gas fees, attributable to the compression of L2 transactions for a single L1 batch.
arXiv Detail & Related papers (2024-05-24T07:21:53Z) - Analysis of Arbitrary Content on Blockchain-Based Systems using BigQuery [0.0]
We develop and apply a cloud-based approach for quickly discovering and classifying content on public blockchains.
Our method can be adapted to different blockchain systems and offers insights into content-related usage patterns and potential cases of abuse.
To the best of our knowledge, the presented study is the first to systematically analyze non-financial content stored on the blockchain.
arXiv Detail & Related papers (2022-03-17T15:12:38Z) - Blockchains through ontologies: the case study of the Ethereum ERC721
standard in OASIS (Extended Version) [0.0]
This paper reports on how to leverage the emphOntology for Agents, Systems, and Integration of Services as a general means for the semantic representation of smart contracts stored on blockchain as software agents.
Special attention is paid to non-fungible tokens (NFTs), whose management through the ERC721 standard is presented as a case study.
arXiv Detail & Related papers (2021-09-07T06:54:11Z) - Quantum-resistance in blockchain networks [46.63333997460008]
This paper describes the work carried out by the Inter-American Development Bank, the IDB Lab, LACChain, Quantum Computing (CQC), and Tecnologico de Monterrey to identify and eliminate quantum threats in blockchain networks.
The advent of quantum computing threatens internet protocols and blockchain networks because they utilize non-quantum resistant cryptographic algorithms.
arXiv Detail & Related papers (2021-06-11T23:39:25Z) - The Doge of Wall Street: Analysis and Detection of Pump and Dump
Cryptocurrency Manipulations [63.732639864601914]
This paper performs an in-depth analysis of two market manipulations organized by communities over the Internet: The pump and dump and the crowd pump.
The pump and dump scheme is a fraud as old as the stock market. Now, it got new vitality in the loosely regulated market of cryptocurrencies.
We report on three case studies of pump and dump. Then, we leverage our unique dataset of the verified pump and dumps to build a machine learning model able to detect a pump and dump in 25 seconds from the moment it starts.
arXiv Detail & Related papers (2021-05-03T10:20:47Z) - Detecting Malicious Accounts showing Adversarial Behavior in
Permissionless Blockchains [4.506782035297339]
Malicious activities have been flagged in multiple permissionless blockchains such as bitcoin.
We aim at automatically flagging blockchain accounts that originate such malicious exploitation of accounts of other participants.
We identify a robust supervised machine learning (ML) algorithm that is resistant to any bias induced by an over representation of certain malicious activity.
arXiv Detail & Related papers (2021-01-28T10:33:50Z) - Quantum Multi-Solution Bernoulli Search with Applications to Bitcoin's
Post-Quantum Security [67.06003361150228]
A proof of work (PoW) is an important cryptographic construct enabling a party to convince others that they invested some effort in solving a computational task.
In this work, we examine the hardness of finding such chain of PoWs against quantum strategies.
We prove that the chain of PoWs problem reduces to a problem we call multi-solution Bernoulli search, for which we establish its quantum query complexity.
arXiv Detail & Related papers (2020-12-30T18:03:56Z) - Blockchain is Watching You: Profiling and Deanonymizing Ethereum Users [0.0]
We propose and implement user profiling techniques based on quasi-identifiers.
We describe a malicious value-fingerprinting attack, a variant of the Danaan-gift attack, applicable for the confidential transaction overlays.
arXiv Detail & Related papers (2020-05-28T14:33:32Z) - Pump and Dumps in the Bitcoin Era: Real Time Detection of Cryptocurrency
Market Manipulations [63.732639864601914]
We perform an in-depth analysis of pump and dump schemes organized by communities over the Internet.
We observe how these communities are organized and how they carry out the fraud.
We introduce an approach to detect the fraud in real time that outperforms the current state of the art.
arXiv Detail & Related papers (2020-05-04T21:36:18Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.