Characterizing Transfer Graphs of Suspicious ERC-20 Tokens
- URL: http://arxiv.org/abs/2501.11668v1
- Date: Mon, 20 Jan 2025 18:49:01 GMT
- Title: Characterizing Transfer Graphs of Suspicious ERC-20 Tokens
- Authors: Calvin Josenhans, Andrey Kuehlkamp, Jarek Nabrzyski,
- Abstract summary: This paper seeks to understand how fraudulent schemes may be characterized and develop methods for detecting them.
A common use of smart contracts is implementing fungible tokens with the ERC-20 interface.
By parsing the event logs emitted by these ERC-20 contracts over 20 different periods of 100K blocks, we construct token transfer graphs for each of the available ERC-20 tokens.
- Score: 0.2621730497733947
- License:
- Abstract: Ethereum is currently the second largest blockchain by market capitalization and a popular platform for cryptocurrencies. As it has grown, the high value present and the anonymity afforded by the technology have led Ethereum to become a hotbed for various cybercrimes. This paper seeks to understand how these fraudulent schemes may be characterized and develop methods for detecting them. One key feature introduced by Ethereum is the ability to use programmable smart contracts to execute code on the blockchain. A common use of smart contracts is implementing fungible tokens with the ERC-20 interface. Such tokens can be used to impersonate legitimate tokens and defraud users. By parsing the event logs emitted by these ERC-20 contracts over 20 different periods of 100K blocks, we construct token transfer graphs for each of the available ERC-20 tokens on the blockchain. By analyzing these graphs, we find a set of characteristics by which suspicious contracts are distinguished from legitimate ones. These observations result in a simple model that can identify scam contracts with an average of 88.7% accuracy. This suggests that the mechanism by which fraudulent schemes function strongly correlates with their transfer graphs and that these graphs may be used to improve scam-detection mechanisms, contributing to making Ethereum safer.
Related papers
- ElasticTok: Adaptive Tokenization for Image and Video [109.75935878130582]
We introduce ElasticTok, a method that conditions on prior frames to adaptively encode a frame into a variable number of tokens.
During inference, ElasticTok can dynamically allocate tokens when needed.
Our evaluations on images and video demonstrate the effectiveness of our approach in efficient token usage.
arXiv Detail & Related papers (2024-10-10T20:54:15Z) - Demystifying and Detecting Cryptographic Defects in Ethereum Smart Contracts [14.203991954526789]
We conducted the first study aimed at demystifying and detecting cryptographic defects in smart contracts.
We proposed CrySol, a fuzzing-based tool to automate the detection of cryptographic defects in smart contracts.
We collected a large-scale dataset containing 25,745 real-world crypto-related smart contracts and evaluated CrySol's effectiveness on it.
arXiv Detail & Related papers (2024-08-09T08:40:08Z) - The Latency Price of Threshold Cryptosystem in Blockchains [52.359230560289745]
We study the interplay between threshold cryptography and a class of blockchains that use Byzantine-fault tolerant (BFT) consensus protocols.
Existing approaches for threshold cryptosystems introduce a latency overhead of at least one message delay for running the threshold cryptographic protocol.
We propose a mechanism to eliminate this overhead for blockchain-native threshold cryptosystems with tight thresholds.
arXiv Detail & Related papers (2024-07-16T20:53:04Z) - Blockchain Large Language Models [65.7726590159576]
This paper presents a dynamic, real-time approach to detecting anomalous blockchain transactions.
The proposed tool, BlockGPT, generates tracing representations of blockchain activity and trains from scratch a large language model to act as a real-time Intrusion Detection System.
arXiv Detail & Related papers (2023-04-25T11:56:18Z) - Token Spammers, Rug Pulls, and SniperBots: An Analysis of the Ecosystem of Tokens in Ethereum and in the Binance Smart Chain (BNB) [50.888293380932616]
We study the ecosystem of the tokens and liquidity pools.
We find that about 60% of tokens are active for less than one day.
We estimate that 1-day rug pulls generated $240 million in profits.
arXiv Detail & Related papers (2022-06-16T14:20:19Z) - Blockchains through ontologies: the case study of the Ethereum ERC721
standard in OASIS (Extended Version) [0.0]
This paper reports on how to leverage the emphOntology for Agents, Systems, and Integration of Services as a general means for the semantic representation of smart contracts stored on blockchain as software agents.
Special attention is paid to non-fungible tokens (NFTs), whose management through the ERC721 standard is presented as a case study.
arXiv Detail & Related papers (2021-09-07T06:54:11Z) - Rectifying Administrated ERC20 Tokens [9.185979263744263]
Many smart contracts are administrated, and the owners of these tokens carry lesser social and legal responsibilities.
This entails two major problems: a) the owners of the tokens have the ability to quickly steal all the funds and disappear from the market; and b) if the private key of the owner's account is stolen, all the assets might immediately turn into the property of the attacker.
We introduce SafelyAdministrated - a library that enforces a responsible ownership and management of ERC20 tokens.
arXiv Detail & Related papers (2021-07-17T18:40:34Z) - Quantum-resistance in blockchain networks [46.63333997460008]
This paper describes the work carried out by the Inter-American Development Bank, the IDB Lab, LACChain, Quantum Computing (CQC), and Tecnologico de Monterrey to identify and eliminate quantum threats in blockchain networks.
The advent of quantum computing threatens internet protocols and blockchain networks because they utilize non-quantum resistant cryptographic algorithms.
arXiv Detail & Related papers (2021-06-11T23:39:25Z) - The Doge of Wall Street: Analysis and Detection of Pump and Dump Cryptocurrency Manipulations [50.521292491613224]
This paper performs an in-depth analysis of two market manipulations organized by communities over the Internet: The pump and dump and the crowd pump.
The pump and dump scheme is a fraud as old as the stock market. Now, it got new vitality in the loosely regulated market of cryptocurrencies.
We report on three case studies related to pump and dump groups.
arXiv Detail & Related papers (2021-05-03T10:20:47Z) - Blockchain is Watching You: Profiling and Deanonymizing Ethereum Users [0.0]
We propose and implement user profiling techniques based on quasi-identifiers.
We describe a malicious value-fingerprinting attack, a variant of the Danaan-gift attack, applicable for the confidential transaction overlays.
arXiv Detail & Related papers (2020-05-28T14:33:32Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.