-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathblockchains.bib
54 lines (49 loc) · 6.27 KB
/
blockchains.bib
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
@article{boshmaf_blocktag:_2019,
title = {{BlockTag}: {Design} and applications of a tagging system for blockchain analysis},
shorttitle = {{BlockTag}},
url = {http://arxiv.org/abs/1809.06044},
abstract = {Annotating blockchains with auxiliary data is useful for many applications. For example, e-crime investigations of illegal Tor hidden services, such as Silk Road, often involve linking Bitcoin addresses, from which money is sent or received, to user accounts and related online activities. We present BlockTag, an open-source tagging system for blockchains that facilitates such tasks. We describe BlockTag's design and present three analyses that illustrate its capabilities in the context of privacy research and law enforcement.},
urldate = {2021-05-19},
journal = {arXiv:1809.06044 [cs]},
author = {Boshmaf, Yazan and Jawaheri, Husam Al and Sabah, Mashael Al},
month = jul,
year = {2019},
note = {arXiv: 1809.06044},
keywords = {Computer Science - Cryptography and Security},
}
@article{jawaheri_deanonymizing_2019,
title = {Deanonymizing {Tor} hidden service users through {Bitcoin} transactions analysis},
url = {http://arxiv.org/abs/1801.07501},
abstract = {With the rapid increase of threats on the Internet, people are continuously seeking privacy and anonymity. Services such as Bitcoin and Tor were introduced to provide anonymity for online transactions and Web browsing. Due to its pseudonymity model, Bitcoin lacks retroactive operational security, which means historical pieces of information could be used to identify a certain user. We investigate the feasibility of deanonymizing users of Tor hidden services who rely on Bitcoin as a payment method by exploiting public information leaked from online social networks, the Blockchain, and onion websites. This, for example, allows an adversary to link a user with @alice Twitter address to a Tor hidden service with private.onion address by finding at least one past transaction in the Blockchain that involves their publicly declared Bitcoin addresses. To demonstrate the feasibility of this deanonymization attack, we carried out a real-world experiment simulating a passive, limited adversary. We crawled 1.5K hidden services and collected 88 unique Bitcoin addresses. We then crawled 5B tweets and 1M BitcoinTalk forum pages and collected 4.2K and 41K unique Bitcoin addresses, respectively. Each user address was associated with an online identity along with its public profile information. By analyzing the transactions in the Blockchain, we were able to link 125 unique users to 20 Tor hidden services, including sensitive ones, such as The Pirate Bay and Silk Road. We also analyzed two case studies in detail to demonstrate the implications of the resulting information leakage on user anonymity. In particular, we confirm that Bitcoin addresses should always be considered exploitable, as they can be used to deanonymize users retroactively. This is especially important for Tor hidden service users who actively seek and expect privacy and anonymity.},
urldate = {2021-05-19},
journal = {arXiv:1801.07501 [cs]},
author = {Jawaheri, Husam Al and Sabah, Mashael Al and Boshmaf, Yazan and Erbad, Aiman},
month = jul,
year = {2019},
note = {arXiv: 1801.07501},
keywords = {Computer Science - Cryptography and Security},
}
@article{zhauniarovich_characterizing_2019,
title = {Characterizing {Bitcoin} donations to open source software on {GitHub}},
url = {http://arxiv.org/abs/1907.04002},
abstract = {Web-based hosting services for version control, such as GitHub, have made it easier for people to develop, share, and donate money to software repositories. In this paper, we study the use of Bitcoin to make donations to open source repositories on GitHub. In particular, we analyze the amount and volume of donations over time, in addition to its relationship to the age and popularity of a repository. We scanned over three million repositories looking for donation addresses. We then extracted and analyzed their transactions from Bitcoin's public blockchain. Overall, we found a limited adoption of Bitcoin as a payment method for receiving donations, with nearly 44 thousand deposits adding up to only 8.3 million dollars in the last 10 years. We also found weak positive correlation between the amount of donations in dollars and the popularity of a repository, with highest correlation (r=0.013) associated with number of forks.},
urldate = {2021-05-19},
journal = {arXiv:1907.04002 [cs]},
author = {Zhauniarovich, Yury and Boshmaf, Yazan and Jawaheri, Husam Al and Sabah, Mashael Al},
month = jul,
year = {2019},
note = {arXiv: 1907.04002},
keywords = {Computer Science - Computers and Society, Computer Science - Cryptography and Security},
}
@article{boshmaf_investigating_2019,
title = {Investigating {MMM} {Ponzi} scheme on {Bitcoin}},
url = {http://arxiv.org/abs/1910.12244},
abstract = {Cybercriminals exploit cryptocurrencies to carry out illicit activities. In this paper, we focus on Ponzi schemes that operate on Bitcoin and perform an in-depth analysis of MMM, one of the oldest and most popular Ponzi schemes. Based on 423K transactions involving 16K addresses, we show that: (1) Starting Sep 2014, the scheme goes through three phases over three years. At its peak, MMM circulated more than 150M dollars a day, after which it collapsed by the end of Jun 2016. (2) There is a high income inequality between MMM members, with the daily Gini index reaching more than 0.9. The scheme also exhibits a zero-sum investment model, in which one member's loss is another member's gain. The percentage of victims who never made any profit has grown from 0\% to 41\% in five months, during which the top-earning scammer has made 765K dollars in profit. (3) The scheme has a global reach with 80 different member countries but a highly-asymmetrical flow of money between them. While India and Indonesia have the largest pairwise flow in MMM, members in Indonesia have received 12x more money than they have sent to their counterparts in India.},
urldate = {2021-05-19},
journal = {arXiv:1910.12244 [cs]},
author = {Boshmaf, Yazan and Elvitigala, Charitha and Jawaheri, Husam Al and Wijesekera, Primal and Sabah, Mashael Al},
month = dec,
year = {2019},
note = {arXiv: 1910.12244},
keywords = {Computer Science - Cryptography and Security, Computer Science - Computers and Society},
}