2021 IEEE International Conference on Decentralized Applications and Infrastructures (DAPPS) 2021
DOI: 10.1109/dapps52256.2021.00013
|View full text |Cite
|
Sign up to set email alerts
|

Blockchain is Watching You: Profiling and Deanonymizing Ethereum Users

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
14
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 29 publications
(14 citation statements)
references
References 19 publications
0
14
0
Order By: Relevance
“…Users can make mistakes, and there are various ways in which the depositor and recipient addresses may become linked, if a user does not interact with the protocol as intended. Béres et al (2020) and Wu et al (2022) have proposed various approaches to de-anonymize Tornado Cash transactions, making use of address re-use, transaction activity, transaction cost choice, or more complex transaction graph and network analyses. For a discussion on how to de-anonymize Tornado Cash transactions or an extended discussion on the anonymity set, refer to the above papers.…”
Section: Anonymity Setmentioning
confidence: 99%
“…Users can make mistakes, and there are various ways in which the depositor and recipient addresses may become linked, if a user does not interact with the protocol as intended. Béres et al (2020) and Wu et al (2022) have proposed various approaches to de-anonymize Tornado Cash transactions, making use of address re-use, transaction activity, transaction cost choice, or more complex transaction graph and network analyses. For a discussion on how to de-anonymize Tornado Cash transactions or an extended discussion on the anonymity set, refer to the above papers.…”
Section: Anonymity Setmentioning
confidence: 99%
“…Other works, such as [21,22], also take inspiration from Trans2Vec. For the task of de-anonymization, which aims to identify two accounts belonging to a single user based on the proximity of account representations, Beres et al [2] evaluate 11 graph learning methods on ground-truth pairs collected from the ENS and Tornado coin-mixers. Among them, Diff2Vec [25] and Role2Vec [1] are considered the state-of-the-art methods.…”
Section: Related Work and Background 21 Ethereum Representation Learningmentioning
confidence: 99%
“…One application of de-anonymization is to trace the flow of money laundering. For example, Tornado Cash [2,27] provides coin-mixing services on Ethereum: a participant deposits certain amounts of ether into a Tornado mixer contract, and use another account to withdraw the deposited coins after a period of time. In our experiment, given a ground-truth pair of EOAs, we use the representation of the query EOA to query its top-𝑘 closest neighbors in the hidden space.…”
Section: De-anonymizationmentioning
confidence: 99%
See 1 more Smart Citation
“…Both Optimistic and zk Rollups offer support importing existing EVM-bytecode with minor modifications, and thus, have a flexible support for smart contracts. Transaction deanonymization and user profiling are major privacy concerns that only zk Rollups address by default [182][183][184].…”
Section: G Congestion Attackmentioning
confidence: 99%