2019
DOI: 10.2139/ssrn.3403656
|View full text |Cite
|
Sign up to set email alerts
|

Probing the Mystery of Cryptocurrency Theft: An Investigation into Methods for Cryptocurrency Tainting Analysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 17 publications
0
5
0
Order By: Relevance
“…We rely on the principle of tainted flows to trace the coins from source actors. Taint analysis has been used most notably in the context of tracking money from illegal sources [1,3,8,24,32]. However, those works mainly focus on the destination of tainted coins.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…We rely on the principle of tainted flows to trace the coins from source actors. Taint analysis has been used most notably in the context of tracking money from illegal sources [1,3,8,24,32]. However, those works mainly focus on the destination of tainted coins.…”
Section: Related Workmentioning
confidence: 99%
“…Output: edges is the edge list of the payout flow. Our algorithm applies haircut tainting, which assumes that the tainted money is divided equally to all output transactions in proportion to their amount [1,32].…”
Section: Bitcoin Taint Flowmentioning
confidence: 99%
See 1 more Smart Citation
“…By providing a fresh address for each donor, the website grants them a certain level of privacy, as the newly-generated receiving address is not overtly linked to the entity it belongs to [16]. However, despite the simplicity of generating new addresses, studies show that the majority of Bitcoin users repeatedly reuse the same address, which suggests that the majority of Bitcoin users do not place a high value on anonymity [4].…”
Section: Generating New Addressesmentioning
confidence: 99%
“…Bitcoin, and many other cryptocurrencies that followed, gained infamy as vehicles and abettors of illegal activity. Dark-web sites like the (now defunct) Silk Road advertised anything from drugs to assassinations in exchange for this new currency [4]. There are numerous ongoing attacks were hackers encrypt the victim's machines and demand ransoms in Bitcoin [5].…”
Section: Introductionmentioning
confidence: 99%