2021
DOI: 10.1145/3491051
|View full text |Cite
|
Sign up to set email alerts
|

Trade or Trick?

Abstract: The prosperity of the cryptocurrency ecosystem drives the need for digital asset trading platforms. Beyond centralized exchanges (CEXs), decentralized exchanges (DEXs) are introduced to allow users to trade cryptocurrency without transferring the custody of their digital assets to the middlemen, thus eliminating the security and privacy issues of traditional CEX. Uniswap, as the most prominent cryptocurrency DEX, is continuing to attract scammers, with fraudulent cryptocurrencies flooding in the ecosystem. In … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 50 publications
(13 citation statements)
references
References 25 publications
0
9
0
Order By: Relevance
“…-Uniswap (UNI): Launched in 2018, Uniswap is a popular decentralized trading protocol known for its role in facilitating automated trading of decentralized finance (DeFi) tokens (Xia et al, 2021).…”
Section: Cryptocurrency As a Financial Phenomenonmentioning
confidence: 99%
“…-Uniswap (UNI): Launched in 2018, Uniswap is a popular decentralized trading protocol known for its role in facilitating automated trading of decentralized finance (DeFi) tokens (Xia et al, 2021).…”
Section: Cryptocurrency As a Financial Phenomenonmentioning
confidence: 99%
“…There exists a burgeoning research direction in measuring exit scams on blockchains. Mazorra et al [8] and Xia et al [17] both detect over 10,000 rugpull scam tokens on the Uniswap platform, which defrauds users out of millions of dollars. Mackenzie analyzes cryptocurrency scams through a criminological lens and divides rugpulls into two types: slow and fast [7].…”
Section: Related Workmentioning
confidence: 99%
“…Due to their investment nature, cryptocurrencies have also been abused as baits to attract users to click links containing malicious contents or install malicious applications, as shown by previous studies [90][91][92]. Malicious behaviors covered up by cryptocurrencies may include phishing, scamming, mining and advertising.…”
Section: Cryptocurrency-themed Malicious Extensionsmentioning
confidence: 99%
“…Identifying Colluding Addresses. Starting from each seed address, we expand our address list by monitoring those controlled by the same entity, known as the malicious-by-association [90]. For example, if a seed address transfers coins to another address immediately after receiving incoming payments from victims, we treat the two addresses as colluding addresses and consider that they belong to the same attacker.…”
Section: Malicious Addresses Identificationmentioning
confidence: 99%