A Better Method to Analyze Blockchain Consistency
2019-10-16
None
Blockchain Consistency
Automatic Bitcoin Address Clustering
2019-10-20
Bitcoin is digital assets infrastructure powering the first worldwide decentralized cryptocurrency of the same name. All history of Bitcoins owning and transferring (addresses and transactions) is available as a public ledger called blockchain. But real-world owners of addresses are not known in general. That’s why Bitcoin is called pseudo-anonymous. However, some addresses can be grouped by their ownership using behavior patterns and publicly available information from off-chain sources. Blockchain-based common behavior pattern analysis (common spending and one-time change heuristics) is widely used for Bitcoin clustering as votes for addresses association, while offchain information (tags) is mostly used to verify results. In this paper, we propose to use off-chain information as votes for address separation and to consider it together with blockchain information during the clustering model construction step. Both blockchain and off-chain information are not reliable, and our approach aims to filter out errors in input data. The results of the study show the feasibility of a proposed approached for Bitcoin address clustering. It can be useful for the users to avoid insecure Bitcoin usage patterns and for the investigators to conduct a more advanced de-anonymizing analysis.
Bitcoin Clustering
Eclipse Attacks on Bitcoin’s Peer-to-Peer Network
2019-10-22
The author of this paper has studied the source code of Bitcoin's network layer in depth and found a major security hole in Bitcoin design at the network layer. The eclipse attack [Tampering with the delivery of blocks and transactions in bitcoin] is a possible attack to Bitcoin network. In such an attack, attackers control parts of network communication, create an adverse network to isolate victims from the rest of normal peers on the network, and block views of these victims. Then, attackers can take advantage of the victims’ computing power for their own malicious purposes, such as selfish mining, double spending and etc. To avoid the happen of eclipse attacks on Bitcoin network, several countermeasures, like deterministic random eviction, more ongoing connections and etc, have been explored and purposed in their work》
Blockchain Security Peer to Peer
Detecting Ponzi Schemes on Ethereum: Towards Healthier Blockchain Technology
2019-10-22
None
Blockchain Security
Smart Contract Development: Challenges and Opportunities
2019-10-22
A survey of smart contract Development.
Smart Contract
Market Manipulation of Bitcoin: Evidence from Mining the Mt. Gox Transaction Network
2019-10-23
This paper investigates the market manipulation of Bitcoin, and shows the evidence from mining the Mt. Gox transaction network. The technology mainly used in this paper is SVD, which I feel novel and interesting. Although Bitcoin is a decentralized system, with the expansion of trading venues and the growth of mining pools, some centralized institutions may still interfere with the system. So the cryptocurrency market must strengthen the supervision..
Blockchain Bitcoin


粤ICP备19090682号-1