SlideShare a Scribd company logo
1 of 20
Download to read offline
BITCOIN
De-anonymization and Money Laundering Detection
Strategies
Bernhard Haslhofer
Austrian Institute of Technology (AIT)
APWG eCrime Symposium
Barcelona, 2015-05-26
BITCRIME
• Bilateral (AT/DE) research project (10/2014 - 10/2016)
• Multidisciplinary team of researchers, policy makers,
and law enforcement agencies
• Goal: research strategies for mitigating crime risks in
virtual currencies
• https://www.bitcrime.de/
2
De-anonymization
Strategies
Cross-reference block chain and external data
3
E1 Tx
A1
A2
A3
Cross-reference block chain
and external data
(cf. Reid and Harrigan 2013)4
E2
E1 Tx
A1
A2
A3
Ty
A1
A4
A5
Cross-reference block chain
and external data
(cf. Reid and Harrigan 2013)5
E2
E1 Tx
A1
A2
A3
Ty
A1
A4
A5
Cross-reference block chain
and external data
(cf. Reid and Harrigan 2013)6
E1
Tx
A1
A2
A3
Ty
A1
A4
A5
Cross-reference block chain
and external data
(cf. Reid and Harrigan 2013)7
E1
Tx
A1
A2
A3
Ty
A1
A4
A5
indexed. While previous works [2, 4] employed a forked version of bitcointools 4
, the newer bitcoin clients
indexed the full blockchain using LevelDB instead making the publicly available bitcointools obsolete.
Instead, we used Armory 5
to parse through the blockchain, and wrote wrapper classes that extracted the
relevant information required to construct the transaction graph.
5.1.2 Web Scraping
Many users, in particular early adopters, are interested in driving bitcoin use into more mainstream public
use. One way they do this is to try to encourage transactions. A common practice is to attach a bitcoin
address as a signature to emails or forum posts. In forum posts especially, users contribute to the community,
for example with new mining software or a tutorial on how to get set up to use bitcoins, and leave their
address in the signature block. They expect to receive tips from forum readers that find their post helpful.
This practice created a natural attack vector to the anonymity of the block chain. We can easily tie user
information to transactions in the block chain.
We used a python package called Scrapy6
to fetch and parse the forum pages(fig. 3). We wrote a spider
that crawls bitcointalk.org in a breadth-first manner looking for post signatures that might contain bitcoin
addresses (i.e. it matched the regular expression r‘1.{26,33}’). We then took this string and verified that it
was a legitimate bitcoin public key (bitcoin addresses include a built-in checksum) to avoid attempting to
annotate a large number nodes that can’t possibly appear in the blockchain.
Figure 3: A typical user signature line that includes a bitcoin address for ‘tipping’.
We were able to find a large number of forum users that can be directly linked to their keys in the
transaction graph. We ran the scraping code for just under 30 hours. During this time we followed links
up to four deep from the home page. This covered a total of 44,086 pages and 89,088 posts that included a
A3
Cross-reference block chain
and external data
(cf. Fleder et al. 2015)8
E1
Tx
A1
A2
A3
Ty
A1
A4
A5
indexed. While previous works [2, 4] employed a forked version of bitcointools 4
, the newer bitcoin clients
indexed the full blockchain using LevelDB instead making the publicly available bitcointools obsolete.
Instead, we used Armory 5
to parse through the blockchain, and wrote wrapper classes that extracted the
relevant information required to construct the transaction graph.
5.1.2 Web Scraping
Many users, in particular early adopters, are interested in driving bitcoin use into more mainstream public
use. One way they do this is to try to encourage transactions. A common practice is to attach a bitcoin
address as a signature to emails or forum posts. In forum posts especially, users contribute to the community,
for example with new mining software or a tutorial on how to get set up to use bitcoins, and leave their
address in the signature block. They expect to receive tips from forum readers that find their post helpful.
This practice created a natural attack vector to the anonymity of the block chain. We can easily tie user
information to transactions in the block chain.
We used a python package called Scrapy6
to fetch and parse the forum pages(fig. 3). We wrote a spider
that crawls bitcointalk.org in a breadth-first manner looking for post signatures that might contain bitcoin
addresses (i.e. it matched the regular expression r‘1.{26,33}’). We then took this string and verified that it
was a legitimate bitcoin public key (bitcoin addresses include a built-in checksum) to avoid attempting to
annotate a large number nodes that can’t possibly appear in the blockchain.
Figure 3: A typical user signature line that includes a bitcoin address for ‘tipping’.
We were able to find a large number of forum users that can be directly linked to their keys in the
transaction graph. We ran the scraping code for just under 30 hours. During this time we followed links
up to four deep from the home page. This covered a total of 44,086 pages and 89,088 posts that included a
A3
Cross-reference block chain
and external data
(cf. Fleder et al. 2015)9
De-anonymization
Strategies
Learn P2P Network Topology
10
Learn P2P Network Topology
Bitcoin network
E2
E1
C
Attacker Machines
Connect to Bitcoin servers
Log servers forwarding IPx
(Biryukov et al., 2014)11
Bitcoin network
E2
E1
C
forward IPx
Attacker Machines
Connect to Bitcoin servers
Log servers forwarding IPxIPx: {E1, E2, …, En}
(Biryukov et al., 2014)
Learn P2P Network Topology
12
Bitcoin network
E2
E1
C
Attacker Machines
Listen for transaction hashes
Log first q servers

forwarding Tx hash
Compare sets and
suggest pairs (IP, T)
IPx: {E1, E2, …, En}
(Biryukov et al., 2014)
Learn P2P Network Topology
13
Bitcoin network
E2
E1
C
forward Tx
Attacker Machines
Listen for transaction hashes
Log first q servers

forwarding Tx hash
Tx: {E1, E2, …, En}
Compare sets and
suggest pairs (IP, T)
IPx: {E1, E2, …, En}
(Biryukov et al., 2014)
Learn P2P Network Topology
14
Money Laundering
Detection Strategies
Scan block chain for known patterns
15
Scan block chain for known
patterns
Placement Layering Integration
Smurfing/

Structuring
Problem: Mixing services can anonymize relationship
between sender and receiver
16
Reverse Engineer Mixing
Services
(Möser et al., 2013)17
Problem: Mixers work very well -> finding relations is hard
Money Laundering
Prevention Strategy
Transaction Blacklisting
18
19
Towards Risk Scoring of Bitcoin Transactions
Malte M¨oser, Rainer B¨ohme, and Dominic Breuker
Department of Information Systems, University of M¨unster, Germany
Abstract. If Bitcoin becomes the prevalent payment system on the In-
ternet, crime fighters will join forces with regulators and enforce black-
listing of transaction prefixes at the parties who offer real products and
services in exchange for bitcoin. Blacklisted bitcoins will be hard to spend
and therefore less liquid and less valuable. This requires every recipient of
Bitcoin payments not only to check all incoming transactions for possible
blacklistings, but also to assess the risk of a transaction being blacklisted
in the future. We elaborate this scenario, specify a risk model, devise a
prediction approach using public knowledge, and present preliminary re-
sults using data from selected known thefts. We discuss the implications
on markets where bitcoins are traded and critically revisit Bitcoin’s abil-
ity to serve as a unit of account.
1 Introduction
Whenever a merchant receives a 100-dollar note, she is well advised to carefully
References
• HM Treasury (2015). Digital Currencies: response to the call for
information. Available at: https://www.gov.uk/government/consultations/digital-
currencies-call-for-information
• Reid and Harrigan (2013). An Analysis of Anonymity in the Bitcoin
System. Available at: http://arxiv.org/abs/1107.4524
• Fleder et al. (2015). Bitcoin Transaction Graph Analysis. Available at:
http://arxiv.org/abs/1502.01657
• Biryukov et al. (2014). Deanonymization of clients in Bitcoin P2P
network. Available at: http://arxiv.org/abs/1405.7418
• Möser et al. (2013). An Inquiry into Money Laundering Tools in the
Bitcoin Ecosystem. Available at: https://maltemoeser.de/paper/money-laundering.pdf
20

More Related Content

What's hot

Introduction to bitcoin
Introduction to bitcoinIntroduction to bitcoin
Introduction to bitcoinWolf McNally
 
Bitcoin (Cryptocurrency)
Bitcoin (Cryptocurrency)Bitcoin (Cryptocurrency)
Bitcoin (Cryptocurrency)Tsasaa Tsas
 
Bitcoin A Peer-to-Peer Electronic Cash System
Bitcoin A Peer-to-Peer Electronic Cash SystemBitcoin A Peer-to-Peer Electronic Cash System
Bitcoin A Peer-to-Peer Electronic Cash SystemFlavio Vit
 
Bitcoin and Blockchain Technology: An Introduction
Bitcoin and Blockchain Technology: An IntroductionBitcoin and Blockchain Technology: An Introduction
Bitcoin and Blockchain Technology: An IntroductionFerdinando Maria Ametrano
 
BITFURY EXPLAINS HOW TO SECURELY STORE AND TRANSFER DIGITAL ASSETS ON THE BIT...
BITFURY EXPLAINS HOW TO SECURELY STORE AND TRANSFER DIGITAL ASSETS ON THE BIT...BITFURY EXPLAINS HOW TO SECURELY STORE AND TRANSFER DIGITAL ASSETS ON THE BIT...
BITFURY EXPLAINS HOW TO SECURELY STORE AND TRANSFER DIGITAL ASSETS ON THE BIT...Steven Rhyner
 
BITCOIN TECHNOLOGY AND ITS USES
BITCOIN TECHNOLOGY AND ITS USESBITCOIN TECHNOLOGY AND ITS USES
BITCOIN TECHNOLOGY AND ITS USESRishikese MR
 
Block Chain Bitcoin and Crypto Currency
Block Chain Bitcoin and Crypto CurrencyBlock Chain Bitcoin and Crypto Currency
Block Chain Bitcoin and Crypto CurrencyNidhin P Koshy
 
Bitcoin Introduction - customer presentation APR 2017
Bitcoin Introduction - customer presentation  APR 2017Bitcoin Introduction - customer presentation  APR 2017
Bitcoin Introduction - customer presentation APR 2017Oron Barber
 
201811 Bitcoin, Blockchain and the Technology behind Cryptocurrencies
201811 Bitcoin, Blockchain and the Technology behind Cryptocurrencies201811 Bitcoin, Blockchain and the Technology behind Cryptocurrencies
201811 Bitcoin, Blockchain and the Technology behind CryptocurrenciesPaperchain
 
Bitcoin Final Year Seminar (PPT)
Bitcoin Final Year Seminar (PPT)Bitcoin Final Year Seminar (PPT)
Bitcoin Final Year Seminar (PPT)Shantanu Singh
 
Bitcoin - the basics
Bitcoin - the basicsBitcoin - the basics
Bitcoin - the basicsUri Nativ
 
WHAT IS MINING? WHAT IS BITCOIN?
WHAT IS MINING? WHAT IS BITCOIN?WHAT IS MINING? WHAT IS BITCOIN?
WHAT IS MINING? WHAT IS BITCOIN?JemSon Junio
 

What's hot (20)

Bitcoin & Blockchain Basics
Bitcoin & Blockchain BasicsBitcoin & Blockchain Basics
Bitcoin & Blockchain Basics
 
Introduction to bitcoin
Introduction to bitcoinIntroduction to bitcoin
Introduction to bitcoin
 
Bitcoin (Cryptocurrency)
Bitcoin (Cryptocurrency)Bitcoin (Cryptocurrency)
Bitcoin (Cryptocurrency)
 
Bitcoin A Peer-to-Peer Electronic Cash System
Bitcoin A Peer-to-Peer Electronic Cash SystemBitcoin A Peer-to-Peer Electronic Cash System
Bitcoin A Peer-to-Peer Electronic Cash System
 
Bitcoin and Blockchain Technology: An Introduction
Bitcoin and Blockchain Technology: An IntroductionBitcoin and Blockchain Technology: An Introduction
Bitcoin and Blockchain Technology: An Introduction
 
BITFURY EXPLAINS HOW TO SECURELY STORE AND TRANSFER DIGITAL ASSETS ON THE BIT...
BITFURY EXPLAINS HOW TO SECURELY STORE AND TRANSFER DIGITAL ASSETS ON THE BIT...BITFURY EXPLAINS HOW TO SECURELY STORE AND TRANSFER DIGITAL ASSETS ON THE BIT...
BITFURY EXPLAINS HOW TO SECURELY STORE AND TRANSFER DIGITAL ASSETS ON THE BIT...
 
BITCOIN TECHNOLOGY AND ITS USES
BITCOIN TECHNOLOGY AND ITS USESBITCOIN TECHNOLOGY AND ITS USES
BITCOIN TECHNOLOGY AND ITS USES
 
Block chain introduction
Block chain introductionBlock chain introduction
Block chain introduction
 
Bitcoin - the Basics
Bitcoin - the BasicsBitcoin - the Basics
Bitcoin - the Basics
 
Block chain
Block chainBlock chain
Block chain
 
bitcoin technology
bitcoin technologybitcoin technology
bitcoin technology
 
Block Chain Bitcoin and Crypto Currency
Block Chain Bitcoin and Crypto CurrencyBlock Chain Bitcoin and Crypto Currency
Block Chain Bitcoin and Crypto Currency
 
Bitcoin Introduction - customer presentation APR 2017
Bitcoin Introduction - customer presentation  APR 2017Bitcoin Introduction - customer presentation  APR 2017
Bitcoin Introduction - customer presentation APR 2017
 
BITCOIN EXPLAINED
BITCOIN EXPLAINEDBITCOIN EXPLAINED
BITCOIN EXPLAINED
 
201811 Bitcoin, Blockchain and the Technology behind Cryptocurrencies
201811 Bitcoin, Blockchain and the Technology behind Cryptocurrencies201811 Bitcoin, Blockchain and the Technology behind Cryptocurrencies
201811 Bitcoin, Blockchain and the Technology behind Cryptocurrencies
 
Bitcoin Final Year Seminar (PPT)
Bitcoin Final Year Seminar (PPT)Bitcoin Final Year Seminar (PPT)
Bitcoin Final Year Seminar (PPT)
 
Bitcoin - the basics
Bitcoin - the basicsBitcoin - the basics
Bitcoin - the basics
 
WHAT IS MINING? WHAT IS BITCOIN?
WHAT IS MINING? WHAT IS BITCOIN?WHAT IS MINING? WHAT IS BITCOIN?
WHAT IS MINING? WHAT IS BITCOIN?
 
Bit coin basics 101
Bit coin basics 101Bit coin basics 101
Bit coin basics 101
 
basics to blockchain
basics to blockchainbasics to blockchain
basics to blockchain
 

Viewers also liked

Blockchain: under the hood
Blockchain: under the hoodBlockchain: under the hood
Blockchain: under the hoodDmitry Meshkov
 
deftcon 2015 - Stefano Capaccioli - Riciclaggio e Antiriciclaggio nell’era de...
deftcon 2015 - Stefano Capaccioli - Riciclaggio e Antiriciclaggio nell’era de...deftcon 2015 - Stefano Capaccioli - Riciclaggio e Antiriciclaggio nell’era de...
deftcon 2015 - Stefano Capaccioli - Riciclaggio e Antiriciclaggio nell’era de...Deft Association
 
Bitcoin, the Blockchain, and Open Source
Bitcoin, the Blockchain, and Open SourceBitcoin, the Blockchain, and Open Source
Bitcoin, the Blockchain, and Open SourceAll Things Open
 
Anatomy of a blockchain
Anatomy of a blockchainAnatomy of a blockchain
Anatomy of a blockchainAvtar Sehra
 
Intro to Bitcoin
Intro to BitcoinIntro to Bitcoin
Intro to BitcoinRon Gross
 
Bitcoin - Introduction, Technical Aspects and Ongoing Developments
Bitcoin - Introduction, Technical Aspects and Ongoing DevelopmentsBitcoin - Introduction, Technical Aspects and Ongoing Developments
Bitcoin - Introduction, Technical Aspects and Ongoing DevelopmentsBernhard Haslhofer
 
Bitcoin and the future of cryptocurrency
Bitcoin and the future of cryptocurrencyBitcoin and the future of cryptocurrency
Bitcoin and the future of cryptocurrencyBen Hall
 
[22/03/2016] Conférence : Blockchain, disruption & révolution
[22/03/2016] Conférence : Blockchain, disruption & révolution[22/03/2016] Conférence : Blockchain, disruption & révolution
[22/03/2016] Conférence : Blockchain, disruption & révolutionSilicon Comté
 
Bitcoin Forensics - Riciclaggio e Antiriciclaggio nell'era del Bitcoin
Bitcoin Forensics - Riciclaggio e Antiriciclaggio nell'era del BitcoinBitcoin Forensics - Riciclaggio e Antiriciclaggio nell'era del Bitcoin
Bitcoin Forensics - Riciclaggio e Antiriciclaggio nell'era del Bitcoindalchecco
 

Viewers also liked (11)

Metadata is back!
Metadata is back!Metadata is back!
Metadata is back!
 
Blockchain: under the hood
Blockchain: under the hoodBlockchain: under the hood
Blockchain: under the hood
 
deftcon 2015 - Stefano Capaccioli - Riciclaggio e Antiriciclaggio nell’era de...
deftcon 2015 - Stefano Capaccioli - Riciclaggio e Antiriciclaggio nell’era de...deftcon 2015 - Stefano Capaccioli - Riciclaggio e Antiriciclaggio nell’era de...
deftcon 2015 - Stefano Capaccioli - Riciclaggio e Antiriciclaggio nell’era de...
 
Bitcoin, the Blockchain, and Open Source
Bitcoin, the Blockchain, and Open SourceBitcoin, the Blockchain, and Open Source
Bitcoin, the Blockchain, and Open Source
 
Anatomy of a blockchain
Anatomy of a blockchainAnatomy of a blockchain
Anatomy of a blockchain
 
Intro to Bitcoin
Intro to BitcoinIntro to Bitcoin
Intro to Bitcoin
 
Bitcoin - Introduction, Technical Aspects and Ongoing Developments
Bitcoin - Introduction, Technical Aspects and Ongoing DevelopmentsBitcoin - Introduction, Technical Aspects and Ongoing Developments
Bitcoin - Introduction, Technical Aspects and Ongoing Developments
 
Bitcoin and the future of cryptocurrency
Bitcoin and the future of cryptocurrencyBitcoin and the future of cryptocurrency
Bitcoin and the future of cryptocurrency
 
[22/03/2016] Conférence : Blockchain, disruption & révolution
[22/03/2016] Conférence : Blockchain, disruption & révolution[22/03/2016] Conférence : Blockchain, disruption & révolution
[22/03/2016] Conférence : Blockchain, disruption & révolution
 
Bitcoin Forensics - Riciclaggio e Antiriciclaggio nell'era del Bitcoin
Bitcoin Forensics - Riciclaggio e Antiriciclaggio nell'era del BitcoinBitcoin Forensics - Riciclaggio e Antiriciclaggio nell'era del Bitcoin
Bitcoin Forensics - Riciclaggio e Antiriciclaggio nell'era del Bitcoin
 
Introduction Bitcoin
Introduction BitcoinIntroduction Bitcoin
Introduction Bitcoin
 

Similar to BITCOIN - De-anonymization and Money Laundering Detection Strategies

IRJET - Framework for Realtime Bitcoin Transaction
IRJET -  	  Framework for Realtime Bitcoin TransactionIRJET -  	  Framework for Realtime Bitcoin Transaction
IRJET - Framework for Realtime Bitcoin TransactionIRJET Journal
 
Bits, Blocks, and Chains: A Concise Examination of Bitcoin and Cryptocurrency...
Bits, Blocks, and Chains: A Concise Examination of Bitcoin and Cryptocurrency...Bits, Blocks, and Chains: A Concise Examination of Bitcoin and Cryptocurrency...
Bits, Blocks, and Chains: A Concise Examination of Bitcoin and Cryptocurrency...Richard Givens
 
A Technological Perspective of Blockchain Security
A Technological Perspective of Blockchain SecurityA Technological Perspective of Blockchain Security
A Technological Perspective of Blockchain SecurityRagaviRaghavan
 
Understanding blockchaintechnology
Understanding blockchaintechnologyUnderstanding blockchaintechnology
Understanding blockchaintechnologySubhashKumar329
 
Understanding blockchaintechnology
Understanding blockchaintechnology Understanding blockchaintechnology
Understanding blockchaintechnology SubhashKumar329
 
P5 to blockchain or not to blockchain
P5 to blockchain or not to blockchainP5 to blockchain or not to blockchain
P5 to blockchain or not to blockchaindevid8
 
IRJET- Security Threats on Blockchain and its Countermeasures
IRJET- Security Threats on Blockchain and its CountermeasuresIRJET- Security Threats on Blockchain and its Countermeasures
IRJET- Security Threats on Blockchain and its CountermeasuresIRJET Journal
 
Click Ventures Blockchain Ecosystem Report 2018
Click Ventures Blockchain Ecosystem Report 2018Click Ventures Blockchain Ecosystem Report 2018
Click Ventures Blockchain Ecosystem Report 2018Frederick Ng
 
IRJET- Blockchain Technology in Cloud Computing : A Systematic Review
IRJET-  	  Blockchain Technology in Cloud Computing : A Systematic ReviewIRJET-  	  Blockchain Technology in Cloud Computing : A Systematic Review
IRJET- Blockchain Technology in Cloud Computing : A Systematic ReviewIRJET Journal
 
Blockchain an introduction_n_li
Blockchain an introduction_n_liBlockchain an introduction_n_li
Blockchain an introduction_n_linikinew1
 
Patent landscape of blockchain in us and jp
Patent landscape of blockchain in us and jpPatent landscape of blockchain in us and jp
Patent landscape of blockchain in us and jpTajima Ryosuke
 
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...cscpconf
 
BlockChain and Its Eco-System
BlockChain and Its Eco-SystemBlockChain and Its Eco-System
BlockChain and Its Eco-SystemJeff Yang
 
IRJET- Bitcoin - The Future Currency
IRJET- Bitcoin - The Future CurrencyIRJET- Bitcoin - The Future Currency
IRJET- Bitcoin - The Future CurrencyIRJET Journal
 
Blockchain and Its Applications in the Real World
Blockchain and Its Applications in the Real WorldBlockchain and Its Applications in the Real World
Blockchain and Its Applications in the Real WorldIRJET Journal
 
IRJET- Secure Online Voting Systems using Block of Chunks
IRJET-  	  Secure Online Voting Systems using Block of ChunksIRJET-  	  Secure Online Voting Systems using Block of Chunks
IRJET- Secure Online Voting Systems using Block of ChunksIRJET Journal
 
Blockchain technology overview
Blockchain technology overviewBlockchain technology overview
Blockchain technology overviewRishabhMalik32
 
Blockchain for the internet of things a systematic literature review
Blockchain for the internet of things  a systematic literature reviewBlockchain for the internet of things  a systematic literature review
Blockchain for the internet of things a systematic literature revieweraser Juan José Calderón
 

Similar to BITCOIN - De-anonymization and Money Laundering Detection Strategies (20)

IRJET - Framework for Realtime Bitcoin Transaction
IRJET -  	  Framework for Realtime Bitcoin TransactionIRJET -  	  Framework for Realtime Bitcoin Transaction
IRJET - Framework for Realtime Bitcoin Transaction
 
Bits, Blocks, and Chains: A Concise Examination of Bitcoin and Cryptocurrency...
Bits, Blocks, and Chains: A Concise Examination of Bitcoin and Cryptocurrency...Bits, Blocks, and Chains: A Concise Examination of Bitcoin and Cryptocurrency...
Bits, Blocks, and Chains: A Concise Examination of Bitcoin and Cryptocurrency...
 
A Technological Perspective of Blockchain Security
A Technological Perspective of Blockchain SecurityA Technological Perspective of Blockchain Security
A Technological Perspective of Blockchain Security
 
CIKMTutorial.pdf
CIKMTutorial.pdfCIKMTutorial.pdf
CIKMTutorial.pdf
 
Understanding blockchaintechnology
Understanding blockchaintechnologyUnderstanding blockchaintechnology
Understanding blockchaintechnology
 
Understanding blockchaintechnology
Understanding blockchaintechnology Understanding blockchaintechnology
Understanding blockchaintechnology
 
P5 to blockchain or not to blockchain
P5 to blockchain or not to blockchainP5 to blockchain or not to blockchain
P5 to blockchain or not to blockchain
 
IRJET- Security Threats on Blockchain and its Countermeasures
IRJET- Security Threats on Blockchain and its CountermeasuresIRJET- Security Threats on Blockchain and its Countermeasures
IRJET- Security Threats on Blockchain and its Countermeasures
 
Click Ventures Blockchain Ecosystem Report 2018
Click Ventures Blockchain Ecosystem Report 2018Click Ventures Blockchain Ecosystem Report 2018
Click Ventures Blockchain Ecosystem Report 2018
 
IRJET- Blockchain Technology in Cloud Computing : A Systematic Review
IRJET-  	  Blockchain Technology in Cloud Computing : A Systematic ReviewIRJET-  	  Blockchain Technology in Cloud Computing : A Systematic Review
IRJET- Blockchain Technology in Cloud Computing : A Systematic Review
 
Blockchain an introduction_n_li
Blockchain an introduction_n_liBlockchain an introduction_n_li
Blockchain an introduction_n_li
 
An Introduction to Blockchains
An Introduction to BlockchainsAn Introduction to Blockchains
An Introduction to Blockchains
 
Patent landscape of blockchain in us and jp
Patent landscape of blockchain in us and jpPatent landscape of blockchain in us and jp
Patent landscape of blockchain in us and jp
 
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...
 
BlockChain and Its Eco-System
BlockChain and Its Eco-SystemBlockChain and Its Eco-System
BlockChain and Its Eco-System
 
IRJET- Bitcoin - The Future Currency
IRJET- Bitcoin - The Future CurrencyIRJET- Bitcoin - The Future Currency
IRJET- Bitcoin - The Future Currency
 
Blockchain and Its Applications in the Real World
Blockchain and Its Applications in the Real WorldBlockchain and Its Applications in the Real World
Blockchain and Its Applications in the Real World
 
IRJET- Secure Online Voting Systems using Block of Chunks
IRJET-  	  Secure Online Voting Systems using Block of ChunksIRJET-  	  Secure Online Voting Systems using Block of Chunks
IRJET- Secure Online Voting Systems using Block of Chunks
 
Blockchain technology overview
Blockchain technology overviewBlockchain technology overview
Blockchain technology overview
 
Blockchain for the internet of things a systematic literature review
Blockchain for the internet of things  a systematic literature reviewBlockchain for the internet of things  a systematic literature review
Blockchain for the internet of things a systematic literature review
 

More from Bernhard Haslhofer

Decentralized Finance (DeFi) - Understanding Risks in an Emerging Financial P...
Decentralized Finance (DeFi) - Understanding Risks in an Emerging Financial P...Decentralized Finance (DeFi) - Understanding Risks in an Emerging Financial P...
Decentralized Finance (DeFi) - Understanding Risks in an Emerging Financial P...Bernhard Haslhofer
 
Token Systems, Payment Channels, and Corporate Currencies
Token Systems, Payment Channels, and Corporate CurrenciesToken Systems, Payment Channels, and Corporate Currencies
Token Systems, Payment Channels, and Corporate CurrenciesBernhard Haslhofer
 
Can a blockchain solve the trust problem?
Can a blockchain solve the trust problem?Can a blockchain solve the trust problem?
Can a blockchain solve the trust problem?Bernhard Haslhofer
 
Measurements in Cryptocurrency Networks
Measurements in Cryptocurrency NetworksMeasurements in Cryptocurrency Networks
Measurements in Cryptocurrency NetworksBernhard Haslhofer
 
Post-Bitcoin Cryptocurrencies, Off-Chain Transaction Channels, and Cryptocur...
 Post-Bitcoin Cryptocurrencies, Off-Chain Transaction Channels, and Cryptocur... Post-Bitcoin Cryptocurrencies, Off-Chain Transaction Channels, and Cryptocur...
Post-Bitcoin Cryptocurrencies, Off-Chain Transaction Channels, and Cryptocur...Bernhard Haslhofer
 
Insight Into Cryptocurrencies - Methods and Tools for Analyzing Blockchain-ba...
Insight Into Cryptocurrencies - Methods and Tools for Analyzing Blockchain-ba...Insight Into Cryptocurrencies - Methods and Tools for Analyzing Blockchain-ba...
Insight Into Cryptocurrencies - Methods and Tools for Analyzing Blockchain-ba...Bernhard Haslhofer
 
O Bitcoin Where Art Thou? An Introduction to Cryptocurrency Analytics
O Bitcoin Where Art Thou? An Introduction to Cryptocurrency AnalyticsO Bitcoin Where Art Thou? An Introduction to Cryptocurrency Analytics
O Bitcoin Where Art Thou? An Introduction to Cryptocurrency AnalyticsBernhard Haslhofer
 
Mind the Gap - Data Science Meets Software Engineering
Mind the Gap - Data Science Meets Software EngineeringMind the Gap - Data Science Meets Software Engineering
Mind the Gap - Data Science Meets Software EngineeringBernhard Haslhofer
 
Maphub und Pelagios: Anwendung von Linked Data in den Digitalen Geisteswissen...
Maphub und Pelagios: Anwendung von Linked Data in den Digitalen Geisteswissen...Maphub und Pelagios: Anwendung von Linked Data in den Digitalen Geisteswissen...
Maphub und Pelagios: Anwendung von Linked Data in den Digitalen Geisteswissen...Bernhard Haslhofer
 
The value of open data and the OpenGLAM network
The value of open data and the OpenGLAM networkThe value of open data and the OpenGLAM network
The value of open data and the OpenGLAM networkBernhard Haslhofer
 
Offene Daten im Kulturbereich - Die pragmatische Perspektive
Offene Daten im Kulturbereich - Die pragmatische PerspektiveOffene Daten im Kulturbereich - Die pragmatische Perspektive
Offene Daten im Kulturbereich - Die pragmatische PerspektiveBernhard Haslhofer
 
Open Data - Principles and Techniques
Open Data - Principles and TechniquesOpen Data - Principles and Techniques
Open Data - Principles and TechniquesBernhard Haslhofer
 
Semantic Tagging on Historical Maps
Semantic Tagging on Historical MapsSemantic Tagging on Historical Maps
Semantic Tagging on Historical MapsBernhard Haslhofer
 
OpenGLAM Intro @ OKFN.AT Meetup Graz
OpenGLAM Intro @ OKFN.AT Meetup GrazOpenGLAM Intro @ OKFN.AT Meetup Graz
OpenGLAM Intro @ OKFN.AT Meetup GrazBernhard Haslhofer
 
Semantic Tagging for old maps...and other things on the Web
Semantic Tagging for old maps...and other things on the WebSemantic Tagging for old maps...and other things on the Web
Semantic Tagging for old maps...and other things on the WebBernhard Haslhofer
 
ResourceSync: Leveraging Sitemaps for Resource Synchronization
ResourceSync: Leveraging Sitemaps for Resource SynchronizationResourceSync: Leveraging Sitemaps for Resource Synchronization
ResourceSync: Leveraging Sitemaps for Resource SynchronizationBernhard Haslhofer
 
Using SKOS Vocabularies for Improving Web Search
Using SKOS Vocabularies for Improving Web SearchUsing SKOS Vocabularies for Improving Web Search
Using SKOS Vocabularies for Improving Web SearchBernhard Haslhofer
 

More from Bernhard Haslhofer (20)

Decentralized Finance (DeFi) - Understanding Risks in an Emerging Financial P...
Decentralized Finance (DeFi) - Understanding Risks in an Emerging Financial P...Decentralized Finance (DeFi) - Understanding Risks in an Emerging Financial P...
Decentralized Finance (DeFi) - Understanding Risks in an Emerging Financial P...
 
Token Systems, Payment Channels, and Corporate Currencies
Token Systems, Payment Channels, and Corporate CurrenciesToken Systems, Payment Channels, and Corporate Currencies
Token Systems, Payment Channels, and Corporate Currencies
 
Can a blockchain solve the trust problem?
Can a blockchain solve the trust problem?Can a blockchain solve the trust problem?
Can a blockchain solve the trust problem?
 
Measurements in Cryptocurrency Networks
Measurements in Cryptocurrency NetworksMeasurements in Cryptocurrency Networks
Measurements in Cryptocurrency Networks
 
Post-Bitcoin Cryptocurrencies, Off-Chain Transaction Channels, and Cryptocur...
 Post-Bitcoin Cryptocurrencies, Off-Chain Transaction Channels, and Cryptocur... Post-Bitcoin Cryptocurrencies, Off-Chain Transaction Channels, and Cryptocur...
Post-Bitcoin Cryptocurrencies, Off-Chain Transaction Channels, and Cryptocur...
 
Insight Into Cryptocurrencies - Methods and Tools for Analyzing Blockchain-ba...
Insight Into Cryptocurrencies - Methods and Tools for Analyzing Blockchain-ba...Insight Into Cryptocurrencies - Methods and Tools for Analyzing Blockchain-ba...
Insight Into Cryptocurrencies - Methods and Tools for Analyzing Blockchain-ba...
 
O Bitcoin Where Art Thou? An Introduction to Cryptocurrency Analytics
O Bitcoin Where Art Thou? An Introduction to Cryptocurrency AnalyticsO Bitcoin Where Art Thou? An Introduction to Cryptocurrency Analytics
O Bitcoin Where Art Thou? An Introduction to Cryptocurrency Analytics
 
Mind the Gap - Data Science Meets Software Engineering
Mind the Gap - Data Science Meets Software EngineeringMind the Gap - Data Science Meets Software Engineering
Mind the Gap - Data Science Meets Software Engineering
 
Maphub und Pelagios: Anwendung von Linked Data in den Digitalen Geisteswissen...
Maphub und Pelagios: Anwendung von Linked Data in den Digitalen Geisteswissen...Maphub und Pelagios: Anwendung von Linked Data in den Digitalen Geisteswissen...
Maphub und Pelagios: Anwendung von Linked Data in den Digitalen Geisteswissen...
 
The value of open data and the OpenGLAM network
The value of open data and the OpenGLAM networkThe value of open data and the OpenGLAM network
The value of open data and the OpenGLAM network
 
Things, not Strings
Things, not StringsThings, not Strings
Things, not Strings
 
Offene Daten im Kulturbereich - Die pragmatische Perspektive
Offene Daten im Kulturbereich - Die pragmatische PerspektiveOffene Daten im Kulturbereich - Die pragmatische Perspektive
Offene Daten im Kulturbereich - Die pragmatische Perspektive
 
Open Data - Principles and Techniques
Open Data - Principles and TechniquesOpen Data - Principles and Techniques
Open Data - Principles and Techniques
 
Semantic Tagging on Historical Maps
Semantic Tagging on Historical MapsSemantic Tagging on Historical Maps
Semantic Tagging on Historical Maps
 
The Story behind Maphub
The Story behind MaphubThe Story behind Maphub
The Story behind Maphub
 
OpenGLAM Intro @ OKFN.AT Meetup Graz
OpenGLAM Intro @ OKFN.AT Meetup GrazOpenGLAM Intro @ OKFN.AT Meetup Graz
OpenGLAM Intro @ OKFN.AT Meetup Graz
 
Semantic Tagging for old maps...and other things on the Web
Semantic Tagging for old maps...and other things on the WebSemantic Tagging for old maps...and other things on the Web
Semantic Tagging for old maps...and other things on the Web
 
Linked (Open) Data
Linked (Open) DataLinked (Open) Data
Linked (Open) Data
 
ResourceSync: Leveraging Sitemaps for Resource Synchronization
ResourceSync: Leveraging Sitemaps for Resource SynchronizationResourceSync: Leveraging Sitemaps for Resource Synchronization
ResourceSync: Leveraging Sitemaps for Resource Synchronization
 
Using SKOS Vocabularies for Improving Web Search
Using SKOS Vocabularies for Improving Web SearchUsing SKOS Vocabularies for Improving Web Search
Using SKOS Vocabularies for Improving Web Search
 

Recently uploaded

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 

Recently uploaded (20)

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 

BITCOIN - De-anonymization and Money Laundering Detection Strategies

  • 1. BITCOIN De-anonymization and Money Laundering Detection Strategies Bernhard Haslhofer Austrian Institute of Technology (AIT) APWG eCrime Symposium Barcelona, 2015-05-26
  • 2. BITCRIME • Bilateral (AT/DE) research project (10/2014 - 10/2016) • Multidisciplinary team of researchers, policy makers, and law enforcement agencies • Goal: research strategies for mitigating crime risks in virtual currencies • https://www.bitcrime.de/ 2
  • 4. E1 Tx A1 A2 A3 Cross-reference block chain and external data (cf. Reid and Harrigan 2013)4
  • 5. E2 E1 Tx A1 A2 A3 Ty A1 A4 A5 Cross-reference block chain and external data (cf. Reid and Harrigan 2013)5
  • 6. E2 E1 Tx A1 A2 A3 Ty A1 A4 A5 Cross-reference block chain and external data (cf. Reid and Harrigan 2013)6
  • 7. E1 Tx A1 A2 A3 Ty A1 A4 A5 Cross-reference block chain and external data (cf. Reid and Harrigan 2013)7
  • 8. E1 Tx A1 A2 A3 Ty A1 A4 A5 indexed. While previous works [2, 4] employed a forked version of bitcointools 4 , the newer bitcoin clients indexed the full blockchain using LevelDB instead making the publicly available bitcointools obsolete. Instead, we used Armory 5 to parse through the blockchain, and wrote wrapper classes that extracted the relevant information required to construct the transaction graph. 5.1.2 Web Scraping Many users, in particular early adopters, are interested in driving bitcoin use into more mainstream public use. One way they do this is to try to encourage transactions. A common practice is to attach a bitcoin address as a signature to emails or forum posts. In forum posts especially, users contribute to the community, for example with new mining software or a tutorial on how to get set up to use bitcoins, and leave their address in the signature block. They expect to receive tips from forum readers that find their post helpful. This practice created a natural attack vector to the anonymity of the block chain. We can easily tie user information to transactions in the block chain. We used a python package called Scrapy6 to fetch and parse the forum pages(fig. 3). We wrote a spider that crawls bitcointalk.org in a breadth-first manner looking for post signatures that might contain bitcoin addresses (i.e. it matched the regular expression r‘1.{26,33}’). We then took this string and verified that it was a legitimate bitcoin public key (bitcoin addresses include a built-in checksum) to avoid attempting to annotate a large number nodes that can’t possibly appear in the blockchain. Figure 3: A typical user signature line that includes a bitcoin address for ‘tipping’. We were able to find a large number of forum users that can be directly linked to their keys in the transaction graph. We ran the scraping code for just under 30 hours. During this time we followed links up to four deep from the home page. This covered a total of 44,086 pages and 89,088 posts that included a A3 Cross-reference block chain and external data (cf. Fleder et al. 2015)8
  • 9. E1 Tx A1 A2 A3 Ty A1 A4 A5 indexed. While previous works [2, 4] employed a forked version of bitcointools 4 , the newer bitcoin clients indexed the full blockchain using LevelDB instead making the publicly available bitcointools obsolete. Instead, we used Armory 5 to parse through the blockchain, and wrote wrapper classes that extracted the relevant information required to construct the transaction graph. 5.1.2 Web Scraping Many users, in particular early adopters, are interested in driving bitcoin use into more mainstream public use. One way they do this is to try to encourage transactions. A common practice is to attach a bitcoin address as a signature to emails or forum posts. In forum posts especially, users contribute to the community, for example with new mining software or a tutorial on how to get set up to use bitcoins, and leave their address in the signature block. They expect to receive tips from forum readers that find their post helpful. This practice created a natural attack vector to the anonymity of the block chain. We can easily tie user information to transactions in the block chain. We used a python package called Scrapy6 to fetch and parse the forum pages(fig. 3). We wrote a spider that crawls bitcointalk.org in a breadth-first manner looking for post signatures that might contain bitcoin addresses (i.e. it matched the regular expression r‘1.{26,33}’). We then took this string and verified that it was a legitimate bitcoin public key (bitcoin addresses include a built-in checksum) to avoid attempting to annotate a large number nodes that can’t possibly appear in the blockchain. Figure 3: A typical user signature line that includes a bitcoin address for ‘tipping’. We were able to find a large number of forum users that can be directly linked to their keys in the transaction graph. We ran the scraping code for just under 30 hours. During this time we followed links up to four deep from the home page. This covered a total of 44,086 pages and 89,088 posts that included a A3 Cross-reference block chain and external data (cf. Fleder et al. 2015)9
  • 11. Learn P2P Network Topology Bitcoin network E2 E1 C Attacker Machines Connect to Bitcoin servers Log servers forwarding IPx (Biryukov et al., 2014)11
  • 12. Bitcoin network E2 E1 C forward IPx Attacker Machines Connect to Bitcoin servers Log servers forwarding IPxIPx: {E1, E2, …, En} (Biryukov et al., 2014) Learn P2P Network Topology 12
  • 13. Bitcoin network E2 E1 C Attacker Machines Listen for transaction hashes Log first q servers
 forwarding Tx hash Compare sets and suggest pairs (IP, T) IPx: {E1, E2, …, En} (Biryukov et al., 2014) Learn P2P Network Topology 13
  • 14. Bitcoin network E2 E1 C forward Tx Attacker Machines Listen for transaction hashes Log first q servers
 forwarding Tx hash Tx: {E1, E2, …, En} Compare sets and suggest pairs (IP, T) IPx: {E1, E2, …, En} (Biryukov et al., 2014) Learn P2P Network Topology 14
  • 15. Money Laundering Detection Strategies Scan block chain for known patterns 15
  • 16. Scan block chain for known patterns Placement Layering Integration Smurfing/
 Structuring Problem: Mixing services can anonymize relationship between sender and receiver 16
  • 17. Reverse Engineer Mixing Services (Möser et al., 2013)17 Problem: Mixers work very well -> finding relations is hard
  • 19. 19 Towards Risk Scoring of Bitcoin Transactions Malte M¨oser, Rainer B¨ohme, and Dominic Breuker Department of Information Systems, University of M¨unster, Germany Abstract. If Bitcoin becomes the prevalent payment system on the In- ternet, crime fighters will join forces with regulators and enforce black- listing of transaction prefixes at the parties who offer real products and services in exchange for bitcoin. Blacklisted bitcoins will be hard to spend and therefore less liquid and less valuable. This requires every recipient of Bitcoin payments not only to check all incoming transactions for possible blacklistings, but also to assess the risk of a transaction being blacklisted in the future. We elaborate this scenario, specify a risk model, devise a prediction approach using public knowledge, and present preliminary re- sults using data from selected known thefts. We discuss the implications on markets where bitcoins are traded and critically revisit Bitcoin’s abil- ity to serve as a unit of account. 1 Introduction Whenever a merchant receives a 100-dollar note, she is well advised to carefully
  • 20. References • HM Treasury (2015). Digital Currencies: response to the call for information. Available at: https://www.gov.uk/government/consultations/digital- currencies-call-for-information • Reid and Harrigan (2013). An Analysis of Anonymity in the Bitcoin System. Available at: http://arxiv.org/abs/1107.4524 • Fleder et al. (2015). Bitcoin Transaction Graph Analysis. Available at: http://arxiv.org/abs/1502.01657 • Biryukov et al. (2014). Deanonymization of clients in Bitcoin P2P network. Available at: http://arxiv.org/abs/1405.7418 • Möser et al. (2013). An Inquiry into Money Laundering Tools in the Bitcoin Ecosystem. Available at: https://maltemoeser.de/paper/money-laundering.pdf 20