2020
DOI: 10.1002/nem.2130
|View full text |Cite
|
Sign up to set email alerts
|

De‐anonymizing Ethereum blockchain smart contracts through code attribution

Abstract: SummaryBlockchain users are identified by addresses (public keys), which cannot be easily linked back to them without out‐of‐network information. This provides pseudo‐anonymity, which is amplified when the user generates a new address for each transaction. Since all transaction history is visible to all users in public blockchains, finding affiliation between related addresses undermines pseudo‐anonymity. Such affiliation information can be used to discriminate against addresses linked with undesired activitie… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
7
0

Year Published

2020
2020
2025
2025

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 19 publications
(7 citation statements)
references
References 31 publications
0
7
0
Order By: Relevance
“…Source code and compiled code features are commonly used for the analysis of smart contracts. Code stylometry refers to the quantification and measurement of unique styles, e.g., wording frequency and the use of specific variable and function names [121], [122]. Furthermore, the symbolic analysis of programs' control flow can also yield multiple useful information for identifying bugs or malicious contracts [123].…”
Section: B Transaction Featuresmentioning
confidence: 99%
“…Source code and compiled code features are commonly used for the analysis of smart contracts. Code stylometry refers to the quantification and measurement of unique styles, e.g., wording frequency and the use of specific variable and function names [121], [122]. Furthermore, the symbolic analysis of programs' control flow can also yield multiple useful information for identifying bugs or malicious contracts [123].…”
Section: B Transaction Featuresmentioning
confidence: 99%
“…These approaches intrinsically cannot work for early detection of Ponzi schemes before any transactions of a Ponzi scheme are invoked. For smart contract-based approaches, they mainly attempt to extract distinctive features of Ponzi schemes from smart contracts via different ways such as symbolic execution of opcode [7] and code attribution for de-anonymizing smart contracts [18]. Also, some recent works have combined transaction data with the source code of smart contract together for automated detection of Ponzi schemes [8,13,15,31].…”
Section: Related Workmentioning
confidence: 99%
“…This is needed to form a list of eligible voters properly so that Eligibility can be reassured. Most blockchain addresses are pseudo-anonym by design [23]. As a result, blockchain addresses can be traced to link the user with their chain activities.…”
Section: Related Workmentioning
confidence: 99%