Blockchains became popular in 2009, after the inception of Bitcoin. One important characteristic is their pseudoanonymity: users feel safe when they exchange cryptocurrency because their identity is protected by an address. However, a smart analysis of a blockchain allows to reveal a lot of details that were supposed to be secret. In this work, we focus on the attacks which have been deployed in the recent years that are based on Machine Learning algorithms. We describe how these attacks can de-anonymize the main blockchains, like Bitcoin, Ethereum or Monero. We discuss how these attacks can be improved and how blockchains are reacting to overcome to the privacy issue.
An overview of blockchains’ de-anonymization attacks / Gangemi, Andrea. - (In corso di stampa), pp. 11-16.
Titolo: | An overview of blockchains’ de-anonymization attacks | |
Autori: | ||
Data di pubblicazione: | Being printed | |
Titolo del libro: | Collectio ciphrarum | |
Serie: | ||
Abstract: | Blockchains became popular in 2009, after the inception of Bitcoin. One important characteristic ...is their pseudoanonymity: users feel safe when they exchange cryptocurrency because their identity is protected by an address. However, a smart analysis of a blockchain allows to reveal a lot of details that were supposed to be secret. In this work, we focus on the attacks which have been deployed in the recent years that are based on Machine Learning algorithms. We describe how these attacks can de-anonymize the main blockchains, like Bitcoin, Ethereum or Monero. We discuss how these attacks can be improved and how blockchains are reacting to overcome to the privacy issue. | |
Appare nelle tipologie: | 2.1 Contributo in volume (Capitolo o Saggio) |
File in questo prodotto:
File | Descrizione | Tipologia | Licenza | |
---|---|---|---|---|
MLattacks.pdf | 1. Preprint / submitted version [pre- review] | Non Pubblico - Accesso privato/ristretto | Administrator Richiedi una copia |