Using ethereum transactions to deanonymize senders
Murali, Siddharth
Loading…
Permalink
https://hdl.handle.net/2142/101616
Description
Title
Using ethereum transactions to deanonymize senders
Author(s)
Murali, Siddharth
Issue Date
2018-07-19
Director of Research (if dissertation) or Advisor (if thesis)
Bailey, Michael D
Department of Study
Electrical & Computer Eng
Discipline
Electrical & Computer Engr
Degree Granting Institution
University of Illinois at Urbana-Champaign
Degree Name
M.S.
Degree Level
Thesis
Keyword(s)
Ethereum
Cryptocurrency
Security
Deanonymization
Abstract
The historic rise of blockchain-based cryptocurrencies to over $327 billion in market capitalization has sparked significant research efforts studying their reliability, performance, and security. Bitcoin, the highest valued cryptocurrency, has received the most thorough scrutiny, with many studies analyzing its peer properties and network health. In contrast, the network layer for Ethereum, the second-largest cryptocurrency, has gone mostly ignored, even though it employs different algorithms for transaction propagation.
In this thesis, we perform timing analysis on transactions propagated through Ethereum networks to identify the origin nodes. We build a tool called TxSniper to verify our approach on Ethereum's main network. We find that we can identify the origin with a 70% probability; this method is not always effective due to presence of nodes running clients that use different implementations of transaction propagation.
Use this login method if you
don't
have an
@illinois.edu
email address.
(Oops, I do have one)
IDEALS migrated to a new platform on June 23, 2022. If you created
your account prior to this date, you will have to reset your password
using the forgot-password link below.