Chinese Journal of Network and Information Security ›› 2023, Vol. 9 ›› Issue (6): 140-153.doi: 10.11959/j.issn.2096-109x.2023089
• Papers • Previous Articles
Hu LI1,2,3, Yunfang CHEN1,2,3, Wei ZHANG1,2,3
Revised:
2023-03-09
Online:
2023-12-01
Published:
2023-12-01
Supported by:
CLC Number:
Hu LI, Yunfang CHEN, Wei ZHANG. Detection method of mixed coin transaction based on CoinJoin——take the Wasabi platform as an example[J]. Chinese Journal of Network and Information Security, 2023, 9(6): 140-153.
"
训练集组成部分 | 测试集组成部分 | 测试集交易个数 | 检测集交易个数 | 正确检测个数 | 漏检个数 | 误检个数 | 检测准确率 | 检测召回率 |
1、2、3、4、5、6、7 | 8、9、10 | 380 | 382 | 380 | 0 | 2 | 99.5% | 100% |
1、3、4、6、7、8、9 | 2、5、10 | 378 | 381 | 378 | 0 | 3 | 99.2% | 100% |
1、2、3、5、7、8、10 | 4、6、9 | 378 | 380 | 378 | 0 | 2 | 99.5% | 100% |
1、2、5、6、7、9、10 | 3、4、8 | 380 | 381 | 380 | 0 | 1 | 99.7% | 100% |
2、3、4、6、8、9、10 | 1、5、7 | 379 | 383 | 379 | 0 | 4 | 99.0% | 100% |
[1] | NAKAMOTO S . Bitcoin:a peer-to-peer electronic cash system[J]. Bitcoin, 2008,4(2): 15. |
[2] | BENJAMIN M B . Price dynamics and speculative trading in bitcoin[J]. Research in International Business andFinance, 2017,43: 15-21. |
[3] | REID F , HARRIGAN M . An analysis of anonymity in the bitcoin system[M]. New York: Springer New York, 2013. |
[4] | ANDROULAKI E , KARAME G O , ROESCHLIN M ,et al. Evaluating user privacy in bitcoin[C]// 17th International Conference on Financial Cryptography and Data Security. 2013: 34-51. |
[5] | MEIKLEJOHN S , POMAROLE M , JORDAN G ,et al. A fistful of bitcoins:characterizing payments among men with no names[C]// Proceedings of the 2013 Conference on Internet Measurement Conference. 2013: 127-140. |
[6] | NOETHER S . Ring signature confidential transactions for Monero[J]. Cryptology ePrint Archive, 2015/1098. |
[7] | SASSON E B , CHIESA A , GARMAN C ,et al. ZeroCash:Decentralized anonymous payments from bitcoin[C]// Proceedings of the 2014 IEEE Symposiumon Security and Privacy. 2014: 459-474. |
[8] | SABT M , ACHEMLAL M , BOUABDALLAH A . Trusted execution environment:What it is,and whatit is not[C]// Proceedings of 2015 IEEE Trustcom/BigDataSE/Ispa. 2015: 57-64. |
[9] | FAFT. The FATF Recommendations[EB]. |
[10] | SATER S . Do we need KYC/AML:The bank secrecy act and virtual currency exchanges[J]. Ark L Rev, 2020,73:397. |
[11] | TRAMER F , BONEH D , PATERSON K . Remote side-channel attacks on anonymous transactions[C]// Proceedings of the 29th USENIX Security Symposium. 2020: 2739-2756. |
[12] | MOSER M , SOSKA K , HEILMAN E ,et al. An empirical analysis of traceability in the monero blockchain[J]. Proceedings on Privacy Enhancing Technologies, 2018,2018(3): 143-163. |
[13] | 王晨旭, 程加成, 桑新欣 ,等. 区块链数据隐私保护:研究现状与展望[J]. 计算机研究与发展, 2021,58(10): 2099-2119. |
WANG C X , CHENG J C , SANG X X ,et al. Data privacy-preserving for blockchain:state of the art and trends[J]. Journal of Computer Research and Development, 2021,58(10): 2099-2119. | |
[14] | 孙小文 . 面向交易维度的比特币地址关系分析算法的研究与实现[D]. 北京:北京邮电大学, 2021. |
SUN X W . Research and implementation of bitcoin address relationship analysis algorithm oriented to transaction dimension[D]. Beijing:Beijing University of Posts and Telecommunications, 2021. | |
[15] | GENKIN D , PAPADOPOULOS D , PAPAMANTHOU C . Privacy in decentralized cryptocurrencies[J]. Communications of the ACM, 2018,61(6): 78-88. |
[16] | MAXWELL G . CoinJoin:bitcoin privacy for the real world[C]// Post on Bitcoin forum. 2013:110. |
[17] | TIRONSAKKUL T , MAAREK M , EROSS A ,et al. The unique dressing of transactions:Wasabi coinjoin transaction detection[C]// Proceedings of the 2022 European Interdisciplinary Cybersecurity Conference. 2022: 21-28. |
[18] | STUTZ R , STOCKINGER J , MORENO-SANCHEZ P , et al . Adoption and actual privacy of decentralized CoinJoin implementations in bitcoin[C]// Proceedings of the 4th ACM Conference on Advances in Financial Technologies. 2022: 254-267. |
[19] | MOSER M , BOHME R . The price of anonymity:empirical evidence from a market for Bitcoin anonymization[J]. Journal of Cybersecurity, 2017,3(2): 127-135. |
[20] | NADLER M , SCHAR F . Tornado cash and blockchain privacy:A primer for economists and policymakers[J]. Available at SSRN 4352337, 2023. |
[21] | GHESMATI S , FDHILA W , WEIPPL E R . Usability of cryptocurrency wallets providing coinJoin transactions[J]. IACR Cryptol ePrint Arch. 2022:285. |
[22] | STOCKINGER J , HASLHOFER B , MORENO_SANCHEZ P , ,et al. Pinpointing and measuring Wasabi and Samourai coinjoins in the bitcoin ecosystem[J]. arXiv preprint arXiv:2109.10229, 2021. |
[23] | WU L , HU Y F , ZHOU Y J ,et al. Towards understanding and demystifying Bitcoin mixing services[C]// Proceedings of the Web Conference 2021. 2021: 33-44. |
[24] | MAKSUTOV A A , ALEXEEV M S , FEDOROVA N O ,et al. Detection of blockchain transactions used in blockchain mixer of coin join type[C]// Proceedings of 2019 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus). 2019: 274-277. |
[25] | MEIKLEJOHN S , ORLANDI C . Privacy-enhancing overlays in bitcoin[C]// Proceedings of International Conference on Financial Cryptography and Data Security. 2015: 127-141. |
[26] | FICSOR A . ZeroLink:The bitcoin fungibility framework[EB]. |
[27] | ATLAS K . Weak privacy guarantees for sharedcoin mixing service[J]. CoinJoin Sudoku, 2014. |
[28] | BLOCKCHAIN. Blockchain Charts[EB]. |
[29] | CHAINALYSIS. The Chainalysis 2022 Crypto Crime Report[EB]. |
[1] | Dong LI, Junqing YU, Yongpu GU, Pengcheng ZHAO. Efficient and safe software defined network topology discovery protocol [J]. Chinese Journal of Network and Information Security, 2023, 9(6): 20-33. |
[2] | Jinwei WANG, Zhengjia CHEN, Xue XIE, Xiangyang LUO, Bin MA. Review of malware detection and classification visualization techniques [J]. Chinese Journal of Network and Information Security, 2023, 9(5): 1-20. |
[3] | Honggang LIN, Junjing ZHU, Lin CHEN. Metric-based learning approach to botnet detection with small samples [J]. Chinese Journal of Network and Information Security, 2023, 9(5): 33-47. |
[4] | Zhihua FENG, Yuxuan ZHANG, Chong LUO, Jianing WANG. High-performance reconfigurable encryption scheme for distributed storage [J]. Chinese Journal of Network and Information Security, 2023, 9(5): 59-70. |
[5] | Zhiwang HE, Huaqun WANG. Anonymous group key distribution scheme for the internet of vehicles [J]. Chinese Journal of Network and Information Security, 2023, 9(5): 127-137. |
[6] | Yifan HE, Jie ZHANG, Weiming ZHANG, Nenghai YU. Privacy leakage risk assessment for reversible neural network [J]. Chinese Journal of Network and Information Security, 2023, 9(4): 29-39. |
[7] | Hongying ZHU, Xinyou ZHANG, Huanlai XING, Li FENG. Lightweight terminal cross-domain authentication protocol in edge computing environment [J]. Chinese Journal of Network and Information Security, 2023, 9(4): 74-89. |
[8] | Degang WANG, Yi SUN, Chuanxin ZHOU, Qi GAO, Fan YANG. Malicious code within model detection method based on model similarity [J]. Chinese Journal of Network and Information Security, 2023, 9(4): 90-103. |
[9] | Yilong WANG, Zhenyu LI, Daofu GONG, Fenlin LIU. Image double fragile watermarking algorithm based on block neighborhood [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 38-48. |
[10] | Renfeng CHEN, Hongbin ZHU. Research on credit card transaction security supervision based on PU learning [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 73-78. |
[11] | Guanyun FENG, Cai FU, Jianqiang LYU, Lansheng HAN. Insider threat detection based on operational attention and data augmentation [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 102-112. |
[12] | Genlin XIE, Guozhen CHENG, Yawen WANG, Qingfeng WANG. Software diversity evaluating method based on gadget feature analysis [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 161-173. |
[13] | Peng HOU, Zhixin LI, Fei ZHANG, Xu SUN, Dan CHEN, Yihao CUI, Hanbing ZHANG, Yinan JIN, Hongfeng CHAI. Technology and practice of intelligent governance for financial data security [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 174-187. |
[14] | Min XIAO, Faying MAO, Yonghong HUANG, Yunfei CAO. Anonymous trust management scheme of VANET based on attribute signature [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 33-45. |
[15] | Jianlong XU, Jian LIN, Yusen LI, Zhi XIONG. Distributed user privacy preserving adjustable personalized QoS prediction model for cloud services [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 70-80. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|