Towards Risk Scoring of Bitcoin Transactions

Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 8438)

Abstract

If Bitcoin becomes the prevalent payment system on the Internet, crime fighters will join forces with regulators and enforce blacklisting of transaction prefixes at the parties who offer real products and services in exchange for bitcoin. Blacklisted bitcoins will be hard to spend and therefore less liquid and less valuable. This requires every recipient of Bitcoin payments not only to check all incoming transactions for possible blacklistings, but also to assess the risk of a transaction being blacklisted in the future. We elaborate this scenario, specify a risk model, devise a prediction approach using public knowledge, and present preliminary results using data from selected known thefts. We discuss the implications on markets where bitcoins are traded and critically revisit Bitcoin’s ability to serve as a unit of account.

References

  1. 1.
  2. 2.
    Android Security Vulnerability (2013). http://bitcoin.org/en/alert/2013-08-11-android
  3. 3.
    Becker, J., Breuker, D., Heide, T., Holler, J., Rauer, H.P., Böhme, R.: Can we afford integrity by Proof-of-Work? Scenarios inspired by the bitcoin currency. In: Böhme, R. (ed.) The Economics of Information Security and Privacy, pp. 135–156. Springer, Heidelberg (2013)Google Scholar
  4. 4.
    Bitcoin Forum. List of Major Bitcoin Heists, Thefts, Hacks, Scams, and Losses. https://bitcointalk.org/index.php?topic=83794
  5. 5.
    Bitcoin Forum. CoinJoin: Bitcoin privacy for the real world (2013). https://bitcointalk.org/index.php?topic=279249.0
  6. 6.
    Bitcoin Forum. Mike Hearn, Foundation’s Law & Policy Chair, is pushing blacklists right now (2013). https://bitcointalk.org/index.php?topic=333824.0
  7. 7.
    Bitcoin Forum. Namecoin was Stillborn, I Had to Switch Off Life-Support (2013). https://bitcointalk.org/index.php?topic=310954
  8. 8.
    Blockchain.info. Double Spends. https://blockchain.info/de/double-spends
  9. 9.
    Böhme, R.: Internet protocol adoption: learning from Bitcoin. In: IAB Workshop on Internet Technology Adoption and Transition (ITAT) (2013)Google Scholar
  10. 10.
    Buterin, V.: Mt.Gox: what the largest exchange is doing about the Linode theft and the implications (2012). http://bitcoinmagazine.com/mtgox-the-bitcoin-police-what-the-largest-exchange-is-doing-about-the-linode-theft-and-the-implications/
  11. 11.
    Chaum, D., Fiat, A., Naor, M.: Untraceable electronic cash. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol. 403, pp. 319–327. Springer, Heidelberg (1990)CrossRefGoogle Scholar
  12. 12.
    Chaum, D.: Security without identification: transaction systems to make big brother obsolete. Commun. ACM 28(70), 1030–1044 (1985)CrossRefGoogle Scholar
  13. 13.
    Christin, N.: Traveling the silk road: a measurement analysis of a large anonymous online marketplace. In: Proceedings of the 22nd International World Wide Web Conference, Rio de Janeiro, pp. 213–224 (2013)Google Scholar
  14. 14.
    Douceur, J.R.: The sybil attack. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 251–260. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  15. 15.
    Goodin, D.: You’re infected-if you want to see your data again, pay us USD 300 in Bitcoins (2013). http://arstechnica.com/security/2013/10/youre-infected-if-you-want-to-see-your-data-again-pay-us-300-in-bitcoins/
  16. 16.
    Hill, K.: Sanitizing Bitcoin: This Company Wants To Track ‘Clean’ Bitcoin Accounts (2013). http://www.forbes.com/sites/kashmirhill/2013/11/13/sanitizing-bitcoin-coin-validation/
  17. 17.
    Karame, G.O., Androulaki, E., Capkun, S.: Two bitcoins at the price of one? Double-spending attacks on fast payments in bitcoin. In: Proceedings of the ACM Conference on Computer and Communications Security (CCS) (2012)Google Scholar
  18. 18.
    Karpeles, M.: Clarification of Mt. Gox Compromised Accounts and Major Bitcoin Sell-Off (2011). https://www.mtgox.com/press_release_20110630.html
  19. 19.
    Levin, D., Schulman, A., LaCurts, K., Spring, N., Bhattacharjee, B.: Making currency inexpensive with iOwe. In: Proceedings of the Workshop on the Economics of Networks, Systems, and Computation (NetEcon), San Jose (2011)Google Scholar
  20. 20.
    McLeod, A.S.: Thailand Bans The Bitcoin! National Foreign Exchange Department Rules Bitcoin Illegal, Trading Suspended (2013). http://forexmagnates.com/bitcoin-binned-thailands-foreign-exchange-department-rules-bitcoin-illegal-trading-suspended/
  21. 21.
    McMillan, R.: USD 1.2M Hack Shows Why You Should Never Store Bitcoins on the Internet (2013). http://www.wired.com/wiredenterprise/2013/11/inputs/
  22. 22.
    Meiklejohn, S., Pomarole, M., Jordan, G., Levchenko, K., McCoy, D., Voelker, G.M., Savage, S.: A fistful of bitcoins: characterizing payments among men with no names. In: Proceedings of the ACM Internet Measurement Conference (IMC), pp. 127–140. ACM, New York (2013)Google Scholar
  23. 23.
    Miers, I., Garman, C., Green, M., Rubin, A.D.: Zerocoin: anonymous distributed e-cash from bitcoin. In: IEEE Symposium on Security and Privacy, San Francisco, pp. 397–411. IEEE (2013)Google Scholar
  24. 24.
    Moore, T., Christin, N.: Beware the middleman: empirical analysis of bitcoin-exchange risk. In: Sadeghi, A.-R. (ed.) FC 2013. LNCS, vol. 7859, pp. 25–33. Springer, Heidelberg (2013)CrossRefGoogle Scholar
  25. 25.
    Möser, M., Böhme, R., Breuker, D.: An inquiry into money laundering tools in the bitcoin ecosystem. In: Proceedings of the APWG E-Crime Researchers Summit (2013)Google Scholar
  26. 26.
    Nakamoto, S.: Bitcoin: A Peer-to-Peer Electronic Cash System (2008)Google Scholar
  27. 27.
    Reid, F., Harrigan, M.: An analysis of anonymity in the bitcoin system. In: Altshuler, Y., Elovici, Y., Cremers, A.B., Aharony, N., Pentland, A. (eds.) Security and Privacy in Social Networks, pp. 197–223. Springer, New York (2013)CrossRefGoogle Scholar
  28. 28.
    Ron, D., Shamir, A.: Quantitative analysis of the full bitcoin transaction graph. In: Sadeghi, A.-R. (ed.) FC 2013. LNCS, vol. 7859, pp. 6–24. Springer, Heidelberg (2013)CrossRefGoogle Scholar
  29. 29.
    Meni Rosenfeld. Overview of colored coins, December 2012. http://bitcoil.co.il/BitcoinX.pdf
  30. 30.
    Wikipedia. Kimberley process certification scheme (2013). http://en.wikipedia.org/wiki/Kimberley_Process_Certification_Scheme

Copyright information

© IFCA/Springer-Verlag Berlin Heidelberg 2014

Authors and Affiliations

  1. 1.Department of Information SystemsUniversity of MünsterMünsterGermany

Personalised recommendations