Abstract
If Bitcoin becomes the prevalent payment system on the Internet, crime fighters will join forces with regulators and enforce blacklisting of transaction prefixes at the parties who offer real products and services in exchange for bitcoin. Blacklisted bitcoins will be hard to spend and therefore less liquid and less valuable. This requires every recipient of Bitcoin payments not only to check all incoming transactions for possible blacklistings, but also to assess the risk of a transaction being blacklisted in the future. We elaborate this scenario, specify a risk model, devise a prediction approach using public knowledge, and present preliminary results using data from selected known thefts. We discuss the implications on markets where bitcoins are traded and critically revisit Bitcoin’s ability to serve as a unit of account.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
Convention: We capitalize Bitcoin when referring to the name of the system and use lower case for the monetary unit (like dollar, euro). BTC is shorthand for the unit.
- 2.
Intentionally “colored” coins have been proposed to deal with virtual goods of different value using Bitcoin as an infrastructure [29].
References
BitPay. https://bitpay.com/
Android Security Vulnerability (2013). http://bitcoin.org/en/alert/2013-08-11-android
Becker, J., Breuker, D., Heide, T., Holler, J., Rauer, H.P., Böhme, R.: Can we afford integrity by Proof-of-Work? Scenarios inspired by the bitcoin currency. In: Böhme, R. (ed.) The Economics of Information Security and Privacy, pp. 135–156. Springer, Heidelberg (2013)
Bitcoin Forum. List of Major Bitcoin Heists, Thefts, Hacks, Scams, and Losses. https://bitcointalk.org/index.php?topic=83794
Bitcoin Forum. CoinJoin: Bitcoin privacy for the real world (2013). https://bitcointalk.org/index.php?topic=279249.0
Bitcoin Forum. Mike Hearn, Foundation’s Law & Policy Chair, is pushing blacklists right now (2013). https://bitcointalk.org/index.php?topic=333824.0
Bitcoin Forum. Namecoin was Stillborn, I Had to Switch Off Life-Support (2013). https://bitcointalk.org/index.php?topic=310954
Blockchain.info. Double Spends. https://blockchain.info/de/double-spends
Böhme, R.: Internet protocol adoption: learning from Bitcoin. In: IAB Workshop on Internet Technology Adoption and Transition (ITAT) (2013)
Buterin, V.: Mt.Gox: what the largest exchange is doing about the Linode theft and the implications (2012). http://bitcoinmagazine.com/mtgox-the-bitcoin-police-what-the-largest-exchange-is-doing-about-the-linode-theft-and-the-implications/
Chaum, D., Fiat, A., Naor, M.: Untraceable electronic cash. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol. 403, pp. 319–327. Springer, Heidelberg (1990)
Chaum, D.: Security without identification: transaction systems to make big brother obsolete. Commun. ACM 28(70), 1030–1044 (1985)
Christin, N.: Traveling the silk road: a measurement analysis of a large anonymous online marketplace. In: Proceedings of the 22nd International World Wide Web Conference, Rio de Janeiro, pp. 213–224 (2013)
Douceur, J.R.: The sybil attack. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 251–260. Springer, Heidelberg (2002)
Goodin, D.: You’re infected-if you want to see your data again, pay us USD 300 in Bitcoins (2013). http://arstechnica.com/security/2013/10/youre-infected-if-you-want-to-see-your-data-again-pay-us-300-in-bitcoins/
Hill, K.: Sanitizing Bitcoin: This Company Wants To Track ‘Clean’ Bitcoin Accounts (2013). http://www.forbes.com/sites/kashmirhill/2013/11/13/sanitizing-bitcoin-coin-validation/
Karame, G.O., Androulaki, E., Capkun, S.: Two bitcoins at the price of one? Double-spending attacks on fast payments in bitcoin. In: Proceedings of the ACM Conference on Computer and Communications Security (CCS) (2012)
Karpeles, M.: Clarification of Mt. Gox Compromised Accounts and Major Bitcoin Sell-Off (2011). https://www.mtgox.com/press_release_20110630.html
Levin, D., Schulman, A., LaCurts, K., Spring, N., Bhattacharjee, B.: Making currency inexpensive with iOwe. In: Proceedings of the Workshop on the Economics of Networks, Systems, and Computation (NetEcon), San Jose (2011)
McLeod, A.S.: Thailand Bans The Bitcoin! National Foreign Exchange Department Rules Bitcoin Illegal, Trading Suspended (2013). http://forexmagnates.com/bitcoin-binned-thailands-foreign-exchange-department-rules-bitcoin-illegal-trading-suspended/
McMillan, R.: USD 1.2M Hack Shows Why You Should Never Store Bitcoins on the Internet (2013). http://www.wired.com/wiredenterprise/2013/11/inputs/
Meiklejohn, S., Pomarole, M., Jordan, G., Levchenko, K., McCoy, D., Voelker, G.M., Savage, S.: A fistful of bitcoins: characterizing payments among men with no names. In: Proceedings of the ACM Internet Measurement Conference (IMC), pp. 127–140. ACM, New York (2013)
Miers, I., Garman, C., Green, M., Rubin, A.D.: Zerocoin: anonymous distributed e-cash from bitcoin. In: IEEE Symposium on Security and Privacy, San Francisco, pp. 397–411. IEEE (2013)
Moore, T., Christin, N.: Beware the middleman: empirical analysis of bitcoin-exchange risk. In: Sadeghi, A.-R. (ed.) FC 2013. LNCS, vol. 7859, pp. 25–33. Springer, Heidelberg (2013)
Möser, M., Böhme, R., Breuker, D.: An inquiry into money laundering tools in the bitcoin ecosystem. In: Proceedings of the APWG E-Crime Researchers Summit (2013)
Nakamoto, S.: Bitcoin: A Peer-to-Peer Electronic Cash System (2008)
Reid, F., Harrigan, M.: An analysis of anonymity in the bitcoin system. In: Altshuler, Y., Elovici, Y., Cremers, A.B., Aharony, N., Pentland, A. (eds.) Security and Privacy in Social Networks, pp. 197–223. Springer, New York (2013)
Ron, D., Shamir, A.: Quantitative analysis of the full bitcoin transaction graph. In: Sadeghi, A.-R. (ed.) FC 2013. LNCS, vol. 7859, pp. 6–24. Springer, Heidelberg (2013)
Meni Rosenfeld. Overview of colored coins, December 2012. http://bitcoil.co.il/BitcoinX.pdf
Wikipedia. Kimberley process certification scheme (2013). http://en.wikipedia.org/wiki/Kimberley_Process_Certification_Scheme
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 IFCA/Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Möser, M., Böhme, R., Breuker, D. (2014). Towards Risk Scoring of Bitcoin Transactions. In: Böhme, R., Brenner, M., Moore, T., Smith, M. (eds) Financial Cryptography and Data Security. FC 2014. Lecture Notes in Computer Science(), vol 8438. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-44774-1_2
Download citation
DOI: https://doi.org/10.1007/978-3-662-44774-1_2
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-662-44773-4
Online ISBN: 978-3-662-44774-1
eBook Packages: Computer ScienceComputer Science (R0)