Authors:
Abba Garba
1
;
Zhi Guan
2
;
Anran Li
1
and
Zhong Chen
1
Affiliations:
1
Institute of Software, EECS, Peking University, China, MoE Key Lab of High Confidence Software Technologies, Peking University, Beijing and China
;
2
National Engineering Research Center for Software Engineering, Peking University, Beijing, China, MoE Key Lab of High Confidence Software Technologies, Peking University, Beijing and China
Keyword(s):
Bitcoin, MITM Attack, Blockchain.
Related
Ontology
Subjects/Areas/Topics:
Data and Application Security and Privacy
;
Data Engineering
;
Data Integrity
;
Data Protection
;
Database Security and Privacy
;
Databases and Data Security
;
Information and Systems Security
;
Network Security
;
Peer-To-Peer Security
;
Security in Information Systems
;
Wireless Network Security
Abstract:
In cryptocurrency systems such as Bitcoin, user use string-hashes from public keys, that look like random strings, to receive payments. Unfortunately, there is no authority to verify user identity. Normally a user cannot prove the address binds with her real identity. Technically, a victim could get a tampered address and pay coins to this tampered address. In this paper, we report on the large-scale of Bitcoin addresses, including secured and unsecured merchants websites, exchange platforms, online chat forums, social channels and blogs. We illustrate our data through a range of graphs based on transaction distribution. Our analysis consists of crawling many web pages related to cryptocurrency transactions. We scrap the web pages by persing 10,0045 bitcoin addresses related to merchants or individuals that receive bitcoin in their websites directly. We determine how many addresses are subject to Man-in-the-middle of attack in our analysis. We review some countermeasures from best pr
actices of Bitcoin transactions.
(More)