6 CONCLUSIONS AND FUTURE
WORK
We have analyzed a large portion of bitcoin addresses
placed on web pages randomly. In our analysis, we
have demonstrated that this creates significant secu-
rity challenges. Particularly, we showed that MitM
attacks may tamper with a victim’s address posted on
web site that are not well secured. Alternative dig-
ital currencies following Bitcoin may also face the
same security challenges. In summary, this form of
attack can happen not only with bitcoin addresses but
with any unauthenticated information. Our counter
measures will provide sufficient guidelines to users
who posted their bitcoin addresses on web pages ran-
domly. Future research should consider the potential
effects of MitM and bitcoin and alternate cryptocur-
rencies transactions on HTTP/HTTPS.
REFERENCES
Andresen, G. (2013). Payment protocol.
Armknecht, F., Karame, G. O., Mandal, A., Youssef, F.,
and Zenner, E. (2015). Ripple: Overview and Out-
look, pages 163–180. Springer International Publish-
ing, Cham.
Ateniese, G., Faonio, A., Magri, B., and De Medeiros, B.
(2014). Certified bitcoins. In International Confer-
ence on Applied Cryptography and Network Security,
pages 80–96. Springer.
Aviram, N., Schinzel, S., Somorovsky, J., Heninger, N.,
Dankel, M., Steube, J., Valenta, L., Adrian, D., Hal-
derman, J. A., Dukhovni, V., et al. (2016). Drown:
Breaking tls using sslv2. In USENIX Security Sympo-
sium, pages 689–706.
Bartoletti, M. and Pompianu, L. (2014). An anal-
ysis of bitcoin op return metadata. https://
arxiv.org/pdf/1702.01024.pdf.
Biryukov, A. and Pustogarov, I. (2015). Bitcoin over tor
isn’t a good idea. In Security and Privacy (SP), 2015
IEEE Symposium on, pages 122–134. IEEE.
Callegati, F., Cerroni, W., and Ramilli, M. (2009). Man-in-
the-middle attack to the https protocol. IEEE Security
& Privacy, 7(1):78–81.
Cheng, K., Gao, M., and Guo, R. (2010). Analysis and
research on https hijacking attacks. In Networks Secu-
rity Wireless Communications and Trusted Comput-
ing (NSWCTC), 2010 Second International Confer-
ence on, volume 2, pages 223–226. IEEE.
Cocciolo, A. (2015). The rise and fall of text on the
web: a quantitative study of web archives. Informa-
tion Research: An International Electronic Journal,
20(3):n3.
Conti, M., Dragoni, N., and Lesyk, V. (2016). A survey
of man in the middle attacks. IEEE Communications
Surveys & Tutorials, 18(3):2027–2051.
Fleder, M., Kester, M. S., and Pillai, S. (2015). Bit-
coin transaction graph analysis. arXiv preprint
arXiv:1502.01657.
Koshy, P., Koshy, D., and McDaniel, P. (2014). An analysis
of anonymity in bitcoin using p2p network traffic. In
International Conference on Financial Cryptography
and Data Security, pages 469–485. Springer.
Kumar, A., Fischer, C., Tople, S., and Saxena, P. (2017). A
traceability analysis of moneros blockchain. In Euro-
pean Symposium on Research in Computer Security,
pages 153–173. Springer.
Lischke, M. and Fabian, B. (2016). Analyzing the bitcoin
network: The first four years. Future Internet, 8(1):7.
Maesa, D. D. F., Marino, A., and Ricci, L. (2017). Data-
driven analysis of bitcoin properties: exploiting the
users graph. International Journal of Data Science
and Analytics, pages 1–18.
Miller, A., M
¨
oser, M., Lee, K., and Narayanan, A. (2017).
An empirical analysis of linkability in the monero
blockchain. arXiv preprint arXiv:1704.04299.
Moore, T. and Christin, N. (2013). Beware the middleman:
Empirical analysis of bitcoin-exchange risk. In Inter-
national Conference on Financial Cryptography and
Data Security, pages 25–33. Springer.
Nakamoto, S. (2008). Bitcoin: A peer-to-peer electronic
cash system.
Pedro Moreno-Sanchez*, M. B. Z. and Kate*, A. (2017).
Listening to whispers of ripple: Linking wallets and
deanonymizing transactions in the ripple network.
Proceedings on Privacy Enhancing Technologies ;
2016 (4):436453.
Ron, D. and Shamir, A. (2013). Quantitative analysis of the
full bitcoin transaction graph. In International Confer-
ence on Financial Cryptography and Data Security,
pages 6–24. Springer.
Sasson, E. B., Chiesa, A., Garman, C., Green, M., Miers,
I., Tromer, E., and Virza, M. (2014). Zerocash: De-
centralized anonymous payments from bitcoin. In Se-
curity and Privacy (SP), 2014 IEEE Symposium on,
pages 459–474. IEEE.
Soska, K. and Christin, N. (2015). Measuring the longitu-
dinal evolution of the online anonymous marketplace
ecosystem. In USENIX Security Symposium, pages
33–48.
Stricot-Tarboton, S., Chaisiri, S., and Ko, R. K. (2016).
Taxonomy of man-in-the-middle attacks on https. In
Trustcom/BigDataSE/I? SPA, 2016 IEEE, pages 527–
534. IEEE.
Analysis of Man-In-The-Middle of Attack on Bitcoin Address
395