Perimeter: A network-layer attack on the anonymity of cryptocurrencies
Abstract
Cryptocurrencies are widely used today for anonymous transactions. Such currencies rely on a peer-to-peer network where users can broadcast transactions containing their pseudonyms and ask for approval. Previous research has shown that application-level eavesdroppers, meaning nodes connected to a large portion of the Bitcoin peer-to-peer network, are able to deanonymize multiple users by tracing back the source of transactions. Yet, such attacks are highly visible as the attacker needs to maintain thousands of outbound connections. Moreover, they can be mitigated by purely application-layer countermeasures. This paper presents a stealthier and harder-to-mitigate attack exploiting the interactions between the networking and application layers. Particularly, the adversary combines her access over Internet infrastructure with application-layer information to deanonymize transactions. We show that this attack, namely PERIMETER, is practical in today’s Internet, achieves high accuracy in Bitcoin, and generalizes to encrypted cryptocurrencies e.g., Ethereum.
People
BibTex
@inproceedings{apostolaki2021perimeter,
author = {Apostolaki, Maria and Maire, Cedric and Vanbever, Laurent},
title = {{Perimeter: A network-layer attack on the anonymity of cryptocurrencies}},
booktitle = {Lecture Notes in Computer Science},
volume = 12674,
address = {Online},
year = 2021,
month = mar,
publisher = {Springer},
doi = {10.1007/978-3-662-64322-8_7},
url = {https://doi.org/10.1007/978-3-662-64322-8_7}
}Research Collection: 20.500.11850/498192

