Deanonymisation in Ethereum Using Existing Methods for Bitcoin
Robin Klusman Tim Dijkhuizen
RP1 #61 06-02-2018
Supervisor: Arno Bakker
Deanonymisation in Ethereum Using Existing Methods for Bitcoin - - PowerPoint PPT Presentation
Deanonymisation in Ethereum Using Existing Methods for Bitcoin Robin Klusman Tim Dijkhuizen Supervisor: Arno Bakker RP1 #61 06-02-2018 Introduction Blockchain Decentralised Peer-to-peer Miners Anonymous reputation
Robin Klusman Tim Dijkhuizen
RP1 #61 06-02-2018
Supervisor: Arno Bakker
Deanonymisation in Ethereum
2
○ Decentralised ○ Peer-to-peer ○ Miners ○ Anonymous reputation
○ Track malicious actors
Image source - thenounproject.com
Deanonymisation in Ethereum
3
Figure 1: Overview of how blocks in a blockchain are linked to each other
Deanonymisation in Ethereum
4
○ ‘Satoshi Nakamoto’
○ Vitalik Buterin
Image source - thenounproject.com
Deanonymisation in Ethereum
5 Image source - thenounproject.com
Deanonymisation in Ethereum
Essential background knowledge ○ Attacks on Bitcoin
■ BitIodine
Aimed at illegitimately obtaining funds ○ DAO attack
6
Image source - thenounproject.com 7
Deanonymisation in Ethereum
○ Queueing inv messages ○ 100ms
8 Image source - thenounproject.com
Deanonymisation in Ethereum
9 Image source - thenounproject.com
Deanonymisation in Ethereum
10 Image source - thenounproject.com
11 Image source - thenounproject.com
Deanonymisation in Ethereum
○ Turing complete ○ Solidity
12 Image source - thenounproject.com
Deanonymisation in Ethereum
○ nodeID from public key ○ Closeness ○ XOR of SHA-3 hash
13 Image source - thenounproject.com
Deanonymisation in Ethereum
14 Image source - thenounproject.com
15 Image source - thenounproject.com
Deanonymisation in Ethereum
○ Monitor ‘server’ nodes ○ Listen for addr messages
16
Figure 2: Entry-nodes in Bitcoin
Deanonymisation in Ethereum
17 Image source - thenounproject.com
Deanonymisation in Ethereum
18 Image source - thenounproject.com
Deanonymisation in Ethereum
19
Deanonymisation in Ethereum
○ Nodes not static
○ No multiple addresses
20
Deanonymisation in Ethereum
○ Shadow network ○ Government
○ Create nodes ○ Identify nodes
○ Less resource intensive
21
Deanonymisation in Ethereum
Ethereum Project Yellow Paper, 151, 1-32.
arXiv preprint arXiv:1706.00916.
contracts (SoK). In International Conference on Principles of Security and Trust (pp. 164-186). Springer, Berlin, Heidelberg.
clients in Bitcoin P2P network. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (pp. 15-29). ACM.
from the bitcoin network. In International Conference on Financial Cryptography and Data Security (pp. 457-468). Springer, Berlin, Heidelberg.
22
Deanonymisation in Ethereum
Image source - thenounproject.com