Skip to main content

Showing 1–5 of 5 results for author: Romiti, M

.
  1. arXiv:2102.13613  [pdf, other

    cs.CR cs.CY cs.SI

    GraphSense: A General-Purpose Cryptoasset Analytics Platform

    Authors: Bernhard Haslhofer, Rainer Stütz, Matteo Romiti, Ross King

    Abstract: There is currently an increasing demand for cryptoasset analysis tools among cryptoasset service providers, the financial industry in general, as well as across academic fields. At the moment, one can choose between commercial services or low-level open-source tools providing programmatic access. In this paper, we present the design and implementation of another option: the GraphSense Cryptoasset… ▽ More

    Submitted 26 February, 2021; originally announced February 2021.

  2. arXiv:2007.00764  [pdf, other

    cs.CR

    Cross-Layer Deanonymization Methods in the Lightning Protocol

    Authors: Matteo Romiti, Friedhelm Victor, Pedro Moreno-Sanchez, Peter Sebastian Nordholt, Bernhard Haslhofer, Matteo Maffei

    Abstract: Bitcoin (BTC) pseudonyms (layer 1) can effectively be deanonymized using heuristic clustering techniques. However, while performing transactions off-chain (layer 2) in the Lightning Network (LN) seems to enhance privacy, a systematic analysis of the anonymity and privacy leakages due to the interaction between the two layers is missing. We present clustering heuristics that group BTC addresses, ba… ▽ More

    Submitted 10 February, 2021; v1 submitted 1 July, 2020; originally announced July 2020.

    Comments: 30 pages, 9 figures, Financial Cryptography and Data Security 2021 https://fc21.ifca.ai/

  3. All that Glitters is not Bitcoin -- Unveiling the Centralized Nature of the BTC (IP) Network

    Authors: Sami Ben Mariem, Pedro Casas, Matteo Romiti, Benoit Donnet, Rainer Stütz, Bernhard Haslhofer

    Abstract: Blockchains are typically managed by peer-to-peer (P2P) networks providing the support and substrate to the so-called distributed ledger (DLT), a replicated, shared, and synchronized data structure, geographically spread across multiple nodes. The Bitcoin (BTC) blockchain is by far the most well known DLT, used to record transactions among peers, based on the BTC digital currency. In this paper, w… ▽ More

    Submitted 19 February, 2020; v1 submitted 24 January, 2020; originally announced January 2020.

    Comments: IEEE/IFIP Network Operations and Management Symposium 2020

    Journal ref: NOMS 2020 - 2020 IEEE/IFIP Network Operations and Management Symposium

  4. arXiv:1908.01051  [pdf, other

    cs.CR

    Spams meet Cryptocurrencies: Sextortion in the Bitcoin Ecosystem

    Authors: Masarah Paquet-Clouston, Matteo Romiti, Bernhard Haslhofer, Thomas Charvat

    Abstract: In the past year, a new spamming scheme has emerged: sexual extortion messages requiring payments in the cryptocurrency Bitcoin, also known as sextortion. This scheme represents a first integration of the use of cryptocurrencies by members of the spamming industry. Using a dataset of 4,340,736 sextortion spams, this research aims at understanding such new amalgamation by uncovering spammers' opera… ▽ More

    Submitted 2 August, 2019; originally announced August 2019.

    Comments: 12 pages, 5 figures, Advances in Financial Technologies (AFT 2019)

  5. arXiv:1905.05999  [pdf, other

    cs.CR

    A Deep Dive into Bitcoin Mining Pools: An Empirical Analysis of Mining Shares

    Authors: Matteo Romiti, Aljosha Judmayer, Alexei Zamyatin, Bernhard Haslhofer

    Abstract: Miners play a key role in cryptocurrencies such as Bitcoin: they invest substantial computational resources in processing transactions and minting new currency units. It is well known that an attacker controlling more than half of the network's mining power could manipulate the state of the system at will. While the influence of large mining pools appears evenly split, the actual distribution of m… ▽ More

    Submitted 15 May, 2019; originally announced May 2019.

    Comments: Conference paper https://weis2019.econinfosec.org