Skip to main content

Showing 1–33 of 33 results for author: Haslhofer, B

Searching in archive cs. Search in all archives.
.
  1. Detecting Financial Bots on the Ethereum Blockchain

    Authors: Thomas Niedermayer, Pietro Saggese, Bernhard Haslhofer

    Abstract: The integration of bots in Distributed Ledger Technologies (DLTs) fosters efficiency and automation. However, their use is also associated with predatory trading and market manipulation, and can pose threats to system integrity. It is therefore essential to understand the extent of bot deployment in DLTs; despite this, current detection systems are predominantly rule-based and lack flexibility. In… ▽ More

    Submitted 28 March, 2024; originally announced March 2024.

  2. arXiv:2311.08205  [pdf, other

    cs.CR cs.CY

    Increasing the Efficiency of Cryptoasset Investigations by Connecting the Cases

    Authors: Bernhard Haslhofer, Christiane Hanslbauer, Michael Fröwis, Thomas Goger

    Abstract: Law enforcement agencies are confronted with a rapidly growing number of cryptoasset-related cases, often redundantly investigating the same cases without mutual knowledge or shared insights. In this paper, we explore the hypothesis that recognizing and acting upon connections between these cases can significantly streamline investigative processes. Through an analysis of a dataset comprising 34 c… ▽ More

    Submitted 14 November, 2023; originally announced November 2023.

  3. arXiv:2310.04356  [pdf, other

    cs.CR cs.CY

    Map** the DeFi Crime Landscape: An Evidence-based Picture

    Authors: Catherine Carpentier-Desjardins, Masarah Paquet-Clouston, Stefan Kitzler, Bernhard Haslhofer

    Abstract: Over the past years, decentralized finance (DeFi) has been the target of numerous profit-driven crimes. However, until now, the full prevalence and cumulative impact of these crimes have not been assessed. This study provides a first comprehensive assessment of profit-driven crimes targeting the DeFi sector. To achieve this, we collected data on 1155 crime events from 2017 to 2022. Of these, 1050… ▽ More

    Submitted 6 October, 2023; originally announced October 2023.

  4. arXiv:2309.16408  [pdf, other

    q-fin.GN cs.CR

    Assessing the Solvency of Virtual Asset Service Providers: Are Current Standards Sufficient?

    Authors: Pietro Saggese, Esther Segalla, Michael Sigmund, Burkhard Raunig, Felix Zangerl, Bernhard Haslhofer

    Abstract: Entities like centralized cryptocurrency exchanges fall under the business category of virtual asset service providers (VASPs). As any other enterprise, they can become insolvent. VASPs enable the exchange, custody, and transfer of cryptoassets organized in wallets across distributed ledger technologies (DLTs). Despite the public availability of DLT transactions, the cryptoasset holdings of VASPs… ▽ More

    Submitted 18 April, 2024; v1 submitted 28 September, 2023; originally announced September 2023.

  5. arXiv:2309.14232  [pdf, other

    cs.SI cs.CR

    The Governance of Decentralized Autonomous Organizations: A Study of Contributors' Influence, Networks, and Shifts in Voting Power

    Authors: Stefan Kitzler, Stefano Balietti, Pietro Saggese, Bernhard Haslhofer, Markus Strohmaier

    Abstract: We present a study analyzing the voting behavior of contributors, or vested users, in Decentralized Autonomous Organizations (DAOs). We evaluate their involvement in decision-making processes, discovering that in at least 7.54% of all DAOs, contributors, on average, held the necessary majority to control governance decisions. Furthermore, contributors have singularly decided at least one proposal… ▽ More

    Submitted 28 September, 2023; v1 submitted 25 September, 2023; originally announced September 2023.

  6. arXiv:2309.11987  [pdf, other

    cs.LG cs.AI cs.HC

    Predictability and Comprehensibility in Post-Hoc XAI Methods: A User-Centered Analysis

    Authors: Anahid Jalali, Bernhard Haslhofer, Simone Kriglstein, Andreas Rauber

    Abstract: Post-hoc explainability methods aim to clarify predictions of black-box machine learning models. However, it is still largely unclear how well users comprehend the provided explanations and whether these increase the users ability to predict the model behavior. We approach this question by conducting a user study to evaluate comprehensibility and predictability in two widely used tools: LIME and S… ▽ More

    Submitted 21 September, 2023; originally announced September 2023.

    Comments: 17

  7. arXiv:2210.08011  [pdf, ps, other

    cs.LG cs.AI

    Autoencoder based Anomaly Detection and Explained Fault Localization in Industrial Cooling Systems

    Authors: Stephanie Holly, Robin Heel, Denis Katic, Leopold Schoeffl, Andreas Stiftinger, Peter Holzner, Thomas Kaufmann, Bernhard Haslhofer, Daniel Schall, Clemens Heitzinger, Jana Kemnitz

    Abstract: Anomaly detection in large industrial cooling systems is very challenging due to the high data dimensionality, inconsistent sensor recordings, and lack of labels. The state of the art for automated anomaly detection in these systems typically relies on expert knowledge and thresholds. However, data is viewed isolated and complex, multivariate relationships are neglected. In this work, we present a… ▽ More

    Submitted 14 October, 2022; originally announced October 2022.

    Comments: accepted at phme 2022

  8. arXiv:2205.15145  [pdf, other

    cs.LG

    Machine Learning Methods for Health-Index Prediction in Coating Chambers

    Authors: Clemens Heistracher, Anahid Jalali, Jürgen Schneeweiss, Klaudia Kovacs, Catherine Laflamme, Bernhard Haslhofer

    Abstract: Coating chambers create thin layers that improve the mechanical and optical surface properties in jewelry production using physical vapor deposition. In such a process, evaporated material condensates on the walls of such chambers and, over time, causes mechanical defects and unstable processes. As a result, manufacturers perform extensive maintenance procedures to reduce production loss. Current… ▽ More

    Submitted 30 May, 2022; originally announced May 2022.

  9. arXiv:2205.13882  [pdf, other

    cs.CR

    How to Peel a Million: Validating and Expanding Bitcoin Clusters

    Authors: George Kappos, Haaroon Yousaf, Rainer Stütz, Sofia Rollet, Bernhard Haslhofer, Sarah Meiklejohn

    Abstract: One of the defining features of Bitcoin and the thousands of cryptocurrencies that have been derived from it is a globally visible transaction ledger. While Bitcoin uses pseudonyms as a way to hide the identity of its participants, a long line of research has demonstrated that Bitcoin is not anonymous. This has been perhaps best exemplified by the development of clustering heuristics, which have i… ▽ More

    Submitted 27 May, 2022; originally announced May 2022.

  10. arXiv:2111.11933  [pdf, other

    cs.CR cs.CY

    Disentangling Decentralized Finance (DeFi) Compositions

    Authors: Stefan Kitzler, Friedhelm Victor, Pietro Saggese, Bernhard Haslhofer

    Abstract: We present a measurement study on compositions of Decentralized Finance protocols, which aim to disrupt traditional finance and offer services on top of distributed ledgers, such as Ethereum. DeFi compositions may impact the development of ecosystem interoperability, are increasingly integrated with web technologies, and may introduce risks through complexity. Starting from a dataset of 23 labeled… ▽ More

    Submitted 30 September, 2022; v1 submitted 5 November, 2021; originally announced November 2021.

  11. arXiv:2110.04049  [pdf, other

    cs.LG cs.AI eess.SP

    Minimal-Configuration Anomaly Detection for IIoT Sensors

    Authors: Clemens Heistracher, Anahid Jalali, Axel Suendermann, Sebastian Meixner, Daniel Schall, Bernhard Haslhofer, Jana Kemnitz

    Abstract: The increasing deployment of low-cost IoT sensor platforms in industry boosts the demand for anomaly detection solutions that fulfill two key requirements: minimal configuration effort and easy transferability across equipment. Recent advances in deep learning, especially long-short-term memory (LSTM) and autoencoders, offer promising methods for detecting anomalies in sensor data recordings. We c… ▽ More

    Submitted 8 October, 2021; originally announced October 2021.

    Comments: This paper is accepted at the Industrial Track IDSC https://idsc.at/. The link to the publication and final version will follow as so the paper is published by Springer

  12. arXiv:2109.10229  [pdf, other

    cs.CR cs.CY

    Adoption and Actual Privacy of Decentralized CoinJoin Implementations in Bitcoin

    Authors: Rainer Stütz, Johann Stockinger, Bernhard Haslhofer, Pedro Moreno-Sanchez, Matteo Maffei

    Abstract: We present a first measurement study on the adoption and actual privacy of two popular decentralized CoinJoin implementations, Wasabi and Samourai, in the broader Bitcoin ecosystem. By applying highly accurate (> 99%) algorithms we can effectively detect 30,251 Wasabi and 223,597 Samourai transactions within the block range 530,500 to 725,348 (2018-07-05 to 2022-02-28). We also found a steady adop… ▽ More

    Submitted 14 September, 2022; v1 submitted 21 September, 2021; originally announced September 2021.

  13. arXiv:2102.13613  [pdf, other

    cs.CR cs.CY cs.SI

    GraphSense: A General-Purpose Cryptoasset Analytics Platform

    Authors: Bernhard Haslhofer, Rainer Stütz, Matteo Romiti, Ross King

    Abstract: There is currently an increasing demand for cryptoasset analysis tools among cryptoasset service providers, the financial industry in general, as well as across academic fields. At the moment, one can choose between commercial services or low-level open-source tools providing programmatic access. In this paper, we present the design and implementation of another option: the GraphSense Cryptoasset… ▽ More

    Submitted 26 February, 2021; originally announced February 2021.

  14. arXiv:2012.06171  [pdf, other

    cs.DC cs.DB

    The Future is Big Graphs! A Community View on Graph Processing Systems

    Authors: Sherif Sakr, Angela Bonifati, Hannes Voigt, Alexandru Iosup, Khaled Ammar, Renzo Angles, Walid Aref, Marcelo Arenas, Maciej Besta, Peter A. Boncz, Khuzaima Daudjee, Emanuele Della Valle, Stefania Dumbrava, Olaf Hartig, Bernhard Haslhofer, Tim Hegeman, Jan Hidders, Katja Hose, Adriana Iamnitchi, Vasiliki Kalavri, Hugo Kapp, Wim Martens, M. Tamer Özsu, Eric Peukert, Stefan Plantikow , et al. (16 additional authors not shown)

    Abstract: Graphs are by nature unifying abstractions that can leverage interconnectedness to represent, explore, predict, and explain real- and digital-world phenomena. Although real users and consumers of graph instances and graph workloads understand these abstractions, future problems will require new abstractions and systems. What needs to happen in the next decade for big graph processing to continue t… ▽ More

    Submitted 11 December, 2020; originally announced December 2020.

    Comments: 12 pages, 3 figures, collaboration between the large-scale systems and data management communities, work started at the Dagstuhl Seminar 19491 on Big Graph Processing Systems, to be published in the Communications of the ACM

    ACM Class: C.3; E.0; H.2; J.0

  15. arXiv:2010.12415  [pdf, other

    econ.GN cs.CR q-fin.GN

    Exploring investor behavior in Bitcoin: a study of the disposition effect

    Authors: Jürgen E. Schatzmann, Bernhard Haslhofer

    Abstract: Investors commonly exhibit the disposition effect - the irrational tendency to sell their winning investments and hold onto their losing ones. While this phenomenon has been observed in many traditional markets, it remains unclear whether it also applies to atypical markets like cryptoassets. This paper investigates the prevalence of the disposition effect in Bitcoin using transactions targeting c… ▽ More

    Submitted 23 July, 2023; v1 submitted 23 October, 2020; originally announced October 2020.

    MSC Class: 94A60 ACM Class: J.4

    Journal ref: Digit Finance (2023)

  16. arXiv:2007.00764  [pdf, other

    cs.CR

    Cross-Layer Deanonymization Methods in the Lightning Protocol

    Authors: Matteo Romiti, Friedhelm Victor, Pedro Moreno-Sanchez, Peter Sebastian Nordholt, Bernhard Haslhofer, Matteo Maffei

    Abstract: Bitcoin (BTC) pseudonyms (layer 1) can effectively be deanonymized using heuristic clustering techniques. However, while performing transactions off-chain (layer 2) in the Lightning Network (LN) seems to enhance privacy, a systematic analysis of the anonymity and privacy leakages due to the interaction between the two layers is missing. We present clustering heuristics that group BTC addresses, ba… ▽ More

    Submitted 10 February, 2021; v1 submitted 1 July, 2020; originally announced July 2020.

    Comments: 30 pages, 9 figures, Financial Cryptography and Data Security 2021 https://fc21.ifca.ai/

  17. All that Glitters is not Bitcoin -- Unveiling the Centralized Nature of the BTC (IP) Network

    Authors: Sami Ben Mariem, Pedro Casas, Matteo Romiti, Benoit Donnet, Rainer Stütz, Bernhard Haslhofer

    Abstract: Blockchains are typically managed by peer-to-peer (P2P) networks providing the support and substrate to the so-called distributed ledger (DLT), a replicated, shared, and synchronized data structure, geographically spread across multiple nodes. The Bitcoin (BTC) blockchain is by far the most well known DLT, used to record transactions among peers, based on the BTC digital currency. In this paper, w… ▽ More

    Submitted 19 February, 2020; v1 submitted 24 January, 2020; originally announced January 2020.

    Comments: IEEE/IFIP Network Operations and Management Symposium 2020

    Journal ref: NOMS 2020 - 2020 IEEE/IFIP Network Operations and Management Symposium

  18. Stake Shift in Major Cryptocurrencies: An Empirical Study

    Authors: Rainer Stütz, Peter Gaži, Bernhard Haslhofer, Jacob Illum

    Abstract: In the proof-of-stake (PoS) paradigm for maintaining decentralized, permissionless cryptocurrencies, Sybil attacks are prevented by basing the distribution of roles in the protocol execution on the stake distribution recorded in the ledger itself. However, for various reasons this distribution cannot be completely up-to-date, introducing a gap between the present stake distribution, which determin… ▽ More

    Submitted 13 January, 2020; originally announced January 2020.

    Comments: 20 pages, 8 figures, 2 tables, paper accepted for publication at Financial Cryptography and Data Security 2020 (FC 2020, see https://fc20.ifca.ai)

  19. arXiv:2001.01673  [pdf, other

    cs.DL

    Identifying Historical Travelogues in Large Text Corpora Using Machine Learning

    Authors: Jan Rörden, Doris Gruber, Martin Krickl, Bernhard Haslhofer

    Abstract: Travelogues represent an important and intensively studied source for scholars in the humanities, as they provide insights into people, cultures, and places of the past. However, existing studies rarely utilize more than a dozen primary sources, since the human capacities of working with a large number of historical sources are naturally limited. In this paper, we define the notion of travelogue a… ▽ More

    Submitted 6 January, 2020; originally announced January 2020.

    Comments: 14 pages, accepted for presentation at iConference 2020

  20. arXiv:1908.01051  [pdf, other

    cs.CR

    Spams meet Cryptocurrencies: Sextortion in the Bitcoin Ecosystem

    Authors: Masarah Paquet-Clouston, Matteo Romiti, Bernhard Haslhofer, Thomas Charvat

    Abstract: In the past year, a new spamming scheme has emerged: sexual extortion messages requiring payments in the cryptocurrency Bitcoin, also known as sextortion. This scheme represents a first integration of the use of cryptocurrencies by members of the spamming industry. Using a dataset of 4,340,736 sextortion spams, this research aims at understanding such new amalgamation by uncovering spammers' opera… ▽ More

    Submitted 2 August, 2019; originally announced August 2019.

    Comments: 12 pages, 5 figures, Advances in Financial Technologies (AFT 2019)

  21. arXiv:1906.12221  [pdf, other

    cs.CY

    Safeguarding the Evidential Value of Forensic Cryptocurrency Investigations

    Authors: Michael Fröwis, Thilo Gottschalk, Bernhard Haslhofer, Christian Rückert, Paulina Pesch

    Abstract: Analyzing cryptocurrency payment flows has become a key forensic method in law enforcement and is nowadays used to investigate a wide spectrum of criminal activities. However, despite its widespread adoption, the evidential value of obtained findings in court is still largely unclear. In this paper, we focus on the key ingredients of modern cryptocurrency analytics techniques, which are clustering… ▽ More

    Submitted 2 August, 2021; v1 submitted 28 June, 2019; originally announced June 2019.

  22. arXiv:1905.05999  [pdf, other

    cs.CR

    A Deep Dive into Bitcoin Mining Pools: An Empirical Analysis of Mining Shares

    Authors: Matteo Romiti, Aljosha Judmayer, Alexei Zamyatin, Bernhard Haslhofer

    Abstract: Miners play a key role in cryptocurrencies such as Bitcoin: they invest substantial computational resources in processing transactions and minting new currency units. It is well known that an attacker controlling more than half of the network's mining power could manipulate the state of the system at will. While the influence of large mining pools appears evenly split, the actual distribution of m… ▽ More

    Submitted 15 May, 2019; originally announced May 2019.

    Comments: Conference paper https://weis2019.econinfosec.org

  23. arXiv:1904.07686  [pdf, other

    cs.LG stat.ML

    Predicting Time-to-Failure of Plasma Etching Equipment using Machine Learning

    Authors: Anahid Jalali, Clemens Heistracher, Alexander Schindler, Bernhard Haslhofer, Tanja Nemeth, Robert Glawar, Wilfried Sihn, Peter De Boer

    Abstract: Predicting unscheduled breakdowns of plasma etching equipment can reduce maintenance costs and production losses in the semiconductor industry. However, plasma etching is a complex procedure and it is hard to capture all relevant equipment properties and behaviors in a single physical model. Machine learning offers an alternative for predicting upcoming machine failures based on relevant data poin… ▽ More

    Submitted 16 April, 2019; originally announced April 2019.

    Comments: 8 pages, 10 figures, accepted in IEEEE/PHM 2019 Conference

  24. arXiv:1812.02808  [pdf, other

    cs.CR

    An Empirical Analysis of Monero Cross-Chain Traceability

    Authors: Abraham Hinteregger, Bernhard Haslhofer

    Abstract: Monero is a privacy-centric cryptocurrency that makes payments untraceable by adding decoys to every real input spent in a transaction. Two studies from 2017 found methods to distinguish decoys from real inputs, which enabled traceability for a majority of transactions. Since then, a number protocol changes have been introduced, but their effectiveness has not yet been reassessed. Furthermore, lit… ▽ More

    Submitted 4 January, 2019; v1 submitted 6 December, 2018; originally announced December 2018.

    Comments: Conference paper (http://fc19.ifca.ai/)

  25. arXiv:1804.04080  [pdf, ps, other

    cs.CR

    Ransomware Payments in the Bitcoin Ecosystem

    Authors: Masarah Paquet-Clouston, Bernhard Haslhofer, Benoit Dupont

    Abstract: Ransomware can prevent a user from accessing a device and its files until a ransom is paid to the attacker, most frequently in Bitcoin. With over 500 known ransomware families, it has become one of the dominant cybercrime threats for law enforcement, security professionals and the public. However, a more comprehensive, evidence-based picture on the global direct financial impact of ransomware atta… ▽ More

    Submitted 11 April, 2018; originally announced April 2018.

    Comments: 17th Annual Workshop on the Economics of Information Security (WEIS)

  26. Knowledge Graphs in the Libraries and Digital Humanities Domain

    Authors: Bernhard Haslhofer, Antoine Isaac, Rainer Simon

    Abstract: Knowledge graphs represent concepts (e.g., people, places, events) and their semantic relationships. As a data structure, they underpin a digital information system, support users in resource discovery and retrieval, and are useful for navigation and visualization purposes. Within the libaries and humanities domain, knowledge graphs are typically rooted in knowledge organization systems, which hav… ▽ More

    Submitted 8 March, 2018; originally announced March 2018.

  27. arXiv:1306.1073  [pdf, other

    cs.DL cs.DB

    Web Synchronization Simulations using the ResourceSync Framework

    Authors: Bernhard Haslhofer, Simeon Warner, Carl Lagoze, Martin Klein, Robert Sanderson, Herbert van de Sompel, Michael L. Nelson

    Abstract: Maintenance of multiple, distributed up-to-date copies of collections of changing Web resources is important in many application contexts and is often achieved using ad hoc or proprietary synchronization solutions. ResourceSync is a resource synchronization framework that integrates with the Web architecture and leverages XML sitemaps. We define a model for the ResourceSync framework as a basis fo… ▽ More

    Submitted 5 June, 2013; originally announced June 2013.

    Comments: 12 pages

  28. arXiv:1305.1476  [pdf, ps, other

    cs.DL

    ResourceSync: Leveraging Sitemaps for Resource Synchronization

    Authors: Bernhard Haslhofer, Simeon Warner, Carl Lagoze, Martin Klein, Robert Sanderson, Michael L. Nelson, Herbert van de Sompel

    Abstract: Many applications need up-to-date copies of collections of changing Web resources. Such synchronization is currently achieved using ad-hoc or proprietary solutions. We propose ResourceSync, a general Web resource synchronization protocol that leverages XML Sitemaps. It provides a set of capabilities that can be combined in a modular manner to meet local or community requirements. We report on work… ▽ More

    Submitted 7 May, 2013; originally announced May 2013.

    Comments: 3 pages, WWW 2013 developer track

  29. arXiv:1304.2401  [pdf, other

    cs.IR cs.HC

    RESLVE: Leveraging User Interest to Improve Entity Disambiguation on Short Text

    Authors: Elizabeth L. Murnane, Bernhard Haslhofer, Carl Lagoze

    Abstract: We address the Named Entity Disambiguation (NED) problem for short, user-generated texts on the social Web. In such settings, the lack of linguistic features and sparse lexical context result in a high degree of ambiguity and sharp performance drops of nearly 50% in the accuracy of conventional NED systems. We handle these challenges by develo** a model of user-interest with respect to a persona… ▽ More

    Submitted 8 April, 2013; originally announced April 2013.

    ACM Class: H.3.3; I.2.7

  30. arXiv:1304.1636  [pdf, other

    cs.DL cs.HC

    Semantic Tagging on Historical Maps

    Authors: Bernhard Haslhofer, Werner Robitza, Carl Lagoze, Francois Guimbretiere

    Abstract: Tags assigned by users to shared content can be ambiguous. As a possible solution, we propose semantic tagging as a collaborative process in which a user selects and associates Web resources drawn from a knowledge context. We applied this general technique in the specific context of online historical maps and allowed users to annotate and tag them. To study the effects of semantic tagging on tag p… ▽ More

    Submitted 5 April, 2013; originally announced April 2013.

    Comments: 10 pages

    ACM Class: H.5.m

  31. arXiv:1206.1339  [pdf, ps, other

    cs.DL cs.IR

    Finding Quality Issues in SKOS Vocabularies

    Authors: Christian Mader, Bernhard Haslhofer, Antoine Isaac

    Abstract: The Simple Knowledge Organization System (SKOS) is a standard model for controlled vocabularies on the Web. However, SKOS vocabularies often differ in terms of quality, which reduces their applicability across system boundaries. Here we investigate how we can support taxonomists in improving SKOS vocabularies by pointing out quality issues that go beyond the integrity constraints defined in the SK… ▽ More

    Submitted 6 June, 2012; originally announced June 2012.

    Comments: 12 pages, to be published in TPDL 2012 proceedings

  32. arXiv:1202.6354  [pdf, other

    cs.DL

    Open Annotations on Multimedia Web Resources

    Authors: Bernhard Haslhofer, Robert Sanderson, Rainer Simon, Herbert van de Sompel

    Abstract: Many Web portals allow users to associate additional information with existing multimedia resources such as images, audio, and video. However, these portals are usually closed systems and user-generated annotations are almost always kept locked up and remain inaccessible to the Web of Data. We believe that an important step to take is the integration of multimedia annotations and the Linked Data p… ▽ More

    Submitted 28 February, 2012; originally announced February 2012.

    Comments: 20 pages

  33. arXiv:1106.5178  [pdf, other

    cs.DL

    The Open Annotation Collaboration (OAC) Model

    Authors: Bernhard Haslhofer, Rainer Simon, Robert Sanderson, Herbert van de Sompel

    Abstract: Annotations allow users to associate additional information with existing resources. Using proprietary and closed systems on the Web, users are already able to annotate multimedia resources such as images, audio and video. So far, however, this information is almost always kept locked up and inaccessible to the Web of Data. We believe that an important step to take is the integration of multimedia… ▽ More

    Submitted 25 June, 2011; originally announced June 2011.

    Comments: 5 pages, 3 figures

    ACM Class: H.3.7