Skip to main content

Showing 1–6 of 6 results for author: Kappos, G

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.09757  [pdf, other

    cs.CR

    Give and Take: An End-To-End Investigation of Giveaway Scam Conversion Rates

    Authors: Enze Liu, George Kappos, Eric Mugnier, Luca Invernizzi, Stefan Savage, David Tao, Kurt Thomas, Geoffrey M. Voelker, Sarah Meiklejohn

    Abstract: Scams -- fraudulent schemes designed to swindle money from victims -- have existed for as long as recorded history. However, the Internet's combination of low communication cost, global reach, and functional anonymity has allowed scam volumes to reach new heights. Designing effective interventions requires first understanding the context: how scammers reach potential victims, the earnings they mak… ▽ More

    Submitted 15 May, 2024; originally announced May 2024.

    Comments: Under review

  2. arXiv:2205.13882  [pdf, other

    cs.CR

    How to Peel a Million: Validating and Expanding Bitcoin Clusters

    Authors: George Kappos, Haaroon Yousaf, Rainer Stütz, Sofia Rollet, Bernhard Haslhofer, Sarah Meiklejohn

    Abstract: One of the defining features of Bitcoin and the thousands of cryptocurrencies that have been derived from it is a globally visible transaction ledger. While Bitcoin uses pseudonyms as a way to hide the identity of its participants, a long line of research has demonstrated that Bitcoin is not anonymous. This has been perhaps best exemplified by the development of clustering heuristics, which have i… ▽ More

    Submitted 27 May, 2022; originally announced May 2022.

  3. arXiv:2003.12470  [pdf, other

    cs.CR

    An Empirical Analysis of Privacy in the Lightning Network

    Authors: George Kappos, Haaroon Yousaf, Ania Piotrowska, Sanket Kanjalkar, Sergi Delgado-Segura, Andrew Miller, Sarah Meiklejohn

    Abstract: Payment channel networks, and the Lightning Network in particular, seem to offer a solution to the lack of scalability and privacy offered by Bitcoin and other blockchain-based cryptocurrencies. Previous research has focused on the scalability, availability, and crypto-economics of the Lightning Network, but relatively little attention has been paid to exploring the level of privacy it achieves in… ▽ More

    Submitted 21 January, 2021; v1 submitted 27 March, 2020; originally announced March 2020.

    Comments: 26 pages, 5 figures

  4. arXiv:1902.07337  [pdf, ps, other

    cs.CR

    Extending the Anonymity of Zcash

    Authors: George Kappos, Ania M. Piotrowska

    Abstract: Although Bitcoin in its original whitepaper stated that it offers anonymous transactions, de-anonymization techniques have found otherwise. Therefore, alternative cryptocurrencies, like Dash, Monero, and Zcash, were developed to provide better privacy. As Edward Snowden stated, "Zcash's privacy tech makes it the most interesting Bitcoin alternative (...) because the privacy properties of it are tr… ▽ More

    Submitted 19 February, 2019; originally announced February 2019.

  5. arXiv:1810.12786  [pdf, other

    cs.CR

    Tracing Transactions Across Cryptocurrency Ledgers

    Authors: Haaroon Yousaf, George Kappos, Sarah Meiklejohn

    Abstract: One of the defining features of a cryptocurrency is that its ledger, containing all transactions that have evertaken place, is globally visible. As one consequenceof this degree of transparency, a long line of recent re-search has demonstrated that even in cryptocurrenciesthat are specifically designed to improve anonymity it is often possible to track money as it changes hands,and in some cases t… ▽ More

    Submitted 17 May, 2019; v1 submitted 30 October, 2018; originally announced October 2018.

    Comments: 14 pages, 13 tables, 6 figures

  6. arXiv:1805.03180  [pdf, other

    cs.CR

    An Empirical Analysis of Anonymity in Zcash

    Authors: George Kappos, Haaroon Yousaf, Mary Maller, Sarah Meiklejohn

    Abstract: Among the now numerous alternative cryptocurrencies derived from Bitcoin, Zcash is often touted as the one with the strongest anonymity guarantees, due to its basis in well-regarded cryptographic research. In this paper, we examine the extent to which anonymity is achieved in the deployed version of Zcash. We investigate all facets of anonymity in Zcash's transactions, ranging from its transparent… ▽ More

    Submitted 8 May, 2018; originally announced May 2018.

    Comments: 27th USENIX Security Symposium (USENIX Security '18), 15 pages, Zcash