Deanonymisation of Clients in Bitcoin P2P Network

被引:258
作者
Biryukov, Alex [1 ]
Khovratovich, Dmitry [1 ]
Pustogarov, Ivan [1 ]
机构
[1] Univ Luxembourg, Luxembourg, Luxembourg
来源
CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY | 2014年
关键词
Bitcoin; Anonymity; P2P; Tor;
D O I
10.1145/2660267.2660379
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Bitcoin is a digital currency which relies on a distributed set of miners to mint coins and on a peer-to-peer network to broadcast transactions. The identities of Bitcoin users are hidden behind pseudonyms (public keys) which are recommended to be changed frequently in order to increase transaction unlinkability. We present an efficient method to deanonymize Bitcoin users, which allows to link user pseudonyms to the IP addresses where the transactions are generated. Our techniques work for the most common and the most challenging scenario when users are behind NATs or firewalls of their ISPs. They allow to link transactions of a user behind a NAT and to distinguish connections and transactions of different users behind the same NAT. We also show that a natural countermeasure of using Tor or other anonymity services can be cut-off by abusing anti-DoS countermeasures of the Bitcoin network. Our attacks require only a few machines and have been experimentally verified. The estimated success rate is between 11% and 60% depending on how stealthy an attacker wants to be. We propose several countermeasures to mitigate these new attacks.
引用
收藏
页码:15 / 29
页数:15
相关论文
共 13 条
[1]  
[Anonymous], 2014, ONIONCAT ANONYMOUS V
[2]  
[Anonymous], 2014, BITCOIN CODE PROJECT
[3]  
[Anonymous], 2014, BITNODES
[4]  
[Anonymous], 2014, BEST VPNS USING BITC
[5]  
Chaum D., 1988, P ADV CRYPT CRYPTO 8
[6]  
Dingledine R., 2004, US SEC S USENIX 04
[7]  
Grinstead CM., 1997, Introduction to Probability
[8]  
Koshy P., 2014, P FIN CRYPT DAT SEC
[9]  
Lerner S., 2014, NEW VULNERABILITY KN
[10]  
Meiklejohn S., 2013, P C INT MEAS C IMC 1