A Quantitative Analysis of the Impact of Arbitrary Blockchain Content on Bitcoin

  title={A Quantitative Analysis of the Impact of Arbitrary Blockchain Content on Bitcoin},
  author={Roman Matzutt and Jens Hiller and Martin Henze and Jan Henrik Ziegeldorf and Dirk M{\"u}llmann and Oliver Hohlfeld and Klaus Wehrle},
  booktitle={Financial Cryptography},
Blockchains primarily enable credible accounting of digital events, e.g., money transfers in cryptocurrencies. However, beyond this original purpose, blockchains also irrevocably record arbitrary data, ranging from short messages to pictures. This does not come without risk for users as each participant has to locally replicate the complete blockchain, particularly including potentially harmful content. We provide the first systematic analysis of the benefits and threats of arbitrary blockchain… 

Analysis of Arbitrary Content on Blockchain-Based Systems using BigQuery

This paper develops and applies a cloud-based approach for quickly discovering and classifying content on public blockchains and presents a side-by-side comparison between different blockchains in terms of the quality and quantity of stored data, which is the first to systematically analyze non-financial content stored on the Ethereum blockchain.

Thwarting Unwanted Blockchain Content Insertion

It is found that mandatory minimum fees as well as mitigation of transaction manipulability via identifier commitments significantly raise the bar for inserting harmful content into a blockchain.

Exploring the redaction mechanisms of mutable blockchains: A comprehensive survey

A comprehensive survey that reviews and analyzes the state‐of‐the‐art redaction mechanisms of the existing mutable blockchains and provides new insights into these mechanisms.

Redactable Blockchain in the Permissionless Setting

This work proposes the first efficient redactable blockchain for the permissionless setting that is easily integrable into Bitcoin, and that does not rely on heavy cryptographic tools or trust assumptions, and shows the viability of the approach with a proof-of-concept implementation.

Steganographic Analysis of Blockchains †

This work presents a steganalysis approach for blockchains, evaluating it in Bitcoin and Ethereum, both popular cryptocurrencies, and finds that bitcoin clusters could carry up to 360 KiB of hidden data if used for such a purpose.

Assessing the Threat of Blockchain-based Botnets

It is concluded that despite its limitations, the blockchain, as a backup mechanism, practically renders attempts to suppress the control channel of a botnet futile and more focus should be put on detecting and disinfecting machines at the network edge (router) or even per-bot level.

Uncontrolled Randomness in Blockchains: Covert Bulletin Board for Illicit Activity

This work shows the severity of the problem by demonstrating that blockchains can be exploited to surreptitiously distribute arbitrary content, and presents a generic framework to immunize blockchains against these attacks.

Blockchain Technology, Technical Challenges and Countermeasures for Illegal Data Insertion

The analysis of countermeasures of illegal data insertion can be combined for increased efficiency and the review of the possible countermeasures to overcome the security issues related to data insertion are elaborated.

Erasing Data from Blockchain Nodes

A general FPLE approach for UTXO-based (i.e., Bitcoin-like) cryptocurrencies and a lightweight proof-of-concept tool for safely erasing transaction data from the local storage of Bitcoin Core nodes are presented.

Echoes of the Past: Recovering Blockchain Metrics From Merged Mining

This work reconstructs a long-ranging view of forks and stale blocks in Bitcoin from its merge mined child chains, and compares the results to previous findings that were derived from live measurements.



Redactable Blockchain – or – Rewriting History in Bitcoin and Friends

A new framework that makes it possible to re-write or compress the content of any number of blocks in decentralized services exploiting the blockchain technology, and details how to integrate a chameleon hash function in virtually any blockchain-based technology.

POSTER: I Don't Want That Content! On the Risks of Exploiting Bitcoin's Blockchain as a Content Store

It is shown for Bitcoin that blockchains potentially provide multiple ways to store (malicious and illegal) content that, once stored, cannot be removed and is replicated by every participating user.

μchain: How to Forget without Hard Forks

In this paper, we explore an idea of making (proof-of-work) blockchains mutable. We propose and implement μchain, a mutable blockchain, that enables modifications of blockchain history. Blockchains

Uncovering the Bitcoin Blockchain: An Analysis of the Full Users Graph

  • D. MaesaAndrea MarinoL. Ricci
  • Computer Science, Mathematics
    2016 IEEE International Conference on Data Science and Advanced Analytics (DSAA)
  • 2016
A set of analyses of the user graph, i.e. the graph obtained by an heuristic clustering of the graph of BITCOIN transactions, is presented, which includes the analysis of the time evolution ofBITCOIN network, the verification of the "rich get richer" conjecture and the detection of the nodes which are critical for the network connectivity.

BitIodine: Extracting Intelligence from the Bitcoin Network

A modular framework, BitIodine, which parses the blockchain, clusters addresses that are likely to belong to a same user or group of users, classifies such users and labels them, and finally visualizes complex information extracted from the Bitcoin network is presented.

Secure and anonymous decentralized Bitcoin mixing

An Analysis of Bitcoin OP_RETURN Metadata

This paper measures the evolution in time of the usage of each protocol, the distribution of OP_RETURN transactions by application domain, and their space consumption.

CoinParty: Secure Multi-Party Mixing of Bitcoins

By the application of threshold signatures to Bitcoin mixing, CoinParty achieves anonymity by orders of magnitude higher than related work as it is quantified by analyzing transactions in the actual Bitcoin blockchain and is first among related approaches to provide plausible deniability.

Digital Art as ‘Monetised Graphics’: Enforcing Intellectual Property on the Blockchain

In a global economic landscape of hyper-commodification and financialisation, efforts to assimilate digital art into the high-stakes commercial art market have so far been rather unsuccessful,

Eclipse Attacks on Bitcoin's Peer-to-Peer Network

This work takes a detailed look at bitcoin's peer-to-peer network, and quantifies the resources involved in the attack via probabilistic analysis, Monte Carlo simulations, measurements and experiments with live bitcoin nodes.