Deanonymizing Tor hidden service users through Bitcoin transactions analysis

被引:35
|
作者
Al Jawaheri, Husam [1 ]
Al Sabah, Mashael [2 ]
Boshmaf, Yazan [2 ]
Erbad, Aiman [3 ]
机构
[1] Univ Luxembourg, Luxembourg, Luxembourg
[2] HBKU, Qatar Comp Res Inst, Ar Rayyan, Qatar
[3] Qatar Univ, Doha, Qatar
关键词
Bitcoin; Tor hidden services; Privacy; Deanonymization; Attack;
D O I
10.1016/j.cose.2019.101684
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid increase of threats on the Internet, people are continuously seeking privacy and anonymity. Services such as Bitcoin and Tor were introduced to provide anonymity for online transactions and Web browsing. Due to its pseudonymity model, Bitcoin lacks retroactive operational security, which means historical pieces of information could be used to identify a certain user. By exploiting publicly available information, we show how relying on Bitcoin for payments on Tor hidden services could lead to deanonymization of these services' users. Such linking is possible by finding at least one past transaction in the Blockchain that involves their publicly declared Bitcoin addresses. To demonstrate the consequences of this deanonymization approach, we carried out a real-world experiment simulating a passive, limited adversary. We crawled 1.5K hidden services and collected 88 unique and active Bitcoin addresses. We then crawled 5B tweets and 1M BitcoinTalk forum pages and collected 4.2K and 41K unique Bitcoin addresses, respectively. Each user address was associated with an online identity along with its public profile information. By analyzing the transactions in the Blockchain, we were able to link 125 unique users to 20 hidden services, including sensitive ones, such as The Pirate Bay and Silk Road. We also analyzed two case studies in detail to demonstrate the implications of the information leakage on users anonymity. In particular, we confirm that Bitcoin addresses should be considered exploitable, as they can be used to deanonymize users retroactively. This is especially important for Tor hidden service users who actively seek and expect privacy and anonymity. (C) 2019 Elsevier Ltd. All rights reserved.
引用
收藏
页数:11
相关论文
共 50 条
  • [21] Unmasking Criminal Enterprises: An Analysis of Bitcoin Transactions
    Oakley, Jonathan
    Worley, Carl
    Yu, Lu
    Brooks, Richard
    Skjellum, Anthony
    PROCEEDINGS OF THE 2018 13TH INTERNATIONAL CONFERENCE ON MALICIOUS AND UNWANTED SOFTWARE (MALWARE 2018), 2018, : 161 - 166
  • [22] A New Website Fingerprinting Method for Tor Hidden Service
    Hui, Zihang
    Zhai, Jiangtao
    Wang, Shengxian
    Ji, Weijie
    IEEE ACCESS, 2025, 13 : 8886 - 8897
  • [23] Empirical analysis of Tor Hidden Services
    Owen, Gareth
    Savage, Nick
    IET INFORMATION SECURITY, 2016, 10 (03) : 113 - 118
  • [24] Diffusion: Analysis of Many-to-Many Transactions in Bitcoin
    Eck, Dylan
    Torek, Adam
    Cutchin, Steven
    Dagher, Gaby G.
    2021 IEEE INTERNATIONAL CONFERENCE ON BLOCKCHAIN (BLOCKCHAIN 2021), 2021, : 388 - 393
  • [25] Analysis of Bitcoin Exchange Using Relationship of Transactions and Addresses
    Hong, Seongho
    Kim, Heeyoul
    2019 21ST INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT): ICT FOR 4TH INDUSTRIAL REVOLUTION, 2019, : 67 - 70
  • [26] Implementation and Analysis of the use of the Blockchain Transactions on the Workings of the Bitcoin
    Fauzi, Muhammad Reza Rizky
    Nasution, Surya Michrandi
    Paryasto, Marisa W.
    6TH INTERNATIONAL CONFERENCE ON MECHATRONICS (ICOM'17), 2017, 260
  • [27] Content and popularity analysis of Tor hidden services
    Biryukov, Alex
    Pustogarov, Ivan
    Thill, Fabrice
    Weinmann, Ralf-Philipp
    2014 IEEE 34TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS WORKSHOPS (ICDCSW), 2014, : 188 - 193
  • [28] Illicit Activity Detection in Bitcoin Transactions using Timeseries Analysis
    Maheshwari, Rohan
    Praveen, V. A. Sriram
    Shobha, G.
    Shetty, Jyoti
    Chala, Arjuna
    Watanuki, Hugo
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2023, 14 (03) : 13 - 18
  • [29] A Suite of Tools for the Forensic Analysis of Bitcoin Transactions: Preliminary Report
    Bistarelli, Stefano
    Mercanti, Ivan
    Santini, Francesco
    EURO-PAR 2018: PARALLEL PROCESSING WORKSHOPS, 2019, 11339 : 329 - 341
  • [30] The role of Bitcoin on developed and emerging markets - on the basis of a Bitcoin users graph analysis
    Mizerka, Jacek
    Strozynska-Szajek, Agnieszka
    Mizerka, Piotr
    FINANCE RESEARCH LETTERS, 2020, 35