Deanonymizing Tor hidden service users through Bitcoin transactions analysis

被引:35
|
作者
Al Jawaheri, Husam [1 ]
Al Sabah, Mashael [2 ]
Boshmaf, Yazan [2 ]
Erbad, Aiman [3 ]
机构
[1] Univ Luxembourg, Luxembourg, Luxembourg
[2] HBKU, Qatar Comp Res Inst, Ar Rayyan, Qatar
[3] Qatar Univ, Doha, Qatar
关键词
Bitcoin; Tor hidden services; Privacy; Deanonymization; Attack;
D O I
10.1016/j.cose.2019.101684
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid increase of threats on the Internet, people are continuously seeking privacy and anonymity. Services such as Bitcoin and Tor were introduced to provide anonymity for online transactions and Web browsing. Due to its pseudonymity model, Bitcoin lacks retroactive operational security, which means historical pieces of information could be used to identify a certain user. By exploiting publicly available information, we show how relying on Bitcoin for payments on Tor hidden services could lead to deanonymization of these services' users. Such linking is possible by finding at least one past transaction in the Blockchain that involves their publicly declared Bitcoin addresses. To demonstrate the consequences of this deanonymization approach, we carried out a real-world experiment simulating a passive, limited adversary. We crawled 1.5K hidden services and collected 88 unique and active Bitcoin addresses. We then crawled 5B tweets and 1M BitcoinTalk forum pages and collected 4.2K and 41K unique Bitcoin addresses, respectively. Each user address was associated with an online identity along with its public profile information. By analyzing the transactions in the Blockchain, we were able to link 125 unique users to 20 hidden services, including sensitive ones, such as The Pirate Bay and Silk Road. We also analyzed two case studies in detail to demonstrate the implications of the information leakage on users anonymity. In particular, we confirm that Bitcoin addresses should be considered exploitable, as they can be used to deanonymize users retroactively. This is especially important for Tor hidden service users who actively seek and expect privacy and anonymity. (C) 2019 Elsevier Ltd. All rights reserved.
引用
收藏
页数:11
相关论文
共 50 条
  • [31] Reducing Privacy of CoinJoin Transactions: Quantitative Bitcoin Network Analysis
    Wahrstaetter, Anton
    Taudes, Alfred
    Svetinovic, Davor
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (05) : 4543 - 4558
  • [32] Short Paper: An Analysis of Non-standard Bitcoin Transactions
    Bistarelli, Stefano
    Mercanti, Ivan
    Santini, Francesco
    2018 CRYPTO VALLEY CONFERENCE ON BLOCKCHAIN TECHNOLOGY (CVCBT), 2018, : 93 - 96
  • [33] Locating Tor's Hidden Service Clients Based on Protocol Feature
    Ma, Yanbing
    Xu, Xiaolei
    PROCEEDINGS OF 2017 IEEE 2ND INFORMATION TECHNOLOGY, NETWORKING, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (ITNEC), 2017, : 282 - 285
  • [34] Do Bitcoin Users Really Care About Anonymity? An Analysis of the Bitcoin Transaction Graph
    Gaihre, Anil
    Luo, Yan
    Liu, Hang
    2018 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2018, : 1198 - 1207
  • [35] Uncovering the Bitcoin blockchain: an analysis of the full users graph
    Maesa, Damian Di Francesco
    Marino, Andrea
    Ricci, Laura
    PROCEEDINGS OF 3RD IEEE/ACM INTERNATIONAL CONFERENCE ON DATA SCIENCE AND ADVANCED ANALYTICS, (DSAA 2016), 2016, : 537 - 546
  • [36] An analysis of the Bitcoin users graph: inferring unusual behaviours
    Maesa, Damiano Di Francesco
    Marino, Andrea
    Ricci, Laura
    COMPLEX NETWORKS & THEIR APPLICATIONS V, 2017, 693 : 749 - 760
  • [37] Characteristics of Bitcoin users: an analysis of Google search data
    Yelowitz, Aaron
    Wilson, Matthew
    APPLIED ECONOMICS LETTERS, 2015, 22 (13) : 1030 - 1036
  • [38] Tor traffic analysis using Hidden Markov Models
    Zhioua, Sami
    SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (09) : 1075 - 1086
  • [39] A Novel Protocol-Feature Attack against Tor's Hidden Service
    Wang, Rui
    Wen, Qiaoyan
    Zhang, Hua
    Li, Xuelei
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2016, E99D (04): : 839 - 849
  • [40] Large-scale Evaluation of Malicious Tor Hidden Service Directory Discovery
    Wang, Chunmian
    Ling, Zhen
    Wu, Wenjia
    Chen, Qi
    Yang, Ming
    Fu, Xinwen
    IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (IEEE INFOCOM 2022), 2022, : 1709 - 1718