Skip to main content

Towards Risk Scoring of Bitcoin Transactions

  • Conference paper
  • First Online:
Book cover Financial Cryptography and Data Security (FC 2014)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 8438))

Included in the following conference series:

Abstract

If Bitcoin becomes the prevalent payment system on the Internet, crime fighters will join forces with regulators and enforce blacklisting of transaction prefixes at the parties who offer real products and services in exchange for bitcoin. Blacklisted bitcoins will be hard to spend and therefore less liquid and less valuable. This requires every recipient of Bitcoin payments not only to check all incoming transactions for possible blacklistings, but also to assess the risk of a transaction being blacklisted in the future. We elaborate this scenario, specify a risk model, devise a prediction approach using public knowledge, and present preliminary results using data from selected known thefts. We discuss the implications on markets where bitcoins are traded and critically revisit Bitcoin’s ability to serve as a unit of account.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Convention: We capitalize Bitcoin when referring to the name of the system and use lower case for the monetary unit (like dollar, euro). BTC is shorthand for the unit.

  2. 2.

    Intentionally “colored” coins have been proposed to deal with virtual goods of different value using Bitcoin as an infrastructure [29].

References

  1. BitPay. https://bitpay.com/

  2. Android Security Vulnerability (2013). http://bitcoin.org/en/alert/2013-08-11-android

  3. Becker, J., Breuker, D., Heide, T., Holler, J., Rauer, H.P., Böhme, R.: Can we afford integrity by Proof-of-Work? Scenarios inspired by the bitcoin currency. In: Böhme, R. (ed.) The Economics of Information Security and Privacy, pp. 135–156. Springer, Heidelberg (2013)

    Google Scholar 

  4. Bitcoin Forum. List of Major Bitcoin Heists, Thefts, Hacks, Scams, and Losses. https://bitcointalk.org/index.php?topic=83794

  5. Bitcoin Forum. CoinJoin: Bitcoin privacy for the real world (2013). https://bitcointalk.org/index.php?topic=279249.0

  6. Bitcoin Forum. Mike Hearn, Foundation’s Law & Policy Chair, is pushing blacklists right now (2013). https://bitcointalk.org/index.php?topic=333824.0

  7. Bitcoin Forum. Namecoin was Stillborn, I Had to Switch Off Life-Support (2013). https://bitcointalk.org/index.php?topic=310954

  8. Blockchain.info. Double Spends. https://blockchain.info/de/double-spends

  9. Böhme, R.: Internet protocol adoption: learning from Bitcoin. In: IAB Workshop on Internet Technology Adoption and Transition (ITAT) (2013)

    Google Scholar 

  10. Buterin, V.: Mt.Gox: what the largest exchange is doing about the Linode theft and the implications (2012). http://bitcoinmagazine.com/mtgox-the-bitcoin-police-what-the-largest-exchange-is-doing-about-the-linode-theft-and-the-implications/

  11. Chaum, D., Fiat, A., Naor, M.: Untraceable electronic cash. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol. 403, pp. 319–327. Springer, Heidelberg (1990)

    Chapter  Google Scholar 

  12. Chaum, D.: Security without identification: transaction systems to make big brother obsolete. Commun. ACM 28(70), 1030–1044 (1985)

    Article  Google Scholar 

  13. Christin, N.: Traveling the silk road: a measurement analysis of a large anonymous online marketplace. In: Proceedings of the 22nd International World Wide Web Conference, Rio de Janeiro, pp. 213–224 (2013)

    Google Scholar 

  14. Douceur, J.R.: The sybil attack. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 251–260. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  15. Goodin, D.: You’re infected-if you want to see your data again, pay us USD 300 in Bitcoins (2013). http://arstechnica.com/security/2013/10/youre-infected-if-you-want-to-see-your-data-again-pay-us-300-in-bitcoins/

  16. Hill, K.: Sanitizing Bitcoin: This Company Wants To Track ‘Clean’ Bitcoin Accounts (2013). http://www.forbes.com/sites/kashmirhill/2013/11/13/sanitizing-bitcoin-coin-validation/

  17. Karame, G.O., Androulaki, E., Capkun, S.: Two bitcoins at the price of one? Double-spending attacks on fast payments in bitcoin. In: Proceedings of the ACM Conference on Computer and Communications Security (CCS) (2012)

    Google Scholar 

  18. Karpeles, M.: Clarification of Mt. Gox Compromised Accounts and Major Bitcoin Sell-Off (2011). https://www.mtgox.com/press_release_20110630.html

  19. Levin, D., Schulman, A., LaCurts, K., Spring, N., Bhattacharjee, B.: Making currency inexpensive with iOwe. In: Proceedings of the Workshop on the Economics of Networks, Systems, and Computation (NetEcon), San Jose (2011)

    Google Scholar 

  20. McLeod, A.S.: Thailand Bans The Bitcoin! National Foreign Exchange Department Rules Bitcoin Illegal, Trading Suspended (2013). http://forexmagnates.com/bitcoin-binned-thailands-foreign-exchange-department-rules-bitcoin-illegal-trading-suspended/

  21. McMillan, R.: USD 1.2M Hack Shows Why You Should Never Store Bitcoins on the Internet (2013). http://www.wired.com/wiredenterprise/2013/11/inputs/

  22. Meiklejohn, S., Pomarole, M., Jordan, G., Levchenko, K., McCoy, D., Voelker, G.M., Savage, S.: A fistful of bitcoins: characterizing payments among men with no names. In: Proceedings of the ACM Internet Measurement Conference (IMC), pp. 127–140. ACM, New York (2013)

    Google Scholar 

  23. Miers, I., Garman, C., Green, M., Rubin, A.D.: Zerocoin: anonymous distributed e-cash from bitcoin. In: IEEE Symposium on Security and Privacy, San Francisco, pp. 397–411. IEEE (2013)

    Google Scholar 

  24. Moore, T., Christin, N.: Beware the middleman: empirical analysis of bitcoin-exchange risk. In: Sadeghi, A.-R. (ed.) FC 2013. LNCS, vol. 7859, pp. 25–33. Springer, Heidelberg (2013)

    Chapter  Google Scholar 

  25. Möser, M., Böhme, R., Breuker, D.: An inquiry into money laundering tools in the bitcoin ecosystem. In: Proceedings of the APWG E-Crime Researchers Summit (2013)

    Google Scholar 

  26. Nakamoto, S.: Bitcoin: A Peer-to-Peer Electronic Cash System (2008)

    Google Scholar 

  27. Reid, F., Harrigan, M.: An analysis of anonymity in the bitcoin system. In: Altshuler, Y., Elovici, Y., Cremers, A.B., Aharony, N., Pentland, A. (eds.) Security and Privacy in Social Networks, pp. 197–223. Springer, New York (2013)

    Chapter  Google Scholar 

  28. Ron, D., Shamir, A.: Quantitative analysis of the full bitcoin transaction graph. In: Sadeghi, A.-R. (ed.) FC 2013. LNCS, vol. 7859, pp. 6–24. Springer, Heidelberg (2013)

    Chapter  Google Scholar 

  29. Meni Rosenfeld. Overview of colored coins, December 2012. http://bitcoil.co.il/BitcoinX.pdf

  30. Wikipedia. Kimberley process certification scheme (2013). http://en.wikipedia.org/wiki/Kimberley_Process_Certification_Scheme

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Malte Möser .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 IFCA/Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Möser, M., Böhme, R., Breuker, D. (2014). Towards Risk Scoring of Bitcoin Transactions. In: Böhme, R., Brenner, M., Moore, T., Smith, M. (eds) Financial Cryptography and Data Security. FC 2014. Lecture Notes in Computer Science(), vol 8438. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-44774-1_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-44774-1_2

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-662-44773-4

  • Online ISBN: 978-3-662-44774-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics