Abstract
As Bitcoin’s blockchain allows third-party entities to track and analyse the transaction activity of Bitcoin users, external Privacy-Enhancing Technology services are created to satisfy the user demand for transaction privacy. These services are predominantly utilised as instruments in illegal activities. In this paper, we investigate one of the most prominent Privacy-Enhancing Technology services, Wasabi Wallet and its CoinJoin mixing function. We obtained Wasabi CoinJoin transactions for different time periods via published sources to observe the transaction patterns and changes in the obscuring mechanism. We propose a detection method derived from the discovered sets of transaction patterns. The results of our experiment show that the Wasabi Wallet has not substantially changed its CoinJoin mixing mechanism since the start of its operation and the majority of the Wasabi CoinJoin transactions are identifiable with significantly high precision. We also test the application of our detection method on several well-known cryptocurrency theft incidents and discover instances where the stolen Bitcoins directly reach the detected Wasabi CoinJoin Transactions.
Original language | English |
---|---|
Title of host publication | Proceedings of the 2022 European Interdisciplinary Cybersecurity Conference |
Publisher | Association for Computing Machinery |
Pages | 21–28 |
Number of pages | 8 |
ISBN (Print) | 9781450396035 |
DOIs | |
Publication status | Published - 21 Jul 2022 |
Event | European Interdisciplinary Cybersecurity Conference 2022 - Barcelona, Spain Duration: 15 Jun 2022 → 16 Jun 2022 https://www.fvv.um.si/eicc2022/ |
Conference
Conference | European Interdisciplinary Cybersecurity Conference 2022 |
---|---|
Abbreviated title | EICC 2022 |
Country/Territory | Spain |
City | Barcelona |
Period | 15/06/22 → 16/06/22 |
Internet address |
Keywords
- Bitcoin Tracking
- CoinJoin
- Cryptocurrency
- Forensic Analysis
- Privacy-Enhancing Technologies
ASJC Scopus subject areas
- Human-Computer Interaction
- Computer Networks and Communications
- Computer Vision and Pattern Recognition
- Software