-
Notifications
You must be signed in to change notification settings - Fork 4
/
Copy pathreferences.bib
4384 lines (3893 loc) · 161 KB
/
references.bib
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
% Encoding: UTF-8
@techreport{nakamoto2008bitcoin,
title={Bitcoin: A peer-to-peer electronic cash system},
author={Nakamoto, Satoshi},
year={2008},
url={\href{https://bitcoin.org/bitcoin.pdf}}
}
@Article{Biryukov2019,
author = {Alex Biryukov and Sergei Tikhomirov},
journal = {Pervasive Mob. Comput.},
title = {Security and privacy of mobile wallet users in Bitcoin, Dash, Monero, and Zcash},
year = {2019},
volume = {59},
bibsource = {dblp computer science bibliography, https://dblp.org},
biburl = {https://dblp.org/rec/journals/percom/BiryukovT19.bib},
doi = {10.1016/j.pmcj.2019.101030},
url = {https://hdl.handle.net/10993/39729},
}
@InProceedings{Biryukov2019a,
author = {Alex Biryukov and Sergei Tikhomirov},
booktitle = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2019, Stockholm, Sweden, June 17-19, 2019},
title = {Deanonymization and Linkability of Cryptocurrency Transactions Based on Network Analysis},
year = {2019},
pages = {172--184},
publisher = {{IEEE}},
bibsource = {dblp computer science bibliography, https://dblp.org},
biburl = {https://dblp.org/rec/conf/eurosp/BiryukovT19.bib},
doi = {10.1109/EuroSP.2019.00022},
url = {https://hdl.handle.net/10993/39724},
}
@InProceedings{Biryukov2019b,
author = {Alex Biryukov and Sergei Tikhomirov},
booktitle = {{IEEE} {INFOCOM} 2019 - {IEEE} Conference on Computer Communications Workshops, {INFOCOM} Workshops 2019, Paris, France, April 29 - May 2, 2019},
title = {Transaction Clustering Using Network Traffic Analysis for Bitcoin and Derived Blockchains},
year = {2019},
pages = {204--209},
publisher = {{IEEE}},
bibsource = {dblp computer science bibliography, https://dblp.org},
biburl = {https://dblp.org/rec/conf/infocom/BiryukovT19.bib},
doi = {10.1109/INFCOMW.2019.8845213},
url = {https://hdl.handle.net/10993/39728},
}
@InProceedings{Tikhomirov2018,
author = {Sergei Tikhomirov and Ekaterina Voskresenskaya and Ivan Ivanitskiy and Ramil Takhaviev and Evgeny Marchenko and Yaroslav Alexandrov},
booktitle = {1st {IEEE/ACM} International Workshop on Emerging Trends in Software Engineering for Blockchain, WETSEB@ICSE 2018, Gothenburg, Sweden, May 27 - June 3, 2018},
title = {SmartCheck: Static Analysis of Ethereum Smart Contracts},
year = {2018},
pages = {9--16},
publisher = {{ACM}},
bibsource = {dblp computer science bibliography, https://dblp.org},
biburl = {https://dblp.org/rec/conf/icse/TikhomirovVITMA18.bib},
url = {https://hdl.handle.net/10993/35862},
}
@InProceedings{Biryukov2017,
author = {Alex Biryukov and Dmitry Khovratovich and Sergei Tikhomirov},
booktitle = {Financial Cryptography and Data Security - {FC} 2017 International Workshops, WAHC, BITCOIN, VOTING, WTSC, and TA, Sliema, Malta, April 7, 2017, Revised Selected Papers},
title = {Findel: Secure Derivative Contracts for Ethereum},
year = {2017},
editor = {Michael Brenner and Kurt Rohloff and Joseph Bonneau and Andrew Miller and Peter Y. A. Ryan and Vanessa Teague and Andrea Bracciali and Massimiliano Sala and Federico Pintore and Markus Jakobsson},
pages = {453--467},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
volume = {10323},
bibsource = {dblp computer science bibliography, https://dblp.org},
biburl = {https://dblp.org/rec/conf/fc/BiryukovKT17.bib},
doi = {10.1007/978-3-319-70278-0_28},
url = {https://hdl.handle.net/10993/30975},
}
@InProceedings{Tikhomirov2017,
author = {Sergei Tikhomirov},
booktitle = {Foundations and Practice of Security - 10th International Symposium, {FPS} 2017, Nancy, France, October 23-25, 2017, Revised Selected Papers},
title = {Ethereum: State of Knowledge and Research Perspectives},
year = {2017},
editor = {Abdessamad Imine and Jos{\'{e}} M. Fernandez and Jean{-}Yves Marion and Luigi Logrippo and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro},
pages = {206--221},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
volume = {10723},
bibsource = {dblp computer science bibliography, https://dblp.org},
biburl = {https://dblp.org/rec/conf/fps/Tikhomirov17.bib},
doi = {10.1007/978-3-319-75650-9_14},
url = {https://hdl.handle.net/10993/32468},
}
@Misc{Nakamoto2008,
author = {Satoshi Nakamoto},
howpublished = {The Cryptography Mailing List},
title = {Governments are good at cutting off the heads of a centrally controlled networks like Napster...},
year = {2008},
timestamp = {2020-03-27},
url = {https://www.metzdowd.com/pipermail/cryptography/2008-November/014823.html},
}
@Article{Saroiu2003,
author = {Stefan Saroiu and P. Krishna Gummadi and Steven D. Gribble},
journal = {Multimedia Syst.},
title = {Measuring and analyzing the characteristics of Napster and Gnutella hosts},
year = {2003},
number = {2},
pages = {170--184},
volume = {9},
bibsource = {dblp computer science bibliography, https://dblp.org},
biburl = {https://dblp.org/rec/journals/mms/SaroiuGG03.bib},
doi = {10.1007/s00530-003-0088-1},
}
@InProceedings{Maymounkov2002,
author = {Petar Maymounkov and David Mazi{\`{e}}res},
booktitle = {Peer-to-Peer Systems, First International Workshop, {IPTPS} 2002, Cambridge, MA, USA, March 7-8, 2002, Revised Papers},
title = {Kademlia: {A} Peer-to-Peer Information System Based on the {XOR} Metric},
year = {2002},
editor = {Peter Druschel and M. Frans Kaashoek and Antony I. T. Rowstron},
pages = {53--65},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
volume = {2429},
bibsource = {dblp computer science bibliography, https://dblp.org},
biburl = {https://dblp.org/rec/conf/iptps/MaymounkovM02.bib},
doi = {10.1007/3-540-45748-8_5},
}
@Article{Rehn2004,
author = {Rehn, Alf},
journal = {The journal of socio-economics},
title = {The politics of contraband: The honor economies of the warez scene},
year = {2004},
number = {3},
pages = {359--374},
volume = {33},
publisher = {Elsevier},
}
@InProceedings{Pouwelse2005,
author = {Johan A. Pouwelse and Pawel Garbacki and Dick H. J. Epema and Henk J. Sips},
booktitle = {Peer-to-Peer Systems IV, 4th International Workshop, {IPTPS} 2005, Ithaca, NY, USA, February 24-25, 2005, Revised Selected Papers},
title = {The Bittorrent {P2P} File-Sharing System: Measurements and Analysis},
year = {2005},
editor = {Miguel Castro and Robbert van Renesse},
pages = {205--216},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
volume = {3640},
bibsource = {dblp computer science bibliography, https://dblp.org},
biburl = {https://dblp.org/rec/conf/iptps/PouwelseGES05.bib},
doi = {10.1007/11558989_19},
}
@Misc{Core2015,
author = {Bitcoin Core},
month = feb,
title = {Bitcoin Core version 0.10.0 released},
year = {2015},
timestamp = {2020-04-08},
url = {https://bitcoin.org/en/release/v0.10.0},
}
@Misc{Core2016,
author = {Bitcoin Core},
month = jun,
title = {Compact Blocks FAQ},
year = {2016},
url = {https://bitcoincore.org/en/2016/06/07/compact-blocks-faq/},
}
@Misc{FIBRE,
author = {FIBRE},
title = {The Fast Internet Bitcoin Relay Engine},
url = {https://bitcoinfibre.org/},
}
@Misc{FALCON,
author = {FALCON},
title = {The Falcon Project},
url = {https://www.falcon-net.org/},
}
@InProceedings{Kroll2013,
author = {Joshua Kroll and Ian Davey and Edward Felten},
booktitle = {Proceedings of WEIS},
title = {The Economics of Bitcoin Mining, or Bitcoin in the Presence of Adversaries},
year = {2013},
url = {https://www.econinfosec.org/archive/weis2013/papers/KrollDaveyFeltenWEIS2013.pdf},
}
@InProceedings{Yoshida2012,
author = {Masahiro Yoshida and Akihiro Nakao},
booktitle = {2012 Seventh International Conference on P2P, Parallel, Grid, Cloud and Internet Computing, 3PGCIC 2012, Victoria, BC, Canada, November 12-14, 2012},
title = {{BPEX:} Localizing BitTorrent Traffic via Biased Peer Exchange},
year = {2012},
editor = {Fatos Xhafa and Leonard Barolli and Kin Fun Li},
pages = {41--48},
publisher = {{IEEE}},
bibsource = {dblp computer science bibliography, https://dblp.org},
biburl = {https://dblp.org/rec/conf/3pgcic/YoshidaN12.bib},
doi = {10.1109/3PGCIC.2012.15},
}
@InProceedings{Wang2012,
author = {Haiyang Wang and Feng Wang and Jiangchuan Liu and Ke Xu},
booktitle = {{NETWORKING} 2012 - 11th International {IFIP} {TC} 6 Networking Conference, Prague, Czech Republic, May 21-25, 2012, Proceedings, Part {II}},
title = {Enhancing Traffic Locality in BitTorrent via Shared Trackers},
year = {2012},
editor = {Robert Bestak and Lukas Kencl and Li Erran Li and Joerg Widmer and Hao Yin},
pages = {59--70},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
volume = {7290},
bibsource = {dblp computer science bibliography, https://dblp.org},
biburl = {https://dblp.org/rec/conf/networking/WangWLX12.bib},
doi = {10.1007/978-3-642-30054-7_5},
}
@Misc{Blockstream,
author = {Blockstream},
title = {Broadcast raw transaction (hex)},
url = {https://blockstream.info/tx/push},
}
@Misc{Bode2018,
author = {Karl Bode},
howpublished = {Vice},
month = oct,
title = {The Rise of Netflix Competitors Has Pushed Consumers Back Toward Piracy},
year = {2018},
timestamp = {2020-04-08},
url = {https://www.vice.com/en_us/article/d3q45v/bittorrent-usage-increases-netflix-streaming-sites},
}
@InProceedings{BenSasson2014,
author = {Eli Ben{-}Sasson and Alessandro Chiesa and Christina Garman and Matthew Green and Ian Miers and Eran Tromer and Madars Virza},
booktitle = {2014 {IEEE} Symposium on Security and Privacy, {SP} 2014, Berkeley, CA, USA, May 18-21, 2014},
title = {Zerocash: Decentralized Anonymous Payments from Bitcoin},
year = {2014},
pages = {459--474},
publisher = {{IEEE} Computer Society},
bibsource = {dblp computer science bibliography, https://dblp.org},
biburl = {https://dblp.org/rec/conf/sp/Ben-SassonCG0MTV14.bib},
doi = {10.1109/SP.2014.36},
}
@Article{Lou2006,
author = {Lou, Xiaosong and Hwang, Kai and others},
journal = {IEEE Transaction on Computers},
title = {Adaptive content poisoning to prevent illegal file distribution in P2P networks},
year = {2006},
}
@InProceedings{Rumin2010,
author = {Rub{\'{e}}n Cuevas Rum{\'{\i}}n and Michal Kryczka and {\'{A}}ngel Cuevas and Sebastian Kaune and Carmen Guerrero and Reza Rejaie},
booktitle = {Proceedings of the 2010 {ACM} Conference on Emerging Networking Experiments and Technology, CoNEXT 2010, Philadelphia, PA, USA, November 30 - December 03, 2010},
title = {Is content publishing in BitTorrent altruistic or profit-driven?},
year = {2010},
editor = {Jaudelice Cavalcante de Oliveira and Maximilian Ott and Timothy G. Griffin and Muriel M{\'{e}}dard},
pages = {11},
publisher = {{ACM}},
bibsource = {dblp computer science bibliography, https://dblp.org},
biburl = {https://dblp.org/rec/conf/conext/RuminKCKGR10.bib},
doi = {10.1145/1921168.1921183},
}
@Article{Eyal2018,
author = {Ittay Eyal and Emin G{\"{u}}n Sirer},
journal = {Commun. {ACM}},
title = {Majority is not enough: bitcoin mining is vulnerable},
year = {2018},
number = {7},
pages = {95--102},
volume = {61},
bibsource = {dblp computer science bibliography, https://dblp.org},
biburl = {https://dblp.org/rec/journals/cacm/EyalS18.bib},
doi = {10.1145/3212998},
}
@InProceedings{Biryukov2014,
author = {Alex Biryukov and Dmitry Khovratovich and Ivan Pustogarov},
booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014},
title = {Deanonymisation of Clients in Bitcoin {P2P} Network},
year = {2014},
editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li},
pages = {15--29},
publisher = {{ACM}},
bibsource = {dblp computer science bibliography, https://dblp.org},
biburl = {https://dblp.org/rec/conf/ccs/BiryukovKP14.bib},
doi = {10.1145/2660267.2660379},
}
@InProceedings{Koshy2014,
author = {Philip Koshy and Diana Koshy and Patrick D. McDaniel},
booktitle = {Financial Cryptography and Data Security - 18th International Conference, {FC} 2014, Christ Church, Barbados, March 3-7, 2014, Revised Selected Papers},
title = {An Analysis of Anonymity in Bitcoin Using {P2P} Network Traffic},
year = {2014},
editor = {Nicolas Christin and Reihaneh Safavi{-}Naini},
pages = {469--485},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
volume = {8437},
bibsource = {dblp computer science bibliography, https://dblp.org},
biburl = {https://dblp.org/rec/conf/fc/KoshyKM14.bib},
doi = {10.1007/978-3-662-45472-5_30},
}
@Misc{Zcash,
author = {Zcash},
title = {Zcash official website.},
url = {https://z.cash/},
}
@Misc{Hopwood2020,
author = {Diara Hopwood and Sean Bowe and Taylor Hornby and Nathan Wilcox},
month = mar,
title = {Zcash protocol specification},
year = {2020},
url = {https://github.com/zcash/zips/blob/master/protocol/protocol.pdf},
}
@InProceedings{Miers2013,
author = {Ian Miers and Christina Garman and Matthew Green and Aviel D. Rubin},
booktitle = {2013 {IEEE} Symposium on Security and Privacy, {SP} 2013, Berkeley, CA, USA, May 19-22, 2013},
title = {Zerocoin: Anonymous Distributed E-Cash from Bitcoin},
year = {2013},
pages = {397--411},
publisher = {{IEEE} Computer Society},
bibsource = {dblp computer science bibliography, https://dblp.org},
biburl = {https://dblp.org/rec/conf/sp/MiersG0R13.bib},
doi = {10.1109/SP.2013.34},
}
@InProceedings{BenSasson2014a,
author = {Eli Ben{-}Sasson and Alessandro Chiesa and Eran Tromer and Madars Virza},
booktitle = {Proceedings of the 23rd {USENIX} Security Symposium, San Diego, CA, USA, August 20-22, 2014},
title = {Succinct Non-Interactive Zero Knowledge for a von Neumann Architecture},
year = {2014},
editor = {Kevin Fu and Jaeyeon Jung},
pages = {781--796},
publisher = {{USENIX} Association},
bibsource = {dblp computer science bibliography, https://dblp.org},
biburl = {https://dblp.org/rec/conf/uss/Ben-SassonCTV14.bib},
url = {https://www.usenix.org/conference/usenixsecurity14/technical-sessions/presentation/ben-sasson},
}
@InProceedings{Kappos2018,
author = {George Kappos and Haaroon Yousaf and Mary Maller and Sarah Meiklejohn},
booktitle = {27th {USENIX} Security Symposium, {USENIX} Security 2018, Baltimore, MD, USA, August 15-17, 2018},
title = {An Empirical Analysis of Anonymity in Zcash},
year = {2018},
editor = {William Enck and Adrienne Porter Felt},
pages = {463--477},
publisher = {{USENIX} Association},
bibsource = {dblp computer science bibliography, https://dblp.org},
biburl = {https://dblp.org/rec/conf/uss/KapposYMM18.bib},
url = {https://www.usenix.org/conference/usenixsecurity18/presentation/kappos},
}
@Misc{Wuille,
author = {Pieter Wuille},
month = nov,
title = {Replace global trickle node with random delays},
year = {2015},
url = {https://github.com/bitcoin/bitcoin/pull/7125},
}
@Article{Fanti2017,
author = {Giulia C. Fanti and Pramod Viswanath},
journal = {CoRR},
title = {Anonymity Properties of the Bitcoin {P2P} Network},
year = {2017},
volume = {abs/1703.08761},
bibsource = {dblp computer science bibliography, https://dblp.org},
biburl = {https://dblp.org/rec/journals/corr/FantiV17.bib},
url = {https://arxiv.org/abs/1703.08761},
}
@Misc{Zcash2018,
author = {Zcash},
month = oct,
title = {Sapling},
year = {2018},
url = {https://z.cash/upgrade/sapling/},
}
@Misc{Dash,
author = {Dash},
title = {Dash website},
url = {https://www.dash.org/},
}
@Misc{Monero,
author = {Monero},
title = {Monero website},
url = {https://web.getmonero.org/},
}
@Misc{Saberhagen2013,
author = {Nicolas Van Saberhagen},
title = {CryptoNote v 2.0},
year = {2013},
url = {https://cryptonote.org/whitepaper.pdf},
}
@Misc{user36432017,
author = {user3643},
month = oct,
title = {Is Monero in I2P secure now, and how do I do it?},
year = {2017},
url = {https://monero.stackexchange.com/q/6264/4089},
}
@Misc{manontheinside2016,
author = {manontheinside},
month = nov,
title = {Does Monero protect against timing analysis?},
year = {2016},
url = {https://monero.stackexchange.com/q/2765/4089},
}
@Misc{expez2016,
author = {expez},
month = sep,
title = {In what ways can a wallet connected to a malicious remote node be abused?},
year = {2016},
url = {https://monero.stackexchange.com/q/2962/4089},
}
@Misc{Cameron2016,
author = {James Cameron},
month = sep,
title = {What privacy issues did Monero have and still has?},
year = {2016},
url = {https://monero.stackexchange.com/q/1495/4089},
}
@Misc{Kovri,
author = {Kovri},
title = {The Kovri Project},
url = {https://gitlab.com/kovri-project/kovri},
}
@Misc{user363032016,
author = {user36303},
month = aug,
title = {A node will connect to up to 8 peers by default...},
year = {2016},
url = {https://monero.stackexchange.com/a/1127/4089},
}
@Misc{Spagni2018,
author = {Riccardo Spagni},
month = oct,
title = {Monero 0.13.0 "Beryllium Bullet" Release},
year = {2018},
url = {https://www.getmonero.org/2018/10/11/monero-0.13.0-released.html},
}
@Misc{Pustogarov2017,
author = {Ivan Pustogarov},
title = {Bitcoin Network Probing Tool},
year = {2017},
url = {https://github.com/ivanpustogarov/bcclient},
urldate = {2018-01-31},
}
@InProceedings{Dhillon2001,
author = {Inderjit S. Dhillon},
booktitle = {Proceedings of the seventh {ACM} {SIGKDD} international conference on Knowledge discovery and data mining, San Francisco, CA, USA, August 26-29, 2001},
title = {Co-clustering documents and words using bipartite spectral graph partitioning},
year = {2001},
editor = {Doheon Lee and Mario Schkolnick and Foster J. Provost and Ramakrishnan Srikant},
pages = {269--274},
publisher = {{ACM}},
bibsource = {dblp computer science bibliography, https://dblp.org},
biburl = {https://dblp.org/rec/conf/kdd/Dhillon01.bib},
url = {https://portal.acm.org/citation.cfm?id=502512.502550},
}
@Misc{scikitlearn2018,
author = {scikit-learn},
title = {Biclustering},
year = {2018},
url = {https://scikit-learn.org/stable/modules/biclustering.html},
urldate = {2018-07-19},
}
@Article{Amigo2009,
author = {Enrique Amig{\'{o}} and Julio Gonzalo and Javier Artiles and Felisa Verdejo},
journal = {Inf. Retr.},
title = {A comparison of extrinsic clustering evaluation metrics based on formal constraints},
year = {2009},
number = {4},
pages = {461--486},
volume = {12},
bibsource = {dblp computer science bibliography, https://dblp.org},
biburl = {https://dblp.org/rec/journals/ir/AmigoGAV09.bib},
doi = {10.1007/s10791-008-9066-8},
}
@InProceedings{Diaz2002,
author = {Claudia D{\'{\i}}az and Stefaan Seys and Joris Claessens and Bart Preneel},
booktitle = {Privacy Enhancing Technologies, Second International Workshop, {PET} 2002, San Francisco, CA, USA, April 14-15, 2002, Revised Papers},
title = {Towards Measuring Anonymity},
year = {2002},
editor = {Roger Dingledine and Paul F. Syverson},
pages = {54--68},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
volume = {2482},
bibsource = {dblp computer science bibliography, https://dblp.org},
biburl = {https://dblp.org/rec/conf/pet/DiazSCP02.bib},
doi = {10.1007/3-540-36467-6_5},
}
@Misc{Schinzel2015,
author = {Holger Schinzel and UdjinM6},
title = {Dash 0.12.0 Release notes},
year = {2015},
url = {https://github.com/dashpay/dash/blob/master/doc/release-notes/dash/release-notes-0.12.0.md},
}
@Article{Kalodner2017,
author = {Harry A. Kalodner and Steven Goldfeder and Alishah Chator and Malte M{\"{o}}ser and Arvind Narayanan},
journal = {CoRR},
title = {BlockSci: Design and applications of a blockchain analysis platform},
year = {2017},
volume = {abs/1709.02489},
bibsource = {dblp computer science bibliography, https://dblp.org},
biburl = {https://dblp.org/rec/journals/corr/abs-1709-02489.bib},
url = {https://arxiv.org/abs/1709.02489},
}
@Misc{dpzz2017,
author = {dpzz},
month = jan,
title = {What's the difference between “balance” and “unlocked balance”?},
year = {2017},
url = {https://monero.stackexchange.com/q/3262/4089},
}
@Misc{MoneroHash,
author = {MoneroHash},
title = {Monero Active Nodes Distribution},
url = {https://monerohash.com/nodes-distribution.html},
}
@Misc{BitcoinWiki,
author = {BitcoinWiki},
title = {Bitcoin protocol documentation},
url = {https://en.bitcoin.it/wiki/Protocol_documentation},
}
@Misc{Zeyde2018,
author = {Roman Zeyde},
title = {Bitcoin Full Node on {AWS} Free Tier},
year = {2018},
url = {https://gist.github.com/romanz/17ff716f13a34df49ff4},
}
@Misc{Connell2017,
author = {Justin Connell},
title = {How Much Does it Cost to Run a Full {Bitcoin} Node?},
year = {2017},
url = {https://news.bitcoin.com/cost-full-bitcoin-node/},
}
@Misc{Tor,
author = {Tor},
title = {Tor website},
url = {https://www.torproject.org/},
}
@InProceedings{Piotrowska2017,
author = {Ania M. Piotrowska and Jamie Hayes and Tariq Elahi and Sebastian Meiser and George Danezis},
booktitle = {26th {USENIX} Security Symposium, {USENIX} Security 2017, Vancouver, BC, Canada, August 16-18, 2017},
title = {The Loopix Anonymity System},
year = {2017},
editor = {Engin Kirda and Thomas Ristenpart},
pages = {1199--1216},
publisher = {{USENIX} Association},
bibsource = {dblp computer science bibliography, https://dblp.org},
biburl = {https://dblp.org/rec/conf/uss/PiotrowskaHEMD17.bib},
url = {https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/piotrowska},
}
@InProceedings{Biryukov2015,
author = {Alex Biryukov and Ivan Pustogarov},
booktitle = {2015 {IEEE} Symposium on Security and Privacy, {SP} 2015, San Jose, CA, USA, May 17-21, 2015},
title = {Bitcoin over Tor isn't a Good Idea},
year = {2015},
pages = {122--134},
publisher = {{IEEE} Computer Society},
bibsource = {dblp computer science bibliography, https://dblp.org},
biburl = {https://dblp.org/rec/conf/sp/BiryukovP15.bib},
doi = {10.1109/SP.2015.15},
}
@Misc{BitcoinWallet,
title = {Bitcoin Wallet},
url = {https://bitcoin.org/en/wallets/mobile/android/bitcoinwallet/},
}
@InProceedings{Venkatakrishnan2017,
author = {Shaileshh Bojja Venkatakrishnan and Giulia C. Fanti and Pramod Viswanath},
booktitle = {Proceedings of the 2017 {ACM} {SIGMETRICS} / International Conference on Measurement and Modeling of Computer Systems, Urbana-Champaign, IL, USA, June 05 - 09, 2017},
title = {Dandelion: Redesigning the Bitcoin Network for Anonymity},
year = {2017},
editor = {Bruce E. Hajek and Sewoong Oh and Augustin Chaintreau and Leana Golubchik and Zhi{-}Li Zhang},
pages = {57},
publisher = {{ACM}},
bibsource = {dblp computer science bibliography, https://dblp.org},
biburl = {https://dblp.org/rec/conf/sigmetrics/Venkatakrishnan17.bib},
doi = {10.1145/3078505.3078528},
}
@InProceedings{Fanti2018,
author = {Giulia C. Fanti and Shaileshh Bojja Venkatakrishnan and Surya Bakshi and Bradley Denby and Shruti Bhargava and Andrew Miller and Pramod Viswanath},
booktitle = {Abstracts of the 2018 {ACM} International Conference on Measurement and Modeling of Computer Systems, {SIGMETRICS} 2018, Irvine, CA, USA, June 18-22, 2018},
title = {Dandelion++: Lightweight Cryptocurrency Networking with Formal Anonymity Guarantees},
year = {2018},
editor = {Konstantinos Psounis and Aditya Akella and Adam Wierman},
pages = {5--7},
publisher = {{ACM}},
bibsource = {dblp computer science bibliography, https://dblp.org},
biburl = {https://dblp.org/rec/conf/sigmetrics/FantiVBDBMV18.bib},
doi = {10.1145/3219617.3219620},
}
@Article{Meiklejohn2013,
author = {Sarah Meiklejohn and Marjori Pomarole and Grant Jordan and Kirill Levchenko and Damon McCoy and Geoffrey M. Voelker and Stefan Savage},
journal = {login Usenix Mag.},
title = {A Fistful of Bitcoins: Characterizing Payments Among Men with No Names},
year = {2013},
number = {6},
volume = {38},
bibsource = {dblp computer science bibliography, https://dblp.org},
biburl = {https://dblp.org/rec/journals/usenix-login/MeiklejohnPJLMV13.bib},
url = {https://www.usenix.org/publications/login/december-2013-volume-38-number-6/fistful-bitcoins-characterizing-payments-among},
}
@Article{Ober2013,
author = {Micha Ober and Stefan Katzenbeisser and Kay Hamacher},
journal = {Future Internet},
title = {Structure and Anonymity of the Bitcoin Transaction Graph},
year = {2013},
number = {2},
pages = {237--250},
volume = {5},
bibsource = {dblp computer science bibliography, https://dblp.org},
biburl = {https://dblp.org/rec/journals/fi/OberKH13.bib},
doi = {10.3390/fi5020237},
}
@InProceedings{Ron2013,
author = {Dorit Ron and Adi Shamir},
booktitle = {Financial Cryptography and Data Security - 17th International Conference, {FC} 2013, Okinawa, Japan, April 1-5, 2013, Revised Selected Papers},
title = {Quantitative Analysis of the Full Bitcoin Transaction Graph},
year = {2013},
editor = {Ahmad{-}Reza Sadeghi},
pages = {6--24},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
volume = {7859},
bibsource = {dblp computer science bibliography, https://dblp.org},
biburl = {https://dblp.org/rec/conf/fc/RonS13.bib},
doi = {10.1007/978-3-642-39884-1_2},
}
@InProceedings{Reid2011,
author = {Fergal Reid and Martin Harrigan},
booktitle = {PASSAT/SocialCom 2011, Privacy, Security, Risk and Trust (PASSAT), 2011 {IEEE} Third International Conference on and 2011 {IEEE} Third International Conference on Social Computing (SocialCom), Boston, MA, USA, 9-11 Oct., 2011},
title = {An Analysis of Anonymity in the Bitcoin System},
year = {2011},
pages = {1318--1326},
publisher = {{IEEE} Computer Society},
bibsource = {dblp computer science bibliography, https://dblp.org},
biburl = {https://dblp.org/rec/conf/socialcom/ReidH11.bib},
doi = {10.1109/PASSAT/SocialCom.2011.79},
}
@InProceedings{Androulaki2013,
author = {Elli Androulaki and Ghassan Karame and Marc Roeschlin and Tobias Scherer and Srdjan Capkun},
booktitle = {Financial Cryptography and Data Security - 17th International Conference, {FC} 2013, Okinawa, Japan, April 1-5, 2013, Revised Selected Papers},
title = {Evaluating User Privacy in Bitcoin},
year = {2013},
editor = {Ahmad{-}Reza Sadeghi},
pages = {34--51},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
volume = {7859},
bibsource = {dblp computer science bibliography, https://dblp.org},
biburl = {https://dblp.org/rec/conf/fc/AndroulakiKRSC13.bib},
doi = {10.1007/978-3-642-39884-1_4},
}
@InProceedings{Bonneau2014,
author = {Joseph Bonneau and Arvind Narayanan and Andrew Miller and Jeremy Clark and Joshua A. Kroll and Edward W. Felten},
booktitle = {Financial Cryptography and Data Security - 18th International Conference, {FC} 2014, Christ Church, Barbados, March 3-7, 2014, Revised Selected Papers},
title = {Mixcoin: Anonymity for Bitcoin with Accountable Mixes},
year = {2014},
editor = {Nicolas Christin and Reihaneh Safavi{-}Naini},
pages = {486--504},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
volume = {8437},
bibsource = {dblp computer science bibliography, https://dblp.org},
biburl = {https://dblp.org/rec/conf/fc/BonneauNMCKF14.bib},
doi = {10.1007/978-3-662-45472-5_31},
}
@InProceedings{Valenta2015,
author = {Luke Valenta and Brendan Rowan},
booktitle = {Financial Cryptography and Data Security - {FC} 2015 International Workshops, BITCOIN, WAHC, and Wearable, San Juan, Puerto Rico, January 30, 2015, Revised Selected Papers},
title = {Blindcoin: Blinded, Accountable Mixes for Bitcoin},
year = {2015},
editor = {Michael Brenner and Nicolas Christin and Benjamin Johnson and Kurt Rohloff},
pages = {112--126},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
volume = {8976},
bibsource = {dblp computer science bibliography, https://dblp.org},
biburl = {https://dblp.org/rec/conf/fc/ValentaR15.bib},
doi = {10.1007/978-3-662-48051-9_9},
}
@InProceedings{Ruffing2014,
author = {Tim Ruffing and Pedro Moreno{-}Sanchez and Aniket Kate},
booktitle = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part {II}},
title = {CoinShuffle: Practical Decentralized Coin Mixing for Bitcoin},
year = {2014},
editor = {Miroslaw Kutylowski and Jaideep Vaidya},
pages = {345--364},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
volume = {8713},
bibsource = {dblp computer science bibliography, https://dblp.org},
biburl = {https://dblp.org/rec/conf/esorics/RuffingMK14.bib},
doi = {10.1007/978-3-319-11212-1_20},
}
@Misc{Maxwell2013,
author = {Gregory Maxwell},
title = {CoinJoin: Bitcoin privacy for the real world},
year = {2013},
url = {https://bitcointalk.org/index.php?topic=279249},
}
@Article{Quesnelle2017,
author = {Jeffrey Quesnelle},
journal = {CoRR},
title = {On the linkability of Zcash transactions},
year = {2017},
volume = {abs/1712.01210},
bibsource = {dblp computer science bibliography, https://dblp.org},
biburl = {https://dblp.org/rec/journals/corr/abs-1712-01210.bib},
url = {https://arxiv.org/abs/1712.01210},
}
@Misc{Miller2015,
author = {Andrew Miller and James Litton and Andrew Pachulski and Neal Gupta and Dave Levin and Neil Spring and Bobby Bhattacharjee},
title = {Discovering {Bitcoin}’s public topology and influential nodes},
year = {2015},
url = {https://www.cs.umd.edu/projects/coinscope/coinscope.pdf},
}
@InProceedings{Neudecker2016,
author = {Till Neudecker and Philipp Andelfinger and Hannes Hartenstein},
booktitle = {2016 Intl {IEEE} Conferences on Ubiquitous Intelligence {\&} Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People, and Smart World Congress (UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld), Toulouse, France, July 18-21, 2016},
title = {Timing Analysis for Inferring the Topology of the Bitcoin Peer-to-Peer Network},
year = {2016},
pages = {358--367},
publisher = {{IEEE} Computer Society},
bibsource = {dblp computer science bibliography, https://dblp.org},
biburl = {https://dblp.org/rec/conf/uic/NeudeckerAH16.bib},
doi = {10.1109/UIC-ATC-ScalCom-CBDCom-IoP-SmartWorld.2016.0070},
}
@Article{Wang2017,
author = {Liang Wang and Ivan Pustogarov},
journal = {CoRR},
title = {Towards Better Understanding of Bitcoin Unreachable Peers},
year = {2017},
volume = {abs/1709.06837},
bibsource = {dblp computer science bibliography, https://dblp.org},
biburl = {https://dblp.org/rec/journals/corr/abs-1709-06837.bib},
url = {https://arxiv.org/abs/1709.06837},
}
@InProceedings{Neudecker2017,
author = {Till Neudecker and Hannes Hartenstein},
booktitle = {Financial Cryptography and Data Security - {FC} 2017 International Workshops, WAHC, BITCOIN, VOTING, WTSC, and TA, Sliema, Malta, April 7, 2017, Revised Selected Papers},
title = {Could Network Information Facilitate Address Clustering in Bitcoin?},
year = {2017},
editor = {Michael Brenner and Kurt Rohloff and Joseph Bonneau and Andrew Miller and Peter Y. A. Ryan and Vanessa Teague and Andrea Bracciali and Massimiliano Sala and Federico Pintore and Markus Jakobsson},
pages = {155--169},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
volume = {10323},
bibsource = {dblp computer science bibliography, https://dblp.org},
biburl = {https://dblp.org/rec/conf/fc/NeudeckerH17.bib},
doi = {10.1007/978-3-319-70278-0_9},
}
@InProceedings{Gervais2014,
author = {Arthur Gervais and Srdjan Capkun and Ghassan O. Karame and Damian Gruber},
booktitle = {Proceedings of the 30th Annual Computer Security Applications Conference, {ACSAC} 2014, New Orleans, LA, USA, December 8-12, 2014},
title = {On the privacy provisions of Bloom filters in lightweight bitcoin clients},
year = {2014},
editor = {Charles N. Payne Jr. and Adam Hahn and Kevin R. B. Butler and Micah Sherr},
pages = {326--335},
publisher = {{ACM}},
bibsource = {dblp computer science bibliography, https://dblp.org},
biburl = {https://dblp.org/rec/conf/acsac/GervaisCKG14.bib},
doi = {10.1145/2664243.2664267},
}
@Misc{Bitnodes,
author = {Bitnodes},
title = {Global Bitcoin nodes distribution},
url = {https://bitnodes.earn.com/},
}
@Misc{Walletexplorer,
author = {Walletexplorer},
title = {Bitcoin block explorer with address grouping and wallet labeling},
url = {https://www.walletexplorer.com/},
}
@Misc{Android,
author = {Android},
title = {Permissions overview},
url = {https://developer.android.com/guide/topics/permissions/overview},
}
@InProceedings{Arzt2014,
author = {Steven Arzt and Siegfried Rasthofer and Christian Fritz and Eric Bodden and Alexandre Bartel and Jacques Klein and Yves Le Traon and Damien Octeau and Patrick D. McDaniel},
booktitle = {{ACM} {SIGPLAN} Conference on Programming Language Design and Implementation, {PLDI} '14, Edinburgh, United Kingdom - June 09 - 11, 2014},
title = {FlowDroid: precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for Android apps},
year = {2014},
editor = {Michael F. P. O'Boyle and Keshav Pingali},
pages = {259--269},
publisher = {{ACM}},
bibsource = {dblp computer science bibliography, https://dblp.org},
biburl = {https://dblp.org/rec/conf/pldi/ArztRFBBKTOM14.bib},
doi = {10.1145/2594291.2594299},
}
@Misc{FlowDroid,
author = {FlowDroid},
title = {FlowDroid Static Data Flow Tracker (source code)},
url = {https://github.com/secure-software-engineering/FlowDroid/},
}
@Misc{SmartDec2018,
author = {SmartDec},
title = {SmartDec Scanner},
year = {2018},
url = {https://smartdecscanner.com/},
}
@Misc{InternationalSettlements2016,
author = {Bank for International Settlements},
month = nov,
title = {OTC derivatives statisticsat end-June 2016},
year = {2016},
url = {https://www.bis.org/publ/otc_hy1611.pdf},
}
@Misc{WorldBank,
title = {World Bank. Gross domestic product},
url = {https://databank.worldbank.org/data/download/GDP.pdf},
}
@InProceedings{PeytonJones2000,
author = {Simon L. {Peyton Jones} and Jean{-}Marc Eber and Julian Seward},
booktitle = {Proceedings of the Fifth {ACM} {SIGPLAN} International Conference on Functional Programming {(ICFP} '00), Montreal, Canada, September 18-21, 2000},
title = {Composing contracts: an adventure in financial engineering, functional pearl},
year = {2000},
editor = {Martin Odersky and Philip Wadler},
pages = {280--292},
publisher = {{ACM}},
bibsource = {dblp computer science bibliography, https://dblp.org},
biburl = {https://dblp.org/rec/conf/icfp/JonesES00.bib},
doi = {10.1145/351240.351267},
}
@InProceedings{Gaillourdet2011,
author = {Gaillourdet, Dipl-Inf Jean-Marie},
booktitle = {CEUR Workshop Proceedings},
title = {A software language approach to derivative contracts in finance},
year = {2011},
pages = {39--43},
volume = {750},
url = {https://softech.cs.uni-kl.de/homepage/publications/Gaillourdet11software.pdf},
}
@MastersThesis{Schuldenzucker2014,
author = {Schuldenzucker, Steffen},
school = {University of Bonn},
title = {Decomposing contracts},
year = {2014},
url = {https://www.ifi.uzh.ch/ce/people/schuldenzucker/decomposingcontracts.pdf},
}
@Article{Frankau2009,
author = {Frankau, Simon and Spinellis, Diomidis and Nassuphis, Nick and Burgard, Christoph},
journal = {Journal of Functional Programming},
title = {Commercial uses: Going functional on exotic trades},
year = {2009},
number = {1},
pages = {27--45},
volume = {19},
publisher = {Cambridge University Press},
url = {http://arbitrary.name/papers/fpf.pdf},
}
@Article{Szabo1997,
author = {Nick Szabo},
journal = {First Monday},
title = {Formalizing and Securing Relationships on Public Networks},
year = {1997},
number = {9},
volume = {2},
bibsource = {dblp computer science bibliography, https://dblp.org},
biburl = {https://dblp.org/rec/journals/firstmonday/Szabo97.bib},
url = {https://firstmonday.org/ojs/index.php/fm/article/view/548},
}
@Misc{Castillo2016,
author = {Michael del Castillo},
month = oct,
title = {JP Morgan, Credit Suisse Among 8 in Latest Bank Blockchain Test},
year = {2016},
url = {https://www.coindesk.com/jp-morgan-credit-suisse-among-8-in-latest-bank-blockchain-test/},
}
@InProceedings{Atzei2017,
author = {Nicola Atzei and Massimo Bartoletti and Tiziana Cimoli},
booktitle = {Principles of Security and Trust - 6th International Conference, {POST} 2017, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2017, Uppsala, Sweden, April 22-29, 2017, Proceedings},
title = {A Survey of Attacks on Ethereum Smart Contracts (SoK)},
year = {2017},
editor = {Matteo Maffei and Mark Ryan},
pages = {164--186},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
volume = {10204},
bibsource = {dblp computer science bibliography, https://dblp.org},
biburl = {https://dblp.org/rec/conf/post/AtzeiBC17.bib},
doi = {10.1007/978-3-662-54455-6_8},
}
@Misc{Sirer2016,
author = {Emin G{\"{u}}n Sirer},
title = {Thoughts on The DAO Hack},
year = {2016},
url = {https://hackingdistributed.com/2016/06/17/thoughts-on-the-dao-hack/},
}
@Misc{Buterin2014,
author = {Vitalik Buterin},
title = {A Next-Generation Smart Contract and Decentralized Application Platform},
year = {2014},
url = {https://github.com/ethereum/wiki/wiki/White-Paper},
}
@Misc{Wood2014,
author = {Gavin Wood},
title = {Ethereum: A secure decentralised generalised transaction ledger},
year = {2014},
url = {https://ethereum.github.io/yellowpaper/paper.pdf},
}
@Misc{Greenspan2016,
author = {Gideon Greenspan},
title = {Why Many Smart Contract Use Cases Are Simply Impossible},
year = {2016},
url = {https://www.coindesk.com/three-smart-contract-misconceptions},
}
@Misc{Provable,
author = {Provable},
title = {The Provable blockchain oracle for modern DApps},
url = {https://provable.xyz/},
}
@Misc{TLSNotary,
author = {TLSNotary},
title = {A new kind of auditing - cryptographic proof of online accounts},
url = {https://tlsnotary.org/},
}
@Misc{Realitio,
author = {Realitio},
title = {Crowd-sourced verification for smart contracts},
url = {https://realit.io/},
}
@Article{Fromknecht2014,