An Empirical Analysis of Traceability in the Monero Blockchain

Open access

Abstract

Monero is a privacy-centric cryptocurrency that allows users to obscure their transactions by including chaff coins, called “mixins,” along with the actual coins they spend. In this paper, we empirically evaluate two weaknesses in Monero’s mixin sampling strategy. First, about 62% of transaction inputs with one or more mixins are vulnerable to “chain-reaction” analysis - that is, the real input can be deduced by elimination. Second, Monero mixins are sampled in such a way that they can be easily distinguished from the real coins by their age distribution; in short, the real input is usually the “newest” input. We estimate that this heuristic can be used to guess the real input with 80% accuracy over all transactions with 1 or more mixins. Next, we turn to the Monero ecosystem and study the importance of mining pools and the former anonymous marketplace AlphaBay on the transaction volume. We find that after removing mining pool activity, there remains a large amount of potentially privacy-sensitive transactions that are affected by these weaknesses. We propose and evaluate two countermeasures that can improve the privacy of future transactions.

If the inline PDF is not rendering correctly, you can download the PDF file here.

  • [1] United States of America vs. Alexandre Cazes. Verified complaint for forfeiture In Rem. https://www.justice.gov/opa/press-release/file/982821/download July 2017.

  • [2] C. Aliens. Reddit user explains how to use Monero and “not end up in jail”. https://www.deepdotweb.com/2016/09/03/reddit-user-explains-use-monero-not-end-jail/ 2016.

  • [3] Alex Biryukov Dmitry Khovratovich and Ivan Pustogarov. Deanonymisation of clients in Bitcoin p2p network. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security pages 15-29. ACM 2014.

  • [4] Joseph Bonneau Mike Just and Greg Matthews. What’s in a name? In International Conference on Financial Cryptography and Data Security pages 98-113. Springer 2010.

  • [5] Joseph Bonneau Andrew Miller Jeremy Clark Arvind Narayanan Joshua A. Kroll and Edward W. Felten. Research perspectives and challenges for Bitcoin and cryptocurrencies. In 2015 IEEE Symposium on Security and Privacy May 2015.

  • [6] Nicolas Christin. Traveling the Silk Road: A measurement analysis of a large anonymous online marketplace. In Proceedings of the 22nd World Wide Web Conference (WWW’13) pages 213-224 Rio de Janeiro Brazil 5 2013.

  • [7] Claudia Diaz Stefaan Seys Joris Claessens and Bart Preneel. Towards measuring anonymity. In International Workshop on Privacy Enhancing Technologies pages 54-68. Springer 2002.

  • [8] DwarfPool. Dwarfpool XMR 2017. http://dwarfpool.com/xmr.

  • [9] EhVedadoOAnonimato. https://web.archive.org/web/20150913010433/https://forum.getmonero.org/20/generaldiscussion/2361/question-on-mixin-selection September 2015.

  • [10] EhVedadoOAnonimato. https://forum.getmonero.org/6/ideas/2372/using-time-neighbors-in-mixin-selection-in-orderto-solve-temporal-associations September 2015.

  • [11] Thomas Fox-Brewster. Wannacry hackers are using this Swiss company to launder $142000 Bitcoin ransoms. https://www.forbes.com/sites/thomasbrewster/2017/08/03/wannacryhackers-use-shapeshift-to-launder-bitcoin August 2017.

  • [12] Steven Goldfeder Harry A. Kalodner Dillon Reisman and Arvind Narayanan. When the cookie meets the blockchain: Privacy risks of web payments via cryptocurrencies. CoRR abs/1708.04748 2017.

  • [13] Andy Greenberg. Monero the drug dealer’s cryptocurrency of choice is on fire. Wired. https://www.wired.com/2017/01/monero-drug-dealers-cryptocurrency-choice-fire/ 2017.

  • [14] Philip Koshy Diana Koshy and Patrick McDaniel. An analysis of anonymity in Bitcoin using p2p network traffic. In International Conference on Financial Cryptography and Data Security pages 469-485. Springer 2014.

  • [15] Amrit Kumar Clément Fischer Shruti Tople and Prateek Saxena. A traceability analysis of Monero’s blockchain. In Simon N. Foley Dieter Gollmann and Einar Snekkenes editors Computer Security - ESORICS 2017: 22nd European Symposium on Research in Computer Security Oslo Norway September 1-15 2017 Proceedings Part II pages 153-173. Springer International Publishing 2017.

  • [16] Adam Mackenzie Surae Noether and Monero Core Team. MRL-0004: Improving obfuscation in the CryptoNote protocol. https://lab.getmonero.org/pubs/MRL-0004.pdf January 2015.

  • [17] James L Massey. Guessing and entropy. In Proceedings of 1994 IEEE International Symposium on Information Theory page 204. IEEE 1994.

  • [18] Sarah Meiklejohn Marjori Pomarole Grant Jordan Kirill Levchenko Damon McCoy Geoffrey M Voelker and Stefan Savage. A fistful of Bitcoins: Characterizing payments among men with no names. In Proceedings of the 2013 conference on Internet measurement conference pages 127-140. ACM 2013.

  • [19] MinerGate. Minergate 2017. https://minergate.com/.

  • [20] MoneroHash. Monerohash 2017. https://monerohash.com/#network.

  • [21] Satoshi Nakamoto. Bitcoin: A peer-to-peer electronic cash system 2008.

  • [22] Shen Noether Adam Mackenzie and the Monero Research Lab. Ring confidential transactions. Ledger 1(0):1-18 2016.

  • [23] Surae Noether Sarang Noether and Adam Mackenzie. MRL-0001: A note on chain reactions in traceability in CryptoNote 2.0. https://lab.getmonero.org/pubs/MRL-0001.pdf September 2014.

  • [24] Fergal Reid and Martin Harrigan. An analysis of anonymity in the Bitcoin system. In Security and Privacy in Social Networks pages 197-223. Springer 2013.

  • [25] Dorit Ron and Adi Shamir. Quantitative analysis of the full Bitcoin transaction graph. In International Conference on Financial Cryptography and Data Security pages 6-24. Springer 2013.

  • [26] Andrei Serjantov and George Danezis. Towards an information theoretic metric for anonymity. In International Workshop on Privacy Enhancing Technologies pages 41-53. Springer 2002.

  • [27] Claude E Shannon. A mathematical theory of communication. Bell System Technical Journal 27:623-666 1948.

  • [28] Kyle Soska and Nicolas Christin. Measuring the longitudinal evolution of the online anonymous marketplace ecosystem. In Proceedings of the 24th USENIX Security Symposium (USENIX Security’15) pages 33-48 Washington DC 8 2015.

  • [29] The Internet Archive. Wayback machine 1999. https://archive.org/web/.

  • [30] Nicolas van Saberhagen. Cryptonote v2.0. https://cryptonote.org/whitepaper.pdf 2013.

  • [31] wh1sks. The Shadow Brokers may have received up to 1500 Monero ($66000) from their June “monthly dump service”. https://steemit.com/shadowbrokers/@wh1sks/theshadowbrokers-may-have-received-up-to-1500-monerousd66-000-from-their-june-monthly-dump-service July 2017.

Search
Journal information
Cited By
Metrics
All Time Past Year Past 30 Days
Abstract Views 0 0 0
Full Text Views 2543 1871 50
PDF Downloads 1761 1385 21