Demystifying Ethereum account diversity: observations, models and analysis
Chaofan WANG, Xiaohai DAI, Jiang XIAO, Chenchen LI, Ming WEN, Bingbing ZHOU, Hai JIN
Demystifying Ethereum account diversity: observations, models and analysis
Blockchain platform Ethereum has involved millions of accounts due to its strong potential for providing numerous services based on smart contracts. These massive accounts can be divided into diverse categories, such as miners, tokens, and exchanges, which is termed as account diversity in this paper. The benefit of investigating diversity are multi-fold, including understanding the Ethereum ecosystem deeper and opening the possibility of tracking certain abnormal activities. Unfortunately, the exploration of blockchain account diversity remains scarce. Even the most relevant studies, which focus on the deanonymization of the accounts on Bitcoin, can hardly be applied on Ethereum since their underlying protocols and user idioms are different. To this end, we present the first attempt to demystify the account diversity on Ethereum. The key observation is that different accounts exhibit diverse behavior patterns, leading us to propose the heuristics for classification as the premise. We then raise the coverage rate of classification by the statistical learning model Maximum Likelihood Estimation (MLE). We collect real-world data through extensive efforts to evaluate our proposed method and show its effectiveness. Furthermore, we make an in-depth analysis of the dynamic evolution of the Ethereum ecosystem and uncover the abnormal arbitrage actions. As for the former, we validate two sweeping statements reliably: (1) standalone miners are gradually replaced by the mining pools and cooperative miners; (2) transactions related to the mining pool and exchanges take up a large share of the total transactions. The latter analysis shows that there are a large number of arbitrage transactions transferring the coins from one exchange to another to make a price difference.
blockchain / Ethereum / classification / account diversity / network analysis
[1] |
Buterin V. A next-generation smart contract and decentralized application platform. White Paper, 2014, 3(37)
|
[2] |
Nakamoto S. Bitcoin: a peer-to-peer electronic cash system. Decentralized Business Review, 2008: 2120
|
[3] |
Wood G. Ethereum: a secure decentralised generalised transaction ledger. Ethereum Project Yellow Paper, 2014, 151: 1−32
|
[4] |
Anzai Y. Pattern recognition and machine learning. Journal of Electronic Imaging, 2007, 16(4): 99−101
|
[5] |
Li Y , Liu B . A normalized Levenshtein distance metric. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2007, 29( 6): 1091– 1095
|
[6] |
Ron D, Shamir A. Quantitative analysis of the full Bitcoin transaction graph. In: Proceedings of the 2013 International Conference on Financial Cryptography and Data Security. 2013, 6−24
|
[7] |
Androulaki E, Karame G O, Roeschlin M, Scherer T, Capkun S. Evaluating user privacy in Bitcoin. In: Proceedings of the 2013 International Conference on Financial Cryptography and Data Security. 2013, 34−51
|
[8] |
Athey S, Parashkevov I, Sarukkai V, Xia J. Bitcoin pricing, adoption, and usage: theory and evidence. Stanford University Graduate School of Business, 2016: 16−42
|
[9] |
Victor F. Address clustering heuristics for ethereum. In: Proceedings of the 24th International Conference on Financial Cryptography and Data Security. 2020, 617−633
|
[10] |
Wang M J, Ichijo H, Xiao B. Cryptocurrency address clustering and labeling. 2020, arXiv: 2003.13399
|
[11] |
Sun H Y, Ruan N, Liu H Q. Ethereum analysis via node clustering. In: Proceedings of International Conference on Network and System Security. 2019, 114−129
|
[12] |
Norvill R, Fiz B, State R, Cullen A. Automated labeling of unknown contracts in Ethereum. In: Proceedings of the 26th International Conference on Computer Communication and Networks. 2017, 1−6
|
[13] |
Jourdan M, Blandin S, Wynter L, Deshpande P. Characterizing entities in the Bitcoin blockchain. In: Proceedings of 2018 IEEE International Conference on Data Mining Workshops. 2018, 55−62
|
[14] |
Jourdan M, Blandin S, Wynter L, Deshpande P. A probabilistic model of the Bitcoin blockchain. In: Proceedings of IEEE Conference on Computer Vision and Pattern Recognition. 2019, 2784−2792
|
[15] |
Fröwis M, Fuchs A, Böhme R. Detecting token systems on ethereum. In: Proceedings of the 23th International Conference on Financial Cryptography and Data Security. 2019, 93−112
|
[16] |
Chen T, Zhu Y, Li Z, Chen J, Li X, Luo X, Lin X, Zhang X. Understanding ethereum via graph analysis. In: Proceedings of IEEE International Conference on Computer Communications. 2018, 1484−1492
|
[17] |
Chen T, Li Z, Zhang Y, Luo X, Chen A, Yang K, Hu B, Zhu T, Deng S, Hu T. Dataether: Data exploration framework for ethereum. In: Proceedings of the 39th International Conference on Distributed Computing Systems. 2019, 1369−1380
|
[18] |
Guo D C , Dong J Q , Wang K . Graph structure and statistical properties of ethereum transaction relationships. Science China Information Sciences, 2019, 492( 1): 58– 71
|
[19] |
He N, Wu L, Wang H, Guo Y, Jiang X. Characterizing Code Clones in the Ethereum Smart Contract Ecosystem. 2019, arXiv: 1905.00272
|
[20] |
Kiffer L, Levin D, Mislove A. Analyzing Ethereum’s Contract Topology. In: Proceedings of the Internet Measurement Conference. 2018, 494−499
|
[21] |
Norvill R, Fiz B, State R, Cullen A. Standardising smart contracts: Automatically inferring ERC standards. In: Proceedings of International Conference on Blockchain and Cryptocurrency. 2019, 192−195
|
[22] |
Massimo B , Salvatore C , Tiziana C , Roberto S . Dissecting ponzi schemes on ethereum: Identification, analysis, and impact. Future Generation Computer Systems, 2020, 102( 1): 259– 277
|
[23] |
Chen W, Wu J, Zheng Z, Chen C, Zhou Y. Detecting ponzi schemes on ethereum: Towards healthier blockchain technology. In: Proceedings of the 2018 World Wide Web Conference. 2018, 1409−1418
|
[24] |
Christof F T, Mathis S, Radu S. The art of the scam: demystifying honeypots in Ethereum smart contracts. In: Proceedings of the 28th USENIX Security Symposium. 2019, 1591−1607
|
[25] |
Ramiro C, Christof F T, Mathis B, Radu S. A data science approach for honeypot detection in ethereum. In: Proceedings of IEEE International Conference on Blockchain and Cryptocurrency. 2020, 1−9
|
[26] |
Wu J, Yuan Q, Lin D, You W, Chen W, Chen C, Zheng Z. Who are the phishers? phishing scam detection on ethereum via network embedding. IEEE Transactions on Systems, Man, and Cybernetics: Systems, 2020: 1−11
|
[27] |
Chen W, Wu J, Zheng Z, Chen C, Zhou Y. Market manipulation of Bitcoin: evidence from mining the Mt. Gox transaction network. In: Proceedings of IEEE Conference on Computer Communications. 2019, 964−972
|
/
〈 | 〉 |