Browse > Article
http://dx.doi.org/10.13089/JKIISC.2018.28.6.1319

Automated Classification of Unknown Smart Contracts of Ethereum Using Machine Learning  

Lee, Donggun (Information Security Lab., Graduation School of Information, Yonsei University)
Kwon, Taekyoung (Information Security Lab., Graduation School of Information, Yonsei University)
Abstract
A blockchain system developed for crypto-currency has attractive characteristics, such as de-centralization, distributed ledger, and partial anonymity, making itself adopted in various fields. Among those characteristics, partial anonymity strongly assures privacy of users, but side effects such as abuse of crime are also appearing, and so countermeasures for circumventing such abuse have been studied continuously. In this paper, we propose a machine-learning based method for classifying smart contracts in Ethereum regarding their functions and design patterns and for identifying user behaviors according to them.
Keywords
Blockchain; Ethereum; Smart contract; De-anonymity; Forensics;
Citations & Related Records
연도 인용수 순위
  • Reference
1 S. Nakamoto, "Bitcoin: A Peer-to-Peer Electronic Cash System," Oct. 2008.
2 Androulaki, Elli, et al, "Evaluating user privacy in bitcoin," International Conference on Financial Cryptography and Data Security, pp. 34-51, Apr. 2013.
3 Meiklejohn, Sarah, et al, "A fistful of bitcoins: characterizing payments among men with no names," Proceedings of the 2013 conference on Internet measurement conference, ACM, pp. 127-140, Oct. 2013.
4 Fleder, Michael, Michael S. Kester, and Sudeep Pillai, "Bitcoin transaction graph analysis," arXiv preprint arXiv:1502.01657, Jan. 2015.
5 Goldfeder, Steven, et al, "When the cookie meets the blockchain: Privacy risks of web payments via cryptocurrencies," arXiv preprint arXiv: 1708.04748, Aug. 2017.
6 Koshy, Philip, Diana Koshy, and Patrick McDaniel, "An analysis of anonymity in bitcoin using p2p network traffic," International Conference on Financial Cryptography and Data Security, pp. 469-485, Mar. 2014.
7 Maxwell, Greg, "CoinJoin: Bitcoin privacy for the real world," Post on Bitcoin forum, Aug. 2013.
8 Bonneau, Joseph, et al, "Mixcoin: Anonymity for Bitcoin with accountable mixes," International Conference on Financial Cryptography and Data Security, pp. 486-504, Mar. 2014.
9 Payette, James, Samuel Schwager, and Joseph Murphy, "Characterizing the ethereum address space," Dec. 2017.
10 Wood, Gavin, "Ethereum: A secure decentralised generalised transaction ledger," Ethereum project yellow paper 151, pp. 1-32, Aug. 2014.
11 Norvill, Robert, et al, "Automated labeling of unknown contracts in Ethereum," The 26th International Conference on Computer Communications and Networks, Jul. 2017.
12 Etherscan, "Etherscan," https://etherscan.io/, Sep. 2018.
13 Bartoletti, Massimo, and Livio Pompianu, "An empirical analysis of smart contracts: platforms, applications, and design patterns," International Conference on Financial Cryptography and Data Security, pp. 494-509, Apr. 2017.
14 Blei, David M., Andrew Y. Ng, and Michael I. Jordan, "Latent dirichlet allocation," Journal of machine Learning research, pp. 993-1022, Jan. 2003.
15 Liaw, Andy, and Matthew Wiener, "Classification and regression by random Forest," Rnews, vol 2, no. 3, pp. 18-22, Nov. 2001.
16 Namanya, Anitta Patience, et al, "Detection of malicious portable executables using evidence combinational theory with fuzzy hashing," 2016 IEEE 4th International Conference on Future Internet of Things and Cloud, pp. 91-98, Aug. 2016.