MoneroResearch.info

WIKINDX Resources

Hammad, N., & Victor, F. 2024. Monero Traceability Heuristics: Wallet Application Bugs and the Mordinal-P2Pool Perspective. 
Added by: opal (13/08/2024, 21:44)   
Resource type: Miscellaneous
BibTeX citation key: Hammad2024
View all bibliographic details
Categories: Monero-focused
Creators: Hammad, Victor
Views: 218/1037
Attachments   2408.05332v1.pdf [36/110] URLs   https://arxiv.org/abs/2408.05332
Abstract
Privacy-focused cryptoassets like Monero are inten-tionally difficult to trace. Over the years, several traceabilityheuristics have been proposed, most of which have been renderedineffective with subsequent protocol upgrades. Between 2019and 2023, Monero wallet application bugs “Differ By One” and“10 Block Decoy Bug” have been observed and identified anddiscussed in the Monero community. In addition, a decentralizedmining pool named P2Pool has proliferated, and a controversialUTXO NFT imitation known as Mordinals has been tried forMonero. In this paper, we systematically describe the traceabilityheuristics that have emerged from these developments, andevaluate their quality based on ground truth, and throughpairwise comparisons. We also explore the temporal perspective,and show which of these heuristics have been applicable over thepast years, what fraction of decoys could be eliminated and whatthe remaining effective ring size is. Our findings illustrate thatmost of the heuristics have a high precision, that the “10 BlockDecoy Bug“ and the Coinbase decoy identification heuristicshave had the most impact between 2019 and 2023, and thatthe former could be used to evaluate future heuristics, if theyare also applicable during that time frame.
Added by: Jack  Last edited by: Jack
WIKINDX 6.10.2 | Total resources: 233 | Username: -- | Bibliography: WIKINDX Master Bibliography | Style: APA Enhanced