Characterizing cryptocurrency exchange scams
نویسندگان
چکیده
منابع مشابه
Scam-Alert: Characterizing Work from Home Scams on Social Networks
Online social networks have become a favorite platform for marketers and advertisers. Due to the wide reach of these networks and low cost of advertisement, there has been an upsurge of marketing and advertising campaigns on social media. Social networks like facebook, twitter and google+ possess the capability to quickly turn any piece of information viral, thus increasing its impact. However,...
متن کاملTesseract: Real-Time Cryptocurrency Exchange using Trusted Hardware
We propose Tesseract, a secure real-time cryptocurrency exchange service. Centralized exchange designs are vulnerable to theft of funds, while decentralized exchanges cannot offer real-time cross-chain trades. All the existing exchanges are also vulnerable frontrunning attacks. Tesseract overcomes these flaws by using a trusted execution environment, specifically Intel SGX. The task of committi...
متن کاملUnderstanding Craigslist Rental Scams
Fraudulently posted online rental listings, rental scams, have been frequently reported by users. However, our understanding of the structure of rental scams is limited. In this paper, we conduct the first systematic empirical study of online rental scams on Craigslist. This study is enabled by a suite of techniques that allowed us to identify scam campaigns and our automated system that is abl...
متن کاملCryptocurrency Voting Games
This work shows that weighted majority voting games occur in cryptocurrencies. In particular, two such games are highlighted. The first game, which we call the Rule Game, pertains to the scenario where the entities in the system engage in a voting procedure to accept or reject a change of rules. The second game, which we call the Attack Game, refers to the scenario where a group of entities in ...
متن کاملAvoiding the SCAMs
Dendrites from the same neuron usually avoid contact with one another, a behavior known as self-avoidance. In this issue of Neuron and in the upcoming May 4, 2007 issue of Cell, a pair of studies by Soba et al. and Hughes et al. and a study by Matthews et al., respectively, identify products from the highly alternatively spliced Dscam gene as central to this behavior in Drosophila. Signaling in...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Computers & Security
سال: 2020
ISSN: 0167-4048
DOI: 10.1016/j.cose.2020.101993