A Quantitative Analysis of the Impact of Arbitrary Blockchain Content on Bitcoin

被引:89
作者
Matzutt, Roman [1 ]
Hiller, Jens [1 ]
Henze, Martin [1 ]
Ziegeldorf, Jan Henrik [1 ]
Muellmann, Dirk [2 ]
Hohlfeld, Oliver [1 ]
Wehrle, Klaus [1 ]
机构
[1] Rhein Westfal TH Aachen, Commun & Distributed Syst, Aachen, Germany
[2] Goethe Univ Frankfurt, Data Protect Res Inst, Frankfurt, Germany
来源
FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2018 | 2018年 / 10957卷
关键词
D O I
10.1007/978-3-662-58387-6_23
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Blockchains primarily enable credible accounting of digital events, e.g., money transfers in cryptocurrencies. However, beyond this original purpose, blockchains also irrevocably record arbitrary data, ranging from short messages to pictures. This does not come without risk for users as each participant has to locally replicate the complete blockchain, particularly including potentially harmful content. We provide the first systematic analysis of the benefits and threats of arbitrary blockchain content. Our analysis shows that certain content, e.g., illegal pornography, can render the mere possession of a blockchain illegal. Based on these insights, we conduct a thorough quantitative and qualitative analysis of unintended content on Bitcoin's blockchain. Although most data originates from benign extensions to Bitcoin's protocol, our analysis reveals more than 1600 files on the blockchain, over 99% of which are texts or images. Among these files there is clearly objectionable content such as links to child pornography, which is distributed to all Bitcoin participants. With our analysis, we thus highlight the importance for future blockchain designs to address the possibility of unintended data insertion and protect blockchain users accordingly.
引用
收藏
页码:420 / 438
页数:19
相关论文
共 62 条
[1]  
Aberer K., 2001, Proceedings of the 2001 ACM CIKM. Tenth International Conference on Information and Knowledge Management, P310, DOI 10.1145/502585.502638
[2]  
Adya A, 2002, USENIX ASSOCIATION PROCEEDINGS OF THE FIFTH SYMPOSIUM ON OPERATING SYSTEMS DESIGN AND IMPLEMENTATION, P1
[3]  
Ali M, 2017, STUD COMPUT INTELL, V704, P23, DOI 10.1007/978-3-662-54428-0_2
[4]  
Andresen G, 2012, BLOCK V2 HEIGHT COIN
[5]  
Andresen Gavin, 2012, Pay to Script Hash
[6]  
[Anonymous], 2016, ANN THREAT REP
[7]  
[Anonymous], 2015, CHIN JOURN ACC ILL A
[8]  
[Anonymous], 2012, LNCS, DOI DOI 10.1007/978-3-642-32946-3
[9]  
[Anonymous], 2004, OJLS
[10]  
[Anonymous], 2018, Philosophy & Technology, DOI [DOI 10.1007/S13347-016-0243, 10.1007/s13347-016-0243-1, DOI 10.1007/S13347-016-0243-1]