skip to main content
10.1145/3576915.3623210acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

TxPhishScope: Towards Detecting and Understanding Transaction-based Phishing on Ethereum

Published: 21 November 2023 Publication History

Abstract

The prosperity of Ethereum attracts many users to send transactions and trade crypto assets. However, this has also given rise to a new form of transaction-based phishing scam, named TxPhish. Specifically, tempted by high profits, users are tricked into visiting fake websites and signing transactions that enable scammers to steal their crypto assets. The past year has witnessed 11 large-scale TxPhish incidents causing a total loss of more than 70 million.
In this paper, we conduct the first empirical study of TxPhish on Ethereum, encompassing the process of a TxPhishTxPhish campaign and details of phishing transactions. To detect TxPhish websites and extract phishing accounts automatically, we present TxPhish, which dynamically visits the suspicious websites, triggers transactions, and simulates results. Between November 25, 2022, and July 31, 2023, we successfully detected and reported 26,333 TxPhish websites and 3,486 phishing accounts. Among all of documented TxPhish websites, 78.9% of them were first reported by us, making TxPhish the largest TxPhish website detection system. Moreover, we provided criminal evidence of four phishing accounts and their fund flow totaling 1.5 million to aid in the recovery of funds for the victims. In addition, we identified bugs in six Ethereum projects and received appreciation.

References

[1]
2015. ERC-20: Token Standard. Retrieved February 26, 2023 from https://eips. ethereum.org/EIPS/eip-20
[2]
2018. ERC-1155: Multi Token Standard. Retrieved February 26, 2023 from https://eips.ethereum.org/EIPS/eip-1155
[3]
2018. ERC-721: Non-Fungible Token Standard. Retrieved February 26, 2023 from https://eips.ethereum.org/EIPS/eip-721
[4]
2022. Be Wary of the TransferFrom Zero Transfer Scam. Retrieved Mar 1, 2023 from https://medium.com/@slowmist/slowmist-be-wary-of-the-transferfrom-zero-transfer-scam-c64ba0e3bc4d
[5]
2022. Ethereum Wallet MetaMask Passes 30M Users, Plans DAO and Token. Re-trieved Mar 6, 2023 from https://decrypt.co/95039/metamask-consensys-30-million-users
[6]
2022. Fake Airdrops, Fake Wallets and Now Fake Exchange Apps. Retrieved Mar 1, 2023 from https://slowmist.medium.com/fake-airdrops-fake-wallets-and-now-fake-exchange-apps-ddb78f770f73
[7]
2022. An in-depth look into the infrastructure supporting the "fake wallet" phishing industry. Retrieved Mar 1, 2023 from https://slowmist.medium.com/an-in-depth-look-into-the-infrastructure-supporting-the-fake-wallet-phishing-industry-79030560f38
[8]
2022. OpenSea Phishing Attack Led To Loss Of NFTs Worth 641 Ethereum. Retrieved Mar 6, 2023 from https://www.lowyat.net/2022/266445/opensea-phishing-attack-loss-of-nfts-641-ethereum
[9]
2022. Uniswap User Loses $8M Worth of Ether in Phishing Attack. Retrieved Mar 6, 2023 from https://www.coindesk.com/tech/2022/07/12/uniswap-user-loses-8m-worth-of-ether-in-phishing-attack
[10]
2023. $10,000,000 scammer. Retrieved May 1, 2023 from https://twitter.com/ MetaSleuth/status/1643901208116224000
[11]
2023. 2022 Annual Blockchain Security and AML Analysis Annual Report. Retrieved Mar 1, 2023 from https://www.slowmist.com/report/2022-Blockchain-Security-and-AML-Analysis-Annual-Report(EN).pdf
[12]
2023. AIDOGE. Retrieved Aug 10, 2023 from https://arbdoge.ai/
[13]
2023. Alchemy. Retrieved Mar 6, 2023 from https://www.alchemy.com
[14]
2023. Amazon NFTs, Losing $2m in a phishing attack, $105m payday, Is Bitcoin the best performing asset in the world this year? Retrieved Mar 6, 2023 from https://fomofix.substack.com/p/amazon-nfts-losing-2m-in-a-phishing? utm_source=twitter&utm_campaign=auto_share&r=1duf4y
[15]
2023. Approval Phishing stealed 70 WBTC. Retrieved May 1, 2023 from https: //twitter.com/MetaSleuth/status/1638812482021228544
[16]
2023. Arbitrum. Retrieved April 10, 2023 from https://arbitrum.io
[17]
2023. Aztec Connect. Retrieved April 19, 2023 from https://aztec.network/ connect
[18]
2023. Binance. Retrieved Mar 6, 2023 from https://www.binance.com/en
[19]
2023. BLOCKMAGE. Retrieved April 5, 2023 from https://twitter.com/ BlockMageSec
[20]
2023. BlockSec. Retrieved April 5, 2023 from https://blocksec.com
[21]
2023. Blur. Retrieved Mar 6, 2023 from https://blur.io
[22]
2023. Certificate Transparency. Retrieved Mar 28, 2023 from https://certificate. transparency.dev
[23]
2023. CertikAlert. Retrieved Mar 6, 2023 from https://twitter.com/CertiKAlert
[24]
2023. certstream-go. Retrieved Mar 28, 2023 from https://github.com/CaliDog/ certstream-go.git
[25]
2023. Chainabuse. Retrieved Mar 1, 2023 from https://www.chainabuse.com
[26]
2023. Chainabuse Ethereum Phishing Scam Reports. Retrieved Mar 1, 2023 from https://www.chainabuse.com/category/phishing?page=0&filter=ETH
[27]
2023. Coinbase. Retrieved Mar 6, 2023 from https://www.coinbase.com
[28]
2023. CoinGecko. Retrieved Aug 2, 2023 from https://www.coingecko.com//
[29]
2023. CoinMarketCap. Retrieved Aug 2, 2023 from https://coinmarketcap.com/
[30]
2023. Crypto Drainers | Multichain Drainer. Retrieved July 26, 2023 from https://t.me/ethdrainer
[31]
2023. Crypto Google search ad phishing has resulted $4.16 million loss. Retrieved April 29, 2023 from https://twitter.com/WuBlockchain/status/ 1651514902408986626
[32]
2023. Crypto phishing scammer Monkey Drainer shuts down services. Retrieved Mar 6, 2023 from https://cryptoslate.com/crypto-phishing-scammer-monkey-drainer-shuts-down-services
[33]
2023. Cyber Security Firm CertiK Unmasks Scammers Linked To $4.3M Porsche NFT Phishing Scam. Retrieved Mar 6, 2023 from https://www.business2community.com/nft-news/cyber-security-firm-certik-unmasks-scammers-linked-to-4-3m-porsche-nft-phishing-scam-02617446
[34]
2023. DappRadar. Retrieved Aug 2, 2023 from https://dappradar.com/
[35]
2023. Demystifying Profit Sharing in Inferno Drainer. Retrieved July 19, 2023 from https://blocksecteam.medium.com/demystifying-profit-sharing-in-inferno-drainer-2e8a9afb974b
[36]
2023. eth-phishing-detect. Retrieved Mar 1, 2023 from https://github.com/ MetaMask/eth-phishing-detect/pulls
[37]
2023. etherscan. Retrieved April 1, 2023 from https://etherscan.io
[38]
2023. Fake_Phishing8210 on etherscan.com has taken $1.24M in USDC from a victim. Retrieved Mar 6, 2023 from https://twitter.com/CertiKAlert/status/ 1623131855661805571
[39]
2023. Forta. Retrieved Jul 26, 2023 from https://forta.org/
[40]
2023. Forta Scam Detector. Retrieved Jul 27, 2023 from https://docs.forta. network/en/latest/scam-detector-bot/
[41]
2023. Google Trust Services. Retrieved April 9, 2023 from https://pki.goog
[42]
2023. Inferno Multichain Drainer. Retrieved July 26, 2023 from https://t.me/ Inferno_Drainer
[43]
2023. Let's Encrypt. Retrieved April 9, 2023 from https://letsencrypt.org
[44]
2023. MetaMask. Retrieved Mar 1, 2023 from https://metamask.io
[45]
2023. MetaMask disables eth_sign by default. Retrieved Aug 11, 2023 from https://github.com/MetaMask/metamask-mobile/issues/5676
[46]
2023. MetaMask Docs. Retrieved Mar 18, 2023 from https://docs.metamask.io
[47]
2023. Mopsus. Retrieved April 5, 2023 from https://mopsus.blocksec.com
[48]
2023. Moralis. Retrieved Mar 6, 2023 from https://moralis.io
[49]
2023. OpenSea. Retrieved Mar 6, 2023 from https://opensea.io
[50]
2023. pepe. Retrieved Jul 26, 2023 from https://www.pepe.vip
[51]
2023. Phishing Activity Trends Report: 2nd Quarter, 2021. Retrieved Mar 26, 2023 from https://docs.apwg.org/reports/apwg_trends_report_q2_2021.pdf
[52]
2023. Phishing Reports Collected from Twitter. Retrieved Mar 2, 2023 from https://github.com/MetaMask/eth-phishing-detect/pull/11786
[53]
2023. Phishing Reports Collected from urlscan. Retrieved Mar 2, 2023 from https://github.com/MetaMask/eth-phishing-detect/pull/11736
[54]
2023. Phishing Victim Reports. Retrieved Mar 2, 2023 from https://github.com/ MetaMask/eth-phishing-detect/issues/11742
[55]
2023. Puppeteer. Retrieved April 3, 2023 from https://pptr.dev
[56]
2023. Robinhood and NFT project Azukis Twitter hacked; 122 NFTs worth 484.99 ETH stolen from the latter. Retrieved Mar 6, 2023 from https://gemhodlers.com/robinhood-and-nft-project-azukis-twitter-hacked-122-nfts-worth-484-99-eth-stolen-from-the-latter
[57]
2023. Secret Network. Retrieved April 19, 2023 from https://scrt.network
[58]
2023. Stake: Crypto Casino & Sports Betting - BTC Casino Online. Retrieved April 26, 2023 from https://stake.com
[59]
2023. Tornado Cash. Retrieved April 14, 2023 from https://ipfs.io/ipns/ tornadocash.eth
[60]
2023. Total Value Locked All Chains. Retrieved April 30, 2023 from https: //defillama.com/chains
[61]
2023. TrustPad. Retrieved April 10, 2023 from https://trustpad.io
[62]
2023. urlscan. Retrieved Mar 2, 2023 from https://urlscan.io
[63]
2023. U.S. Treasury Sanctions Notorious Virtual Currency Mixer Tornado Cash. Retrieved April 26, 2023 from https://home.treasury.gov/news/press-releases/jy0916
[64]
2023. Venom Drainer has Drained $27M from 15k victims. Retrieved April 29, 2023 from https://twitter.com/realScamSniffer/status/1642813130454765568
[65]
2023. WEBCC. Retrieved April 12, 2023 from https://www.web.cc
[66]
2023. WEBCC domain register price list. Retrieved April 12, 2023 from https: //www.web.cc/pricing.php
[67]
2023. What is Ethereum. Retrieved February 26, 2023 from https://ethereum. org/en/what-is-ethereum
[68]
2023. Zero dollar purchase phishing in Blur. Retrieved April 10, 2023 from https://twitter.com/MetaSleuth/status/1633318417938939905
[69]
2023. ZeroSSL. Retrieved April 9, 2023 from https://zerossl.com
[70]
2023. zkSync. Retrieved April 10, 2023 from https://zksync.io
[71]
Sahar Abdelnabi, Katharina Krombholz, and Mario Fritz. 2020. Visual phishnet: Zero-day phishing website detection by visual similarity. In Proceedings of the 2020 ACM SIGSAC conference on computer and communications security. 1681--1698.
[72]
Sadia Afroz and Rachel Greenstadt. 2011. Phishzoo: Detecting phishing websites by looking at them. In 2011 IEEE fifth international conference on semantic computing. IEEE, 368--375.
[73]
Andreas M Antonopoulos and Gavin Wood. 2018. Mastering ethereum: building smart contracts and dapps. O'reilly Media.
[74]
Hugo LJ Bijmans, Tim M Booij, Anneke Schwedersky, Aria Nedgabat, and Rolf van Wegberg. 2021. Catching Phishers By Their Bait: Investigating the Dutch Phishing Landscape through Phishing Kit Detection. In USENIX Security Symposium. 3757--3774.
[75]
Aaron Blum, Brad Wardman, Thamar Solorio, and Gary Warner. 2010. Lexical feature based phishing URL detection using online learning. In Proceedings of the 3rd ACM Workshop on Artificial Intelligence and Security. 54--60.
[76]
Ahmet Selman Bozkir and Murat Aydos. 2020. LogoSENSE: A companion HOG based logo detection scheme for phishing web page and E-mail brand recognition. Computers & Security 95 (2020), 101855.
[77]
Liang Chen, Jiaying Peng, Yang Liu, Jintang Li, Fenfang Xie, and Zibin Zheng. 2020. Phishing scams detection in ethereum transaction network. ACM Transactions on Internet Technology (TOIT) 21, 1 (2020), 1--16.
[78]
Weili Chen, Xiongfeng Guo, Zhiguang Chen, Zibin Zheng, and Yutong Lu. 2020. Phishing Scam Detection on Ethereum: Towards Financial Security for Blockchain Ecosystem. In IJCAI, Vol. 7. 4456--4462.
[79]
Weimin Chen, Xinran Li, Yuting Sui, Ningyu He, Haoyu Wang, Lei Wu, and Xiapu Luo. 2021. Sadponzi: Detecting and characterizing ponzi schemes in ethereum smart contracts. Proceedings of the ACM on Measurement and Analysis of Computing Systems 5, 2 (2021), 1--30.
[80]
Dipanjan Das, Priyanka Bose, Nicola Ruaro, Christopher Kruegel, and Giovanni Vigna. 2022. Understanding security issues in the NFT ecosystem. In Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security. 667--681.
[81]
Anthony Y Fu, Liu Wenyin, and Xiaotie Deng. 2006. Detecting phishing web pages with visual similarity assessment based on earth mover's distance (EMD). IEEE transactions on dependable and secure computing 3, 4 (2006), 301--311.
[82]
Huiwen Hu, Qianlan Bai, and Yuedong Xu. 2022. Scsguard: Deep scam detection for ethereum smart contracts. In IEEE INFOCOM 2022-IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS). IEEE, 1--6.
[83]
Arkan Hammoodi Hasan Kabla, Mohammed Anbar, Selvakumar Manickam, and Shankar Karupayah. 2022. Eth-PSD: A machine learning-based phishing scam detection approach in ethereum. IEEE Access 10 (2022), 118043--118057.
[84]
Taeri Kim, Noseong Park, Jiwon Hong, and Sang-Wook Kim. 2022. Phishing URL Detection: A Network-based Approach Robust to Evasion. In Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security. 1769--1782.
[85]
Brian Kondracki, Babak Amin Azad, Oleksii Starov, and Nick Nikiforakis. 2021. Catching transparent phish: analyzing and detecting MITM phishing toolkits. In Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security. 36--50.
[86]
Sijia Li, Gaopeng Gou, Chang Liu, Chengshang Hou, Zhenzhen Li, and Gang Xiong. 2022. TTAGN: Temporal transaction aggregation graph network for ethereum phishing scams detection. In Proceedings of the ACM Web Conference 2022. 661--669.
[87]
Xigao Li, Anurag Yepuri, and Nick Nikiforakis. 2023. Double and Nothing: Understanding and Detecting Cryptocurrency Giveaway Scams. In Network and Distributed Systems Security (NDSS) Symposium.
[88]
Yukun Li, Zhenguo Yang, Xu Chen, Huaping Yuan, and Wenyin Liu. 2019. A stacking model using URL and HTML features for phishing webpage detection. Future Generation Computer Systems 94 (2019), 27--39.
[89]
Yun Lin, Ruofan Liu, Dinil Mon Divakaran, Jun Yang Ng, Qing Zhou Chan, Yiwen Lu, Yuxuan Si, Fan Zhang, and Jin Song Dong. 2021. Phishpedia: A Hybrid Deep Learning Based Approach to Visually Identify Phishing Webpages. In USENIX Security Symposium. 3793--3810.
[90]
Ruofan Liu, Yun Lin, Xianglin Yang, Siang Hwee Ng, Dinil Mon Divakaran, and Jin Song Dong. 2022. Inferring phishing intention via webpage appearance and dynamics: A deep vision based approach. In 31st USENIX Security Symposium (USENIX Security 22). 1633--1650.
[91]
Xingyu Lyu, Mengya Zhang, Xiaokuan Zhang, Jianyu Niu, Yinqian Zhang, and Zhiqiang Lin. 2022. An Empirical Study on Ethereum Private Transactions and the Security Implications. arXiv preprint arXiv:2208.02858 (2022).
[92]
Justin Ma, Lawrence K Saul, Stefan Savage, and Geoffrey M Voelker. 2009. Beyond blacklists: learning to detect malicious web sites from suspicious URLs. In Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining. 1245--1254.
[93]
Anutthamaa Martin, Na Anutthamaa, M Sathyavathy, Marie Manjari Saint Francois, Dr V Prasanna Venkatesan, et al. 2011. A framework for predicting phishing websites using neural networks. arXiv preprint arXiv:1109.1074 (2011).
[94]
Rami M Mohammad, Fadi Thabtah, and Lee McCluskey. 2012. An assessment of features related to phishing websites using an automated technique. In 2012 international conference for internet technology and secured transactions. IEEE, 492--497.
[95]
Adam Oest, Yeganeh Safaei, Penghui Zhang, Brad Wardman, Kevin Tyers, Yan Shoshitaishvili, Adam Doupé, and Gail-Joon Ahn. 2020. Phishtime: Continuous longitudinal measurement of the effectiveness of anti-phishing blacklists. In Proceedings of the 29th USENIX Conference on Security Symposium. 379--396.
[96]
Adam Oest, Yeganeh Safei, Adam Doupé, Gail-Joon Ahn, Brad Wardman, and Gary Warner. 2018. Inside a phisher's mind: Understanding the anti-phishing ecosystem through phishing kit analysis. In 2018 APWG Symposium on Electronic Crime Research (eCrime). IEEE, 1--12.
[97]
Adam Oest, Penghui Zhang, Brad Wardman, Eric Nunes, Jakub Burgis, Ali Zand, Kurt Thomas, Adam Doupé, and Gail-Joon Ahn. 2020. Sunrise to sunset: Analyzing the end-to-end life cycle and effectiveness of phishing attacks at scale. In 29th {USENIX} Security Symposium ({USENIX} Security 20).
[98]
Ross Phillips and Heidi Wilder. 2020. Tracing cryptocurrency scams: Clustering replicated advance-fee and phishing websites. In 2020 IEEE international conference on blockchain and cryptocurrency (ICBC). IEEE, 1--8.
[99]
Sayak Saha Roy, Dipanjan Das, Priyanka Bose, Christopher Kruegel, Giovanni Vigna, and Shirin Nilizadeh. 2023. Demystifying NFT Promotion and Phishing Scams. arXiv preprint arXiv:2301.09806 (2023).
[100]
Doyen Sahoo, Chenghao Liu, and Steven CH Hoi. 2017. Malicious URL detection using machine learning: A survey. arXiv preprint arXiv:1701.07179 (2017).
[101]
Yun Wan, Feng Xiao, and Dapeng Zhang. 2023. Early-stage phishing detection on the Ethereum transaction network. Soft Computing 27, 7 (2023), 3707--3719.
[102]
Colin Whittaker, Brian Ryner, and Marria Nazif. 2010. Large-scale automatic classification of phishing pages. (2010).
[103]
Jiajing Wu, Qi Yuan, Dan Lin, Wei You, Weili Chen, Chuan Chen, and Zibin Zheng. 2020. Who are the phishers? phishing scam detection on ethereum via network embedding. IEEE Transactions on Systems, Man, and Cybernetics: Systems 52, 2 (2020), 1156--1166.
[104]
Pengcheng Xia, Haoyu Wang, Bingyu Gao, Weihang Su, Zhou Yu, Xiapu Luo, Chao Zhang, Xusheng Xiao, and Guoai Xu. 2021. Trade or trick? detecting and characterizing scam tokens on uniswap decentralized exchange. Proceedings of the ACM on Measurement and Analysis of Computing Systems 5, 3 (2021), 1--26.
[105]
Qi Yuan, Baoying Huang, Jie Zhang, Jiajing Wu, Haonan Zhang, and Xi Zhang. 2020. Detecting phishing scams on ethereum based on transaction records. In 2020 IEEE International Symposium on Circuits and Systems (ISCAS). IEEE, 1--5.
[106]
Zihao Yuan, Qi Yuan, and Jiajing Wu. 2020. Phishing detection on ethereum via learning representation of transaction subgraphs. In Blockchain and Trustworthy Systems: Second International Conference, BlockSys 2020, Dali, China, August 6-7, 2020, Revised Selected Papers 2. Springer, 178--191.
[107]
Penghui Zhang, Adam Oest, Haehyun Cho, Zhibo Sun, RC Johnson, Brad Wardman, Shaown Sarker, Alexandros Kapravelos, Tiffany Bao, Ruoyu Wang, et al. 2021. Crawlphish: Large-scale analysis of client-side cloaking techniques in phishing. In 2021 IEEE Symposium on Security and Privacy (SP). IEEE, 1109--1124.
[108]
Penghui Zhang, Adam Oest, Haehyun Cho, Zhibo Sun, RC Johnson, Brad Wardman, Shaown Sarker, Alexandros Kapravelos, Tiffany Bao, Ruoyu Wang, et al. 2021. Crawlphish: Large-scale analysis of client-side cloaking techniques in phishing. In 2021 IEEE Symposium on Security and Privacy (SP). IEEE, 1109--1124.
[109]
Penghui Zhang, Zhibo Sun, Sukwha Kyung, Hans Walter Behrens, Zion Leonahenahe Basque, Haehyun Cho, Adam Oest, Ruoyu Wang, Tiffany Bao, Yan Shoshitaishvili, et al. 2022. I'm SPARTACUS, No, I'm SPARTACUS: Proactively Protecting Users from Phishing by Intentionally Triggering Cloaking Behavior. In Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security. 3165--3179.

Cited By

View all
  • (2025)SoK: On the Security of Non-Fungible TokensBlockchain: Research and Applications10.1016/j.bcra.2024.100268(100268)Online publication date: Jan-2025
  • (2024)Towards Understanding and Analyzing Instant Cryptocurrency ExchangesProceedings of the ACM on Measurement and Analysis of Computing Systems10.1145/37004308:3(1-24)Online publication date: 10-Dec-2024
  • (2024)Piecing Together the Jigsaw Puzzle of Transactions on Heterogeneous Blockchain NetworksProceedings of the ACM on Measurement and Analysis of Computing Systems10.1145/37004248:3(1-27)Online publication date: 10-Dec-2024
  • Show More Cited By

Index Terms

  1. TxPhishScope: Towards Detecting and Understanding Transaction-based Phishing on Ethereum

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    CCS '23: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security
    November 2023
    3722 pages
    ISBN:9798400700507
    DOI:10.1145/3576915
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 21 November 2023

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. decentralized finance
    2. ethereum
    3. phishing detection

    Qualifiers

    • Research-article

    Funding Sources

    • National Natural Science Foundation of China
    • National Key R&D Program of China

    Conference

    CCS '23
    Sponsor:

    Acceptance Rates

    Overall Acceptance Rate 1,261 of 6,999 submissions, 18%

    Upcoming Conference

    CCS '25

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)686
    • Downloads (Last 6 weeks)18
    Reflects downloads up to 20 Feb 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2025)SoK: On the Security of Non-Fungible TokensBlockchain: Research and Applications10.1016/j.bcra.2024.100268(100268)Online publication date: Jan-2025
    • (2024)Towards Understanding and Analyzing Instant Cryptocurrency ExchangesProceedings of the ACM on Measurement and Analysis of Computing Systems10.1145/37004308:3(1-24)Online publication date: 10-Dec-2024
    • (2024)Piecing Together the Jigsaw Puzzle of Transactions on Heterogeneous Blockchain NetworksProceedings of the ACM on Measurement and Analysis of Computing Systems10.1145/37004248:3(1-27)Online publication date: 10-Dec-2024
    • (2024)Skyeye: Detecting Imminent Attacks via Analyzing Adversarial Smart ContractsProceedings of the 39th IEEE/ACM International Conference on Automated Software Engineering10.1145/3691620.3695526(1570-1582)Online publication date: 27-Oct-2024
    • (2024)Characterizing Ethereum Address Poisoning AttackProceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security10.1145/3658644.3690277(986-1000)Online publication date: 2-Dec-2024
    • (2024)Stealing Trust: Unraveling Blind Message Attacks in Web3 AuthenticationProceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security10.1145/3658644.3670323(555-569)Online publication date: 2-Dec-2024
    • (2024)Give and Take: An End-To-End Investigation of Giveaway Scam Conversion RatesProceedings of the 2024 ACM on Internet Measurement Conference10.1145/3646547.3689005(704-712)Online publication date: 4-Nov-2024
    • (2024) GrabPhisher : Phishing Scams Detection in Ethereum via Temporally Evolving GNNs IEEE Transactions on Services Computing10.1109/TSC.2024.3411449(1-15)Online publication date: 2024
    • (2024)Who Stole My NFT? Investigating Web3 NFT Phishing Scams on EthereumIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.346354119(9301-9314)Online publication date: 18-Sep-2024
    • (2024)Pulling Off The Mask: Forensic Analysis of the Deceptive Creator Wallets Behind Smart Contract Fraud2024 IEEE Symposium on Security and Privacy (SP)10.1109/SP54263.2024.00228(2236-2254)Online publication date: 19-May-2024
    • Show More Cited By

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media