filmov
tv
USENIX Security '19 - The Anatomy of a Cryptocurrency Pump-and-Dump Scheme

Показать описание
The Anatomy of a Cryptocurrency Pump-and-Dump Scheme
Jiahua Xu, École polytechnique fédérale de Lausanne (EPFL)
While pump-and-dump schemes have attracted the attention of cryptocurrency observers and regulators alike, this paper represents the first detailed empirical query of pump-and-dump activities in cryptocurrency markets. We present a case study of a recent pump-and-dump event, investigate 412 pump-and-dump activities organized in Telegram channels from June 17, 2018 to February 26, 2019, and discover patterns in crypto-markets associated with pump-and-dump schemes. We then build a model that predicts the pump likelihood of all coins listed in a crypto-exchange prior to a pump. The model exhibits high precision as well as robustness, and can be used to create a simple, yet very effective trading strategy, which we empirically demonstrate can generate a return as high as 60% on small retail investments within a span of two and half months. The study provides a proof of concept for strategic crypto-trading and sheds light on the application of machine learning for crime detection.
Jiahua Xu, École polytechnique fédérale de Lausanne (EPFL)
While pump-and-dump schemes have attracted the attention of cryptocurrency observers and regulators alike, this paper represents the first detailed empirical query of pump-and-dump activities in cryptocurrency markets. We present a case study of a recent pump-and-dump event, investigate 412 pump-and-dump activities organized in Telegram channels from June 17, 2018 to February 26, 2019, and discover patterns in crypto-markets associated with pump-and-dump schemes. We then build a model that predicts the pump likelihood of all coins listed in a crypto-exchange prior to a pump. The model exhibits high precision as well as robustness, and can be used to create a simple, yet very effective trading strategy, which we empirically demonstrate can generate a return as high as 60% on small retail investments within a span of two and half months. The study provides a proof of concept for strategic crypto-trading and sheds light on the application of machine learning for crime detection.
USENIX Security '19 - The Spies Hacking our Phones are Going Dark, and We're All in Troubl...
USENIX Security '19 - The Betrayal At Cloud City: An Empirical Analysis Of Cloud-Based Mobile
USENIX Security '19 - Embracing the 'Hack.' A Better Strategy for Team-Defense
USENIX Security '19 - Lessons Learned from Evaluating the Robustness of Defenses to
USENIX Security '19 - The KNOB is Broken: Exploiting Low Entropy in the Encryption Key
USENIX Security '19 - Tackling the Trust and Safety Crisis
USENIX Security '19 - Security Research and Public Policy
USENIX Security '19 - Discovering and Understanding the Security Hazards in the
USENIX Security '19 - Terminal Brain Damage: Exposing the Graceless Degradation in Deep
USENIX Security '19 - The CrossPath Attack: Disrupting the SDN Control Channel via Shared Links
USENIX Security '19 - A Systematic Evaluation of Transient Execution Attacks and Defenses
USENIX Security '19 - Small World with High Risks: A Study of Security Threats in the npm Ecosy...
USENIX Security '19 - Less is More: Quantifying the Security Benefits of Debloating Web Applica...
USENIX Security '19 - KEPLER: Facilitating Control-flow Hijacking Primitive Evaluation for Linu...
USENIX Security '19 - Stack Overflow Considered Helpful! Deep Learning Security Nudges Towards
USENIX Security '19 - Wireless Attacks on Aircraft Instrument Landing Systems
USENIX Security '19 - IODINE: Verifying Constant-Time Execution of Hardware
USENIX Security '19 - Not Everything is Dark and Gloomy: Power Grid Protections Against IoT
USENIX Security '19 - The Web's Identity Crisis: Understanding the Effectiveness of Websit...
USENIX Security '19 - Towards the Detection of Inconsistencies in Public Security
USENIX Security '19 - What Are You Searching For? A Remote Keylogging Attack
USENIX Security '19 - PolicyLint: Investigating Internal Privacy Policy Contradictions on Googl...
USENIX Security '19 - Origin-sensitive Control Flow Integrity
USENIX Security '19 - Inadvertently Making Cyber Criminals Rich: A Comprehensive Study of
Комментарии