{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,28]],"date-time":"2026-04-28T15:34:07Z","timestamp":1777390447225,"version":"3.51.4"},"publisher-location":"Berlin, Heidelberg","reference-count":48,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783662643211","type":"print"},{"value":"9783662643228","type":"electronic"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-662-64322-8_7","type":"book-chapter","created":{"date-parts":[[2021,10,22]],"date-time":"2021-10-22T18:17:23Z","timestamp":1634926643000},"page":"147-166","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["Perimeter: A Network-Layer Attack on the Anonymity of Cryptocurrencies"],"prefix":"10.1007","author":[{"given":"Maria","family":"Apostolaki","sequence":"first","affiliation":[]},{"given":"Cedric","family":"Maire","sequence":"additional","affiliation":[]},{"given":"Laurent","family":"Vanbever","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,10,23]]},"reference":[{"key":"7_CR1","unstructured":"About: What is RIPE Atlas? https:\/\/atlas.ripe.net\/landing\/about\/"},{"key":"7_CR2","unstructured":"Announcing Daily RIPE Atlas data archives. https:\/\/labs.ripe.net\/Members\/petros_gigis\/announcing-daily-ripe-atlas-data-archives"},{"key":"7_CR3","unstructured":"Bitcoin Core diffusion delay. https:\/\/github.com\/bitcoin\/bitcoin\/blob\/da4cbb7927497ca3261c1504c3b85dd3f5800673\/src\/net_processing.cpp#L3813"},{"key":"7_CR4","unstructured":"Fast Internet Bitcoin Relay Engine. https:\/\/www.falcon-net.org"},{"key":"7_CR5","unstructured":"FIBRE. https:\/\/bitcoinfibre.org\/"},{"key":"7_CR6","unstructured":"Go Ethereum: Official Go implementation of the Ethereum protocol. https:\/\/github.com\/ethereum\/go-ethereum"},{"key":"7_CR7","unstructured":"GoPacket. https:\/\/github.com\/google\/gopacket"},{"key":"7_CR8","unstructured":"p2p: supplying and using asmap to improve IP bucketing in addrman. https:\/\/github.com\/bitcoin\/bitcoin\/pull\/16702"},{"key":"7_CR9","unstructured":"RFC 1267 - Border Gateway Protocol 3 (BGP-3). https:\/\/tools.ietf.org\/html\/rfc1267"},{"key":"7_CR10","unstructured":"RIPE RIS Raw Data. https:\/\/www.ripe.net\/data-tools\/stats\/ris\/ris-raw-data"},{"key":"7_CR11","unstructured":"The RLPx Transport Protocol. https:\/\/github.com\/ethereum\/devp2p\/blob\/master\/rlpx.md"},{"key":"7_CR12","unstructured":"Ethereum Mainnet Statistics (2020). https:\/\/www.ethernodes.org"},{"key":"7_CR13","unstructured":"GLOBAL BITCOIN NODES DISTRIBUTION (2020). https:\/\/bitnodes.io\/"},{"key":"7_CR14","unstructured":"Propagation of Transactions and Blocks (2020). https:\/\/dsn.tm.kit.edu\/bitcoin\/#propagation"},{"key":"7_CR15","doi-asserted-by":"publisher","unstructured":"Ager, B., Chatzis, N., Feldmann, A., Sarrar, N., Uhlig, S., Willinger, W.: Anatomy of a large european ixp. In: Proceedings of the ACM SIGCOMM 2012 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, SIGCOMM 2012, pp. 163\u2013174. ACM (2012). https:\/\/doi.org\/10.1145\/2342356.2342393. https:\/\/doi.org\/10.1145\/2342356.2342393","DOI":"10.1145\/2342356.2342393"},{"key":"7_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1007\/978-3-642-39884-1_4","volume-title":"Financial Cryptography and Data Security","author":"E Androulaki","year":"2013","unstructured":"Androulaki, E., Karame, G.O., Roeschlin, M., Scherer, T., Capkun, S.: Evaluating user privacy in bitcoin. In: Sadeghi, A.-R. (ed.) FC 2013. LNCS, vol. 7859, pp. 34\u201351. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-39884-1_4"},{"key":"7_CR17","doi-asserted-by":"publisher","unstructured":"Apostolaki, M., Zohar, A., Vanbever, L.: Hijacking bitcoin: Routing attacks on cryptocurrencies. In: S&P \u201917 (May). https:\/\/doi.org\/10.1109\/SP.2017.29","DOI":"10.1109\/SP.2017.29"},{"key":"7_CR18","doi-asserted-by":"crossref","unstructured":"Apostolaki, M., Marti, G., M\u00fcller, J., Vanbever, L.: Sabre: protecting bitcoin against routing attacks. In: Proceedings of the 26th Annual Network and Distributed System Security Symposium, pp. 02A1. Internet Society (2019)","DOI":"10.14722\/ndss.2019.23252"},{"key":"7_CR19","unstructured":"Birge-Lee, H., Sun, Y., Edmundson, A., Rexford, J., Mittal, P.: Bamboozling certificate authorities with $$\\{$$BGP$$\\}$$. In: 27th USENIX Security Symposium (USENIX Security 18), pp. 833\u2013849 (2018)"},{"key":"7_CR20","doi-asserted-by":"crossref","unstructured":"Biryukov, A., Khovratovich, D., Pustogarov, I.: Deanonymisation of clients in bitcoin p2p network. In: CCS 2014","DOI":"10.1145\/2660267.2660379"},{"key":"7_CR21","doi-asserted-by":"crossref","unstructured":"Biryukov, A., Pustogarov, I.: Bitcoin over tor isn\u2019t a good idea. In: 2015 IEEE Symposium on Security and Privacy, pp. 122\u2013134. IEEE (2015)","DOI":"10.1109\/SP.2015.15"},{"key":"7_CR22","doi-asserted-by":"crossref","unstructured":"Biryukov, A., Tikhomirov, S.: Deanonymization and linkability of cryptocurrency transactions based on network analysis. In: EuroS&P 2019 (2019)","DOI":"10.1109\/EuroSP.2019.00022"},{"key":"7_CR23","doi-asserted-by":"crossref","unstructured":"Bojja Venkatakrishnan, S., Fanti, G., Viswanath, P.: Dandelion: Redesigning the bitcoin network for anonymity. POMACS (2017)","DOI":"10.1145\/3078505.3078528"},{"key":"7_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"486","DOI":"10.1007\/978-3-662-45472-5_31","volume-title":"Financial Cryptography and Data Security","author":"J Bonneau","year":"2014","unstructured":"Bonneau, J., Narayanan, A., Miller, A., Clark, J., Kroll, J.A., Felten, E.W.: Mixcoin: anonymity for bitcoin with accountable mixes. In: Christin, N., Safavi-Naini, R. (eds.) FC 2014. LNCS, vol. 8437, pp. 486\u2013504. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-662-45472-5_31"},{"key":"7_CR25","unstructured":"The CAIDA AS relationship dataset - 20191001. http:\/\/data.caida.org\/datasets\/as-relationships\/serial-1\/"},{"key":"7_CR26","unstructured":"The caida ixps dataset - 201910. http:\/\/data.caida.org\/datasets\/ixps\/ix-asns_201910.jsonl. Accessed 12 Mar 2020"},{"issue":"7571","key":"7_CR27","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1038\/526021a","volume":"526","author":"A Extance","year":"2015","unstructured":"Extance, A.: The future of cryptocurrencies: bitcoin and beyond. Nature News 526(7571), 21 (2015)","journal-title":"Nature News"},{"key":"7_CR28","doi-asserted-by":"crossref","unstructured":"Fanti, G., Venkatakrishnan, S.B., Bakshi, S., Denby, B., Bhargava, S., Miller, A., Viswanath, P.: Dandelion++: lightweight cryptocurrency networking with formal anonymity guarantees. POMACS (2018)","DOI":"10.1145\/3219617.3219620"},{"key":"7_CR29","doi-asserted-by":"publisher","unstructured":"Gencer, A.E., Basu, S., Eyal, I., van Renesse, R., Sirer, E.G.: Decentralization in bitcoin and ethereum networks. In: Meiklejohn, S., Sako, K. (eds.) FC 2018. LNCS, vol. 10957, pp. 439\u2013457. Springer, Heidelberg (2018). https:\/\/doi.org\/10.1007\/978-3-662-58387-6_24","DOI":"10.1007\/978-3-662-58387-6_24"},{"issue":"4","key":"7_CR30","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1145\/1851275.1851195","volume":"40","author":"S Goldberg","year":"2010","unstructured":"Goldberg, S., Schapira, M., Hummon, P., Rexford, J.: How secure are secure interdomain routing protocols. ACM SIGCOMM Comput. Commun. Rev. 40(4), 87\u201398 (2010)","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"key":"7_CR31","unstructured":"Hearn, M., Corallo, M.: Connection bloom filtering. bitcoin improvement proposal 37 (2012)"},{"key":"7_CR32","doi-asserted-by":"crossref","unstructured":"Jepsen, T., Alvarez, D., Foster, N., Kim, C., Lee, J., Moshref, M., Soul\u00e9, R.: Fast string searching on pisa. In: Proceedings of the 2019 ACM Symposium on SDN Research, pp. 21\u201328 (2019)","DOI":"10.1145\/3314148.3314356"},{"issue":"3","key":"7_CR33","doi-asserted-by":"publisher","first-page":"2543","DOI":"10.1109\/COMST.2018.2818623","volume":"20","author":"MCK Khalilov","year":"2018","unstructured":"Khalilov, M.C.K., Levi, A.: A survey on anonymity and privacy in bitcoin-like digital cash systems. IEEE Commun. Surv. Tutorials 20(3), 2543\u20132585 (2018)","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"7_CR34","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1007\/978-3-662-45472-5_30","volume-title":"Financial Cryptography and Data Security","author":"P Koshy","year":"2014","unstructured":"Koshy, P., Koshy, D., McDaniel, P.: An analysis of anonymity in bitcoin using P2P network traffic. In: Christin, N., Safavi-Naini, R. (eds.) FC 2014. LNCS, vol. 8437, pp. 469\u2013485. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-662-45472-5_30"},{"key":"7_CR35","doi-asserted-by":"crossref","unstructured":"Liu, F.T., Ting, K.M., Zhou, Z.H.: Isolation forest. In: 2008 Eighth IEEE International Conference on Data Mining, pp. 413\u2013422. IEEE (2008)","DOI":"10.1109\/ICDM.2008.17"},{"issue":"1","key":"7_CR36","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2133360.2133363","volume":"6","author":"FT Liu","year":"2012","unstructured":"Liu, F.T., Ting, K.M., Zhou, Z.H.: Isolation-based anomaly detection. ACM Trans. Knowl. Discovery Data (TKDD) 6(1), 1\u201339 (2012)","journal-title":"ACM Trans. Knowl. Discovery Data (TKDD)"},{"key":"7_CR37","doi-asserted-by":"crossref","unstructured":"Luckie, M., Huffaker, B., Dhamdhere, A., Giotsas, V., Claffy, K.: As relationships, customer cones, and validation. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 243\u2013256 (2013)","DOI":"10.1145\/2504730.2504735"},{"key":"7_CR38","unstructured":"Matetic, S., W\u00fcst, K., Schneider, M., Kostiainen, K., Karame, G., Capkun, S.: BITE: Bitcoin lightweight client privacy using trusted execution"},{"key":"7_CR39","doi-asserted-by":"crossref","unstructured":"Meiklejohn, S., Pomarole, M., Jordan, G., Levchenko, K., McCoy, D., Voelker, G.M., Savage, S.: A fistful of bitcoins: characterizing payments among men with no names. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 127\u2013140 (2013)","DOI":"10.1145\/2504730.2504747"},{"key":"7_CR40","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1007\/978-3-319-70278-0_9","volume-title":"Financial Cryptography and Data Security","author":"T Neudecker","year":"2017","unstructured":"Neudecker, T., Hartenstein, H.: Could network information facilitate address clustering in bitcoin? In: Brenner, M., Rohloff, K., Bonneau, J., Miller, A., Ryan, P.Y.A., Teague, V., Bracciali, A., Sala, M., Pintore, F., Jakobsson, M. (eds.) FC 2017. LNCS, vol. 10323, pp. 155\u2013169. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-70278-0_9"},{"issue":"2","key":"7_CR41","doi-asserted-by":"publisher","first-page":"237","DOI":"10.3390\/fi5020237","volume":"5","author":"M Ober","year":"2013","unstructured":"Ober, M., Katzenbeisser, S., Hamacher, K.: Structure and anonymity of the bitcoin transaction graph. Future Internet 5(2), 237\u2013250 (2013)","journal-title":"Future Internet"},{"key":"7_CR42","doi-asserted-by":"crossref","unstructured":"Reid, F., Harrigan, M.: An analysis of anonymity in the bitcoin system. In: Security and Privacy in Social Networks, pp. 197\u2013223. Springer (2013)","DOI":"10.1007\/978-1-4614-4139-7_10"},{"key":"7_CR43","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1007\/978-3-642-39884-1_2","volume-title":"Financial Cryptography and Data Security","author":"D Ron","year":"2013","unstructured":"Ron, D., Shamir, A.: Quantitative analysis of the full bitcoin transaction graph. In: Sadeghi, A.-R. (ed.) FC 2013. LNCS, vol. 7859, pp. 6\u201324. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-39884-1_2"},{"key":"7_CR44","doi-asserted-by":"crossref","unstructured":"Ruffing, T., Moreno-Sanchez, P., Kate, A.: Coinshuffle: practical decentralized coin mixing for bitcoin. In: European Symposium on Research in Computer Security, pp. 345\u2013364. Springer (2014)","DOI":"10.1007\/978-3-319-11212-1_20"},{"key":"7_CR45","doi-asserted-by":"crossref","unstructured":"Saad, M., Cook, V., Nguyen, L., Thai, M.T., Mohaisen, A.: Partitioning attacks on bitcoin: Colliding space, time and logic. Technical report (2019)","DOI":"10.1109\/ICDCS.2019.00119"},{"key":"7_CR46","doi-asserted-by":"crossref","unstructured":"Sun, Y., Apostolaki, M., Birge-Lee, H., Vanbever, L., Rexford, J., Chiang, M., Mittal, P.: Securing internet applications from routing attacks. arXiv preprint arXiv:2004.09063 (2020)","DOI":"10.1145\/3429775"},{"key":"7_CR47","unstructured":"Sun, Y., Edmundson, A., Vanbever, L., Li, O., Rexford, J., Chiang, M., Mittal, P.: RAPTOR: routing attacks on privacy in tor. In: 24th USENIX Security Symposium (USENIX Security 2015), pp. 271\u2013286 (2015)"},{"key":"7_CR48","doi-asserted-by":"crossref","unstructured":"Tran, M., Choi, I., Moon, G.J., Vu, A.V., Kang, M.S.: A stealthier partitioning attack against bitcoin peer-to-peer network. In: S&P 2020","DOI":"10.1109\/SP40000.2020.00027"}],"container-title":["Lecture Notes in Computer Science","Financial Cryptography and Data Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-64322-8_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,22]],"date-time":"2021-10-22T18:29:18Z","timestamp":1634927358000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-662-64322-8_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783662643211","9783662643228"],"references-count":48,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-64322-8_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"23 October 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"FC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Financial Cryptography and Data Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 March 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 March 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"fc2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/fc21.ifca.ai\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}