{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T21:04:27Z","timestamp":1772053467288,"version":"3.50.1"},"reference-count":67,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T00:00:00Z","timestamp":1765152000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T00:00:00Z","timestamp":1765152000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,12,8]]},"DOI":"10.1109\/acsac67867.2025.00085","type":"proceedings-article","created":{"date-parts":[[2026,2,24]],"date-time":"2026-02-24T20:54:58Z","timestamp":1771966498000},"page":"1051-1064","source":"Crossref","is-referenced-by-count":0,"title":["XPOZ-HUB: Privacy Infiltration in Payment Channel Hubs through Balance Probing and Transaction Discovery"],"prefix":"10.1109","author":[{"given":"Alvi Ataur","family":"Khalil","sequence":"first","affiliation":[{"name":"Southern Illinois University Carbondale (SIUC),Computer Science,USA"}]},{"given":"Mohammad Ashiqur","family":"Rahman","sequence":"additional","affiliation":[{"name":"Knight Foundation School of Computing and Information Sciences, Florida International University,USA"}]}],"member":"263","reference":[{"key":"ref1","first-page":"21260","article-title":"Bitcoin: A peer-to-peer electronic cash system","author":"Nakamoto","year":"2008","journal-title":"Decentralized Business Review"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/DSN58291.2024.00026"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3618302"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/CNS59707.2023.10288911"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134096"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2021.3069725"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23086"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00111"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.10179427"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2021.3135076"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ISQED65160.2025.11014303"},{"key":"ref12","article-title":"Optigame: Game-theoretic enhancements for optimistic rollups through bayesian strate-gies","volume-title":"21st EAI International Conference on Security and Privacy in Communication Networks (SecureComm 2025). EAI","author":"Khalil","year":"2025"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/SP54263.2024.00081"},{"key":"ref14","article-title":"Flare: An approach to routing in lightning network","volume":"144","author":"Prihodko","year":"2016","journal-title":"White Paper"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23252"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2018.8487351"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.3390\/info9090223"},{"key":"ref18","first-page":"777","article-title":"High throughput cryptocur-rency routing in payment channel networks","volume-title":"17th USENIX Sympo-sium on Networked Systems Design and Implementation (NSDI 20)","author":"Sivaraman","year":"2020"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-51280-4_14"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3321705.3329812"},{"key":"ref21","article-title":"Security and privacy of lightning network payments with uncertain channel balances","author":"Pickhardt","year":"2021","journal-title":"arXiv preprint"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.102623"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58201-2_21"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICBC54727.2022.9805520"},{"key":"ref25","volume-title":"Tumbelbit-protocol","year":"2017"},{"key":"ref26","article-title":"Celer network: Bring internet scale to every blockchain","author":"Dong","year":"2018","journal-title":"arXiv preprint"},{"key":"ref27","volume-title":"Bitcoin wiki pen"},{"key":"ref28","volume-title":"A protocol for interledger payments","author":"Thomas","year":"2015"},{"key":"ref29","first-page":"20","article-title":"The bitcoin lightning network","author":"Poon","year":"2015","journal-title":"Scalable o-chain instant payments"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom53373.2021.00024"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560637"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134093"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2021.3101808"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/S0377-2217(98)00364-6"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/PL00007190"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2022.3216804"},{"key":"ref37","article-title":"A novel framework for threat analysis of machine learning-based smart healthcare systems","author":"Haque","year":"2021","journal-title":"arXiv preprint"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-10575-8_11"},{"key":"ref39","article-title":"Applications of smt solvers to program verification","author":"Bjorner","year":"2014","journal-title":"Notes for the Summer School on Formal Techniques"},{"key":"ref40","first-page":"51","article-title":"Lois: an application of smt solvers","volume-title":"Procs. SMT Workshop","volume":"1716","author":"Kopczynski","year":"2016"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.3233\/aic-2012-0525"},{"key":"ref42","article-title":"Smt-solving for the first-order theory of the reals","author":"Abraham","year":"2010","journal-title":"Schloss-Dagstuhl-Leibniz Zentrum fur Informatik"},{"key":"ref43","first-page":"4","article-title":"Satisfaction meets practice and confi-dence","author":"Bienrnuller","year":"2016","journal-title":"SC2@ SYNASC"},{"key":"ref44","volume-title":"Lnd api describe graph","year":"2024"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/49.668972"},{"key":"ref46","volume-title":"Basis of lightning technology (bolt)","year":"2024"},{"key":"ref47","article-title":"Probing channel balances in the lightning network","author":"Tikhomirov","year":"2020","journal-title":"arXiv preprint"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/3433210.3453089"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-18283-9_16"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-18283-9_17"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3046020"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-78800-3_24"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1145\/1995376.1995394"},{"key":"ref54","volume-title":"Bitcoin memory pool transaction dataset","author":"Zhao","year":"2023"},{"key":"ref55","volume-title":"Blockchain security issues","author":"Rastogi","year":"2021"},{"key":"ref56","volume-title":"Bitcoin transactions data 2011\u20132013","author":"Shafiq","year":"2019"},{"key":"ref57","volume-title":"Ln snapshots","author":"Rohrer","year":"2022"},{"key":"ref58","volume-title":"Wei: Definition in cryptocurrency, how it works, and history","year":"2024"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-78800-3_24"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-10452-7_3"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/ICCWorkshops49005.2020.9145400"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1145\/235815.235821"},{"key":"ref63","volume-title":"xpoz-hub website"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00020"},{"key":"ref65","first-page":"87","article-title":"Coinjoin: Privacy-preserving payment mixing techniques","volume":"15","author":"Nakamoto","year":"2021","journal-title":"Journal of Blockchain Security"},{"issue":"4","key":"ref66","first-page":"55","article-title":"Just-in-time routing for payment channel networks","volume":"22","author":"Miller","year":"2023","journal-title":"LN Research Journal"},{"key":"ref67","article-title":"Bolt-4 lightning network error handling","volume-title":"Lightning Labs, Tech. Rep.","author":"Poon","year":"2023"}],"event":{"name":"2025 IEEE Annual Computer Security Applications Conference (ACSAC)","location":"Honolulu, HI, USA","start":{"date-parts":[[2025,12,8]]},"end":{"date-parts":[[2025,12,12]]}},"container-title":["2025 IEEE Annual Computer Security Applications Conference (ACSAC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11391636\/11391706\/11391997.pdf?arnumber=11391997","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T20:53:52Z","timestamp":1772052832000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11391997\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,8]]},"references-count":67,"URL":"https:\/\/doi.org\/10.1109\/acsac67867.2025.00085","relation":{},"subject":[],"published":{"date-parts":[[2025,12,8]]}}}