{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T22:07:12Z","timestamp":1769724432597,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":39,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,7,2]],"date-time":"2019-07-02T00:00:00Z","timestamp":1562025600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"ARC Discovery Project","award":["DP180102199"],"award-info":[{"award-number":["DP180102199"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,7,2]]},"DOI":"10.1145\/3321705.3329823","type":"proceedings-article","created":{"date-parts":[[2019,7,9]],"date-time":"2019-07-09T12:53:20Z","timestamp":1562676800000},"page":"621-632","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":19,"title":["On The Unforkability of Monero"],"prefix":"10.1145","author":[{"given":"Dimaz Ankaa","family":"Wijaya","sequence":"first","affiliation":[{"name":"Monash University, Clayton, Australia"}]},{"given":"Joseph K.","family":"Liu","sequence":"additional","affiliation":[{"name":"Monash University, Clayton, Australia"}]},{"given":"Ron","family":"Steinfeld","sequence":"additional","affiliation":[{"name":"Monash University, Clayton, Australia"}]},{"given":"Dongxi","family":"Liu","sequence":"additional","affiliation":[{"name":"Data61, CSIRO, Clayton, Australia"}]},{"given":"Jiangshan","family":"Yu","sequence":"additional","affiliation":[{"name":"Monash University, Clayton, Australia"}]}],"member":"320","published-online":{"date-parts":[[2019,7,2]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.5555\/1224252.1224501"},{"key":"e_1_3_2_1_2_1","unstructured":"BatmanLovesCrypto. 2018. Monero Classic and Monero Original on the same blockchain? Help me understand. https:\/\/www.reddit.com\/r\/Monero\/comments\/8eovv5\/monero_classic_and_monero_original_on_the_same\/  BatmanLovesCrypto. 2018. Monero Classic and Monero Original on the same blockchain? Help me understand. https:\/\/www.reddit.com\/r\/Monero\/comments\/8eovv5\/monero_classic_and_monero_original_on_the_same\/"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/362686.362692"},{"key":"e_1_3_2_1_4_1","unstructured":"Vitalik Buterin. 2016. Simple Replay Attack Protection. https:\/\/github.com\/ethereum\/EIPs\/blob\/master\/EIPS\/eip-155.md  Vitalik Buterin. 2016. Simple Replay Attack Protection. https:\/\/github.com\/ethereum\/EIPs\/blob\/master\/EIPS\/eip-155.md"},{"key":"e_1_3_2_1_5_1","volume-title":"Wong","author":"Chow Sherman S. M.","year":"2008","unstructured":"Sherman S. M. Chow , Joseph K. Liu , and Duncan S . Wong . 2008 . Robust Receipt-Free Election System with Ballot Secrecy and Verifiability. In NDSS. Sherman S. M. Chow, Joseph K. Liu, and Duncan S. Wong. 2008. Robust Receipt-Free Election System with Ballot Secrecy and Verifiability. In NDSS."},{"key":"e_1_3_2_1_6_1","unstructured":"dEBRYUNE. 2018. PoW change and key reuse. https:\/\/ww.getmonero.org\/2018\/02\/11\/PoW-change-and-key-reuse.html  dEBRYUNE. 2018. PoW change and key reuse. https:\/\/ww.getmonero.org\/2018\/02\/11\/PoW-change-and-key-reuse.html"},{"key":"e_1_3_2_1_7_1","unstructured":"Justin Ehrenhofer. 2018. Monero Blackball Site. https:\/\/monero-blackball.github.io\/monero-blackball-site\/  Justin Ehrenhofer. 2018. Monero Blackball Site. https:\/\/monero-blackball.github.io\/monero-blackball-site\/"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2018.3111245"},{"key":"e_1_3_2_1_9_1","unstructured":"HitBTC. 2018. The Monero Original Fork has happened. https:\/\/blog.hitbtc.com\/the-monero-original-fork-had-happened\/  HitBTC. 2018. The Monero Original Fork has happened. https:\/\/blog.hitbtc.com\/the-monero-original-fork-had-happened\/"},{"key":"e_1_3_2_1_10_1","unstructured":"HitBTC. 2018. Statement on MoneroV fork. https:\/\/blog.hitbtc.com\/statement-on-monerov-fork\/  HitBTC. 2018. Statement on MoneroV fork. https:\/\/blog.hitbtc.com\/statement-on-monerov-fork\/"},{"key":"e_1_3_2_1_11_1","unstructured":"HitBTC. 2018. Statement on XMO Monero fork. https:\/\/blog.hitbtc.com\/statement-on-xmo-monero-fork\/  HitBTC. 2018. Statement on XMO Monero fork. https:\/\/blog.hitbtc.com\/statement-on-xmo-monero-fork\/"},{"key":"e_1_3_2_1_13_1","unstructured":"knaccc. 2017. Description of a potential privacy leak and recommendation to mitigate. https:\/\/github.com\/monero-project\/monero\/issues\/1673#issuecomment-278509986  knaccc. 2017. Description of a potential privacy leak and recommendation to mitigate. https:\/\/github.com\/monero-project\/monero\/issues\/1673#issuecomment-278509986"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66399-9_9"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2013.17"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-27800-9_28"},{"key":"e_1_3_2_1_17_1","volume-title":"Data Privacy Management, Cryptocurrencies and Blockchain Technology","author":"McCorry Patrick","unstructured":"Patrick McCorry , Ethan Heilman , and Andrew Miller . 2017. Atomically trading with roger: Gambling on the success of a hardfork . In Data Privacy Management, Cryptocurrencies and Blockchain Technology . Springer , 334--353. Patrick McCorry, Ethan Heilman, and Andrew Miller. 2017. Atomically trading with roger: Gambling on the success of a hardfork. In Data Privacy Management, Cryptocurrencies and Blockchain Technology. Springer, 334--353."},{"key":"e_1_3_2_1_18_1","volume-title":"A Fistful of Bitcoins: Characterizing Payments Among Men with No Names. USENIX ;login","author":"Meiklejohn Sarah","year":"2013","unstructured":"Sarah Meiklejohn , Marjori Pomarole , Grant Jordan , Kirill Levchenko , Damon McCoy , Geoffrey M. Voelker , and Stefan Savage . 2013. A Fistful of Bitcoins: Characterizing Payments Among Men with No Names. USENIX ;login : ( 2013 ). Sarah Meiklejohn, Marjori Pomarole, Grant Jordan, Kirill Levchenko, Damon McCoy, Geoffrey M. Voelker, and Stefan Savage. 2013. A Fistful of Bitcoins: Characterizing Payments Among Men with No Names. USENIX ;login: (2013)."},{"key":"e_1_3_2_1_19_1","unstructured":"Monero. {n. d.}. Monero XMR Forks & Hard Forks. https:\/\/monero.org\/forks\/  Monero. {n. d.}. Monero XMR Forks & Hard Forks. https:\/\/monero.org\/forks\/"},{"key":"e_1_3_2_1_20_1","unstructured":"monero hax123. 2018. Corrupt RPC responses from remote daemon nodes can lead to transaction tracing. https:\/\/hackerone.com\/reports\/304770  monero hax123. 2018. Corrupt RPC responses from remote daemon nodes can lead to transaction tracing. https:\/\/hackerone.com\/reports\/304770"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2018-0025"},{"key":"e_1_3_2_1_22_1","volume-title":"Bitcoin: A peer-to-peer electronic cash system. Report","author":"Nakamoto Satoshi","year":"2008","unstructured":"Satoshi Nakamoto . 2008 . Bitcoin: A peer-to-peer electronic cash system. Report . http:\/\/bitcoin.org\/bitcoin.pdf Satoshi Nakamoto. 2008. Bitcoin: A peer-to-peer electronic cash system. Report. http:\/\/bitcoin.org\/bitcoin.pdf"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.5195\/LEDGER.2016.34"},{"key":"e_1_3_2_1_24_1","volume-title":"MRL-0001: A note on chain reactions in traceability in CryptoNote 2.0. Technical report2014","author":"Noether Surae","year":"2014","unstructured":"Surae Noether , Sarang Noether , and Adam Mackenzie . 2014. MRL-0001: A note on chain reactions in traceability in CryptoNote 2.0. Technical report2014 ( 2014 ). Surae Noether, Sarang Noether, and Adam Mackenzie. 2014. MRL-0001: A note on chain reactions in traceability in CryptoNote 2.0. Technical report2014 (2014)."},{"key":"e_1_3_2_1_25_1","unstructured":"propercoil. 2018. Replay protection? https:\/\/www.reddit.com\/r\/Monero\/comments\/8agjfd\/replay_protection\/dx0lun4\/  propercoil. 2018. Replay protection? https:\/\/www.reddit.com\/r\/Monero\/comments\/8agjfd\/replay_protection\/dx0lun4\/"},{"key":"e_1_3_2_1_26_1","unstructured":"Bailey Reutzel. 2017. Logical or Not Bitcoin's Coming Fork Is Boosting Its Price. https:\/\/www.coindesk.com\/logical-not-bitcoins-coming-fork-boosting-price\/  Bailey Reutzel. 2017. Logical or Not Bitcoin's Coming Fork Is Boosting Its Price. https:\/\/www.coindesk.com\/logical-not-bitcoins-coming-fork-boosting-price\/"},{"key":"e_1_3_2_1_27_1","volume-title":"Financial Cryptography and Data Security","author":"Ron Dorit","unstructured":"Dorit Ron and Adi Shamir . 2013. Quantitative analysis of the full bitcoin transaction graph . In Financial Cryptography and Data Security . Springer , 6--24. Dorit Ron and Adi Shamir. 2013. Quantitative analysis of the full bitcoin transaction graph. In Financial Cryptography and Data Security. Springer, 6--24."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"crossref","unstructured":"Jeff Sauro and James R Lewis. 2016. Quantifying the user experience: Practical statistics for user research .Morgan Kaufmann.   Jeff Sauro and James R Lewis. 2016. Quantifying the user experience: Practical statistics for user research .Morgan Kaufmann.","DOI":"10.1016\/B978-0-12-802308-2.00002-3"},{"key":"e_1_3_2_1_29_1","unstructured":"sgp. 2018. How can individuals safeguard themselves and the community against a key reusing fork? https:\/\/monero.stackexchange.com\/a\/7847  sgp. 2018. How can individuals safeguard themselves and the community against a key reusing fork? https:\/\/monero.stackexchange.com\/a\/7847"},{"key":"e_1_3_2_1_30_1","unstructured":"Riccardo Spagni. 2018. Monero 0.13.0 \"Beryllium Bullet\" Release. https:\/\/www.getmonero.org\/2018\/10\/11\/monero-0.13.0-released.html  Riccardo Spagni. 2018. Monero 0.13.0 \"Beryllium Bullet\" Release. https:\/\/www.getmonero.org\/2018\/10\/11\/monero-0.13.0-released.html"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66399-9_25"},{"key":"e_1_3_2_1_32_1","unstructured":"user36303. 2017. Replay attack and Cryptonotes. https:\/\/monero.stackexchange.com\/a\/5718  user36303. 2017. Replay attack and Cryptonotes. https:\/\/monero.stackexchange.com\/a\/5718"},{"key":"e_1_3_2_1_33_1","unstructured":"user36303. 2018. How can individuals safeguard themselves and the community against a key reusing fork? https:\/\/monero.stackexchange.com\/a\/7844  user36303. 2018. How can individuals safeguard themselves and the community against a key reusing fork? https:\/\/monero.stackexchange.com\/a\/7844"},{"key":"e_1_3_2_1_34_1","volume-title":"Cryptonote v 2.0","author":"van Saberhagen Nicolas","year":"2013","unstructured":"Nicolas van Saberhagen . 2018. Cryptonote v 2.0 , 2013 . URL: https:\/\/cryptonote.org\/whitepaper.pdf. White Paper. Accessed ( 2018), 04--13. Nicolas van Saberhagen. 2018. Cryptonote v 2.0, 2013. URL: https:\/\/cryptonote.org\/whitepaper.pdf. White Paper. Accessed (2018), 04--13."},{"key":"e_1_3_2_1_35_1","volume-title":"TrustCom","author":"Wijaya Dimaz A.","unstructured":"Dimaz A. Wijaya , Joseph Liu , Ron Steinfeld , and Dongxi Liu . 2018a. Monero Ring Attack: Recreating Zero Mixin Transaction Effect . In TrustCom . IEEE , 1196--1201. Dimaz A. Wijaya, Joseph Liu, Ron Steinfeld, and Dongxi Liu. 2018a. Monero Ring Attack: Recreating Zero Mixin Transaction Effect. In TrustCom. IEEE, 1196--1201."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"crossref","unstructured":"Dimaz Ankaa Wijaya Joseph Liu Ron Steinfeld and Dongxi Liu. 2019. Risk of Asynchronous Protocol Update: Attacks to Monero Protocols. (2019). to appear.  Dimaz Ankaa Wijaya Joseph Liu Ron Steinfeld and Dongxi Liu. 2019. Risk of Asynchronous Protocol Update: Attacks to Monero Protocols. (2019). to appear.","DOI":"10.1007\/978-3-030-21548-4_17"},{"key":"e_1_3_2_1_37_1","volume-title":"Anonymity Reduction Attacks To Monero. In The 14th International Conference on Information Security and Cryptology. Springer.","author":"Wijaya Dimaz Ankaa","year":"2018","unstructured":"Dimaz Ankaa Wijaya , Joseph Liu , Ron Steinfeld , Dongxi Liu , and Tsz Hon Yuen . 2018 b. Anonymity Reduction Attacks To Monero. In The 14th International Conference on Information Security and Cryptology. Springer. Dimaz Ankaa Wijaya, Joseph Liu, Ron Steinfeld, Dongxi Liu, and Tsz Hon Yuen. 2018b. Anonymity Reduction Attacks To Monero. In The 14th International Conference on Information Security and Cryptology. Springer."},{"key":"e_1_3_2_1_38_1","volume-title":"ISC (LNCS)","author":"Yu Bin","unstructured":"Bin Yu , Joseph K. Liu , Amin Sakzad , Surya Nepal , Ron Steinfeld , Paul Rimba , and Man Ho Au. 2018. Platform-Independent Secure Blockchain-Based Voting System . In ISC (LNCS) , Vol. 11060 . Springer , 369--386. Bin Yu, Joseph K. Liu, Amin Sakzad, Surya Nepal, Ron Steinfeld, Paul Rimba, and Man Ho Au. 2018. Platform-Independent Secure Blockchain-Based Voting System. In ISC (LNCS), Vol. 11060. Springer, 369--386."},{"key":"e_1_3_2_1_39_1","volume-title":"Jiangshan Yu, Rupeng Yang, Qiuliang Xu, and Wang Fat Lau.","author":"Yu Zuoxia","year":"2019","unstructured":"Zuoxia Yu , Man Ho Au , Jiangshan Yu, Rupeng Yang, Qiuliang Xu, and Wang Fat Lau. 2019 . New Empirical Traceability Analysis of CryptoNote-Style Blockchains. In Financial Cryptography and Data Security . Zuoxia Yu, Man Ho Au, Jiangshan Yu, Rupeng Yang, Qiuliang Xu, and Wang Fat Lau. 2019. New Empirical Traceability Analysis of CryptoNote-Style Blockchains. In Financial Cryptography and Data Security."},{"key":"e_1_3_2_1_40_1","volume-title":"5th Workshop on Bitcoin and Blockchain Research, Financial Cryptography and Data Security","volume":"18","author":"Zamyatin Alexei","year":"2018","unstructured":"Alexei Zamyatin , Nicholas Stifter , Aljosha Judmayer , Philipp Schindler , Edgar Weippl , and WJ Knottebelt . 2018 . A wild velvet fork appears! Inclusive blockchain protocol changes in practice . In 5th Workshop on Bitcoin and Blockchain Research, Financial Cryptography and Data Security , Vol. 18 . Alexei Zamyatin, Nicholas Stifter, Aljosha Judmayer, Philipp Schindler, Edgar Weippl, and WJ Knottebelt. 2018. A wild velvet fork appears! Inclusive blockchain protocol changes in practice. In 5th Workshop on Bitcoin and Blockchain Research, Financial Cryptography and Data Security, Vol. 18."}],"event":{"name":"Asia CCS '19: ACM Asia Conference on Computer and Communications Security","location":"Auckland New Zealand","acronym":"Asia CCS '19","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3321705.3329823","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3321705.3329823","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:54:39Z","timestamp":1750204479000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3321705.3329823"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,7,2]]},"references-count":39,"alternative-id":["10.1145\/3321705.3329823","10.1145\/3321705"],"URL":"https:\/\/doi.org\/10.1145\/3321705.3329823","relation":{},"subject":[],"published":{"date-parts":[[2019,7,2]]},"assertion":[{"value":"2019-07-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}