{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T22:33:32Z","timestamp":1775774012630,"version":"3.50.1"},"reference-count":49,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2020,4,17]],"date-time":"2020-04-17T00:00:00Z","timestamp":1587081600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61872057"],"award-info":[{"award-number":["61872057"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Hong Kong RGC Project","award":["152193\/19E"],"award-info":[{"award-number":["152193\/19E"]}]},{"name":"National Key R8D Program of China","award":["2018YFB0804100"],"award-info":[{"award-number":["2018YFB0804100"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Internet Technol."],"published-print":{"date-parts":[[2020,5,31]]},"abstract":"<jats:p>\n            Ethereum, a blockchain, supports its own cryptocurrency named Ether and smart contracts. Although more than 8M smart contracts have been deployed on Ethereum, little is known about the characteristics of its users, smart contracts, and the relationships among them. We conduct the\n            <jats:italic>first<\/jats:italic>\n            systematic study on Ethereum by leveraging graph analysis to characterize three major activities on Ethereum, namely money transfer, smart contract creation, and smart contract invocation. We collect all transaction data, construct three graphs from the data to characterize major activities via graph analysis, and discover new insights. Moreover, we address three security issues based on graphs.\n          <\/jats:p>","DOI":"10.1145\/3381036","type":"journal-article","created":{"date-parts":[[2020,5,4]],"date-time":"2020-05-04T06:51:22Z","timestamp":1588575082000},"page":"1-32","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":166,"title":["Understanding Ethereum via Graph Analysis"],"prefix":"10.1145","volume":"20","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9165-8331","authenticated-orcid":false,"given":"Ting","family":"Chen","sequence":"first","affiliation":[{"name":"Center for Cybersecurity, University of Electronic Science and Technology of China, Chengdu, Sichuan, China"}]},{"given":"Zihao","family":"Li","sequence":"additional","affiliation":[{"name":"Center for Cybersecurity, University of Electronic Science and Technology of China, Chengdu, Sichuan, China"}]},{"given":"Yuxiao","family":"Zhu","sequence":"additional","affiliation":[{"name":"School of Management, Guangdong University of Technology; School of Big Data and Strategy, Guangdong University of Technology, Guangzhou, Guangdong Province, China"}]},{"given":"Jiachi","family":"Chen","sequence":"additional","affiliation":[{"name":"Department of Computing, The Hong Kong Polytechnic University, Hong Kong, China"}]},{"given":"Xiapu","family":"Luo","sequence":"additional","affiliation":[{"name":"Department of Computing, The Hong Kong Polytechnic University, Hong Kong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7466-0384","authenticated-orcid":false,"given":"John Chi-Shing","family":"Lui","sequence":"additional","affiliation":[{"name":"Department of Computer Science 8 Engineering, The Chinese University of Hong Kong, Shatin, NT, Hong Kong, China"}]},{"given":"Xiaodong","family":"Lin","sequence":"additional","affiliation":[{"name":"University of Guelph, Guelph, Ontario, Canada"}]},{"given":"Xiaosong","family":"Zhang","sequence":"additional","affiliation":[{"name":"Center for Cybersecurity, University of Electronic Science and Technology of China, Chengdu, Sichuan, China"}]}],"member":"320","published-online":{"date-parts":[[2020,4,17]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"Bitcoin Wiki. 2018. Bitcoin Script. Retrieved from https:\/\/en.bitcoin.it\/wiki\/Script.  Bitcoin Wiki. 2018. Bitcoin Script. Retrieved from https:\/\/en.bitcoin.it\/wiki\/Script."},{"key":"e_1_2_1_2_1","unstructured":"Coin Market Cap. 2018. CrypoCurrency Market Capitalizations. Retrieved from https:\/\/coinmarketcap.com\/.  Coin Market Cap. 2018. CrypoCurrency Market Capitalizations. Retrieved from https:\/\/coinmarketcap.com\/."},{"key":"e_1_2_1_3_1","unstructured":"Ethereum. 2018. Ethereum Homestead Documentation. Retrieved from http:\/\/www.ethdocs.org\/en\/latest\/.  Ethereum. 2018. Ethereum Homestead Documentation. Retrieved from http:\/\/www.ethdocs.org\/en\/latest\/."},{"key":"e_1_2_1_4_1","unstructured":"Ethereum community. 2018. Etherscan The Ethereum Blockchain Explorer. Retrieved from https:\/\/etherscan.io\/.  Ethereum community. 2018. Etherscan The Ethereum Blockchain Explorer. Retrieved from https:\/\/etherscan.io\/."},{"key":"e_1_2_1_5_1","first-page":"455","article-title":"On a robust correlation coefficient","volume":"39","author":"Abdullah Mokhtar Bin","year":"1990","unstructured":"Mokhtar Bin Abdullah . 1990 . On a robust correlation coefficient . J. Roy. Stat. Soc. Series D (The Stat.) 39 , 4 (1990), 455 -- 460 . Mokhtar Bin Abdullah. 1990. On a robust correlation coefficient. J. Roy. Stat. Soc. Series D (The Stat.) 39, 4 (1990), 455--460.","journal-title":"J. Roy. Stat. Soc. Series D (The Stat.)"},{"key":"e_1_2_1_6_1","volume-title":"Mastering Bitcoin: Unlocking Digital Cryptocurrencies. O\u2019Reilly Media","author":"Antonopoulos Andreas M.","year":"2014","unstructured":"Andreas M. Antonopoulos . 2014 . Mastering Bitcoin: Unlocking Digital Cryptocurrencies. O\u2019Reilly Media , Inc . Andreas M. Antonopoulos. 2014. Mastering Bitcoin: Unlocking Digital Cryptocurrencies. O\u2019Reilly Media, Inc."},{"key":"e_1_2_1_7_1","volume-title":"Proceedings of the International Conference on Web Information Systems and Technologies.","author":"Baumann Annika","year":"2014","unstructured":"Annika Baumann , Benjamin Fabian , and Matthias Lischke . 2014 . Exploring the Bitcoin network . In Proceedings of the International Conference on Web Information Systems and Technologies. Annika Baumann, Benjamin Fabian, and Matthias Lischke. 2014. Exploring the Bitcoin network. In Proceedings of the International Conference on Web Information Systems and Technologies."},{"key":"e_1_2_1_8_1","unstructured":"Bitcoin. 2017. Change. Retrieved from https:\/\/en.bitcoin.it\/wiki\/Change.  Bitcoin. 2017. Change. Retrieved from https:\/\/en.bitcoin.it\/wiki\/Change."},{"key":"e_1_2_1_9_1","unstructured":"Bok. 2016. Ethereum Network Attackers IP Address Is Traceable. Retrieved from https:\/\/www.bokconsulting.com.au\/blog\/ethereum-network-attackers-ip-address-is-traceable\/.  Bok. 2016. Ethereum Network Attackers IP Address Is Traceable. Retrieved from https:\/\/www.bokconsulting.com.au\/blog\/ethereum-network-attackers-ip-address-is-traceable\/."},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0169-7552(98)00110-X"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(00)00083-9"},{"key":"e_1_2_1_12_1","unstructured":"Christian Cachin A. D. Caro Pedro Moreno-Sanchez Bj\u00f6rn Tackmann and Marko Vukolic. 2017. The transaction graph for modeling blockchain semantics. Retrieved from https:\/\/eprint.iacr.org\/2017\/1070.pdf.  Christian Cachin A. D. Caro Pedro Moreno-Sanchez Bj\u00f6rn Tackmann and Marko Vukolic. 2017. The transaction graph for modeling blockchain semantics. Retrieved from https:\/\/eprint.iacr.org\/2017\/1070.pdf."},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.23919\/ICITST.2017.8356459"},{"key":"e_1_2_1_14_1","volume-title":"Proceedings of the European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases.","author":"Charlier J\u00e9r\u00e9my","year":"2017","unstructured":"J\u00e9r\u00e9my Charlier , Sofiane Lagraa , and Jerome Francois . 2017 . Profiling smart contracts interactions with tensor decomposition and graph mining . In Proceedings of the European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases. J\u00e9r\u00e9my Charlier, Sofiane Lagraa, and Jerome Francois. 2017. Profiling smart contracts interactions with tensor decomposition and graph mining. In Proceedings of the European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases."},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2017.7884650"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-72359-4_1"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3183399.3183420"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2018.8486401"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1137\/070710111"},{"key":"e_1_2_1_20_1","unstructured":"Ethereum. 2018. JavaScript API. Retrieved from https:\/\/github.com\/ethereum\/wiki\/wiki\/JavaScript-API#web3ethgettransaction.  Ethereum. 2018. JavaScript API. Retrieved from https:\/\/github.com\/ethereum\/wiki\/wiki\/JavaScript-API#web3ethgettransaction."},{"key":"e_1_2_1_21_1","unstructured":"Etherscan. 2018. Ethereum Developer APIs. Retrieved from https:\/\/etherscan.io\/apis#accounts.  Etherscan. 2018. Ethereum Developer APIs. Retrieved from https:\/\/etherscan.io\/apis#accounts."},{"key":"e_1_2_1_22_1","unstructured":"Gnosis. 2018. Ethereum Multisignature Wallet. Retrieved from https:\/\/github.com\/Gnosis\/MultiSigWallet.  Gnosis. 2018. Ethereum Multisignature Wallet. Retrieved from https:\/\/github.com\/Gnosis\/MultiSigWallet."},{"key":"e_1_2_1_23_1","unstructured":"Alex Greaves and Benjamin Au. 2015. Using the bitcoin transaction graph to predict the price of bitcoin. Retrieved from http:\/\/snap.stanford.edu\/class\/cs224w-2015\/projects_2015\/Using_the_Bitcoin_Transaction_Graph_to_Predict_the_Price_of_Bitcoin.pdf.  Alex Greaves and Benjamin Au. 2015. Using the bitcoin transaction graph to predict the price of bitcoin. Retrieved from http:\/\/snap.stanford.edu\/class\/cs224w-2015\/projects_2015\/Using_the_Bitcoin_Transaction_Graph_to_Predict_the_Price_of_Bitcoin.pdf."},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3276486"},{"key":"e_1_2_1_25_1","unstructured":"Hiddentao. 2016. Prevent replay attacks. Retrieved from https:\/\/github.com\/hiddentao\/smart-solidity-docs\/blob\/master\/PreventReplayAttacks.md.  Hiddentao. 2016. Prevent replay attacks. Retrieved from https:\/\/github.com\/hiddentao\/smart-solidity-docs\/blob\/master\/PreventReplayAttacks.md."},{"key":"e_1_2_1_26_1","unstructured":"IC3. 2016. GasToken.io\u2014Cheaper Ethereum Transactions Today. Retrieved from https:\/\/gastoken.io\/.  IC3. 2016. GasToken.io\u2014Cheaper Ethereum Transactions Today. Retrieved from https:\/\/gastoken.io\/."},{"key":"e_1_2_1_27_1","unstructured":"Phanny ITH. 2009. Guideline for Interpreting Correlation Coefficient. Retrieved from https:\/\/www.slideshare.net\/phannithrupp\/guideline-for-interpreting-correlation-coefficient.  Phanny ITH. 2009. Guideline for Interpreting Correlation Coefficient. Retrieved from https:\/\/www.slideshare.net\/phannithrupp\/guideline-for-interpreting-correlation-coefficient."},{"key":"e_1_2_1_28_1","unstructured":"Jerome Kehrli. 2016. Blockchain 2.0\u2014From Bitcoin Transactions to Smart Contract applications. Retrieved from https:\/\/www.niceideas.ch\/blockchain_2.0.pdf.  Jerome Kehrli. 2016. Blockchain 2.0\u2014From Bitcoin Transactions to Smart Contract applications. Retrieved from https:\/\/www.niceideas.ch\/blockchain_2.0.pdf."},{"key":"e_1_2_1_29_1","unstructured":"Kentstate. 2019. SPSS Tutorials: Pearson Correlation. Retrieved from https:\/\/libguides.library.kent.edu\/SPSS\/PearsonCorr.  Kentstate. 2019. SPSS Tutorials: Pearson Correlation. Retrieved from https:\/\/libguides.library.kent.edu\/SPSS\/PearsonCorr."},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3278532.3278575"},{"key":"e_1_2_1_31_1","unstructured":"Sergio Demian Lerner. 2015. RSK-White Paper Overview. Retrieved from https:\/\/docs.rsk.co\/RSK_White_Paper-Overview.pdf.  Sergio Demian Lerner. 2015. RSK-White Paper Overview. Retrieved from https:\/\/docs.rsk.co\/RSK_White_Paper-Overview.pdf."},{"key":"e_1_2_1_32_1","volume-title":"A survey on the security of blockchain systems. Fut. Gen. Comput. Syst. (Aug","author":"Li Xiaoqi","year":"2017","unstructured":"Xiaoqi Li , Peng Jiang , Ting Chen , Xiapu Luo , and Qiaoyan Wen . 2017. A survey on the security of blockchain systems. Fut. Gen. Comput. Syst. (Aug . 2017 ). Xiaoqi Li, Peng Jiang, Ting Chen, Xiapu Luo, and Qiaoyan Wen. 2017. A survey on the security of blockchain systems. Fut. Gen. Comput. Syst. (Aug. 2017)."},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978309"},{"key":"e_1_2_1_34_1","volume-title":"Proceedings of the International Workshop on Complex Networks and their Applications.","author":"Francesco Maesa Damiano Di","year":"2016","unstructured":"Damiano Di Francesco Maesa and Laura Ricci . 2016 . An analysis of the Bitcoin users graph: Inferring unusual behaviours . In Proceedings of the International Workshop on Complex Networks and their Applications. Damiano Di Francesco Maesa and Laura Ricci. 2016. An analysis of the Bitcoin users graph: Inferring unusual behaviours. In Proceedings of the International Workshop on Complex Networks and their Applications."},{"key":"e_1_2_1_35_1","first-page":"7","article-title":"Assortativity analysis of real-world network graphs based on centrality metrics","volume":"9","author":"Meghanathan Natarajan","year":"2016","unstructured":"Natarajan Meghanathan . 2016 . Assortativity analysis of real-world network graphs based on centrality metrics . Comput. Inf. Sci. 9 (2016), 7 -- 25 . Issue 3. Natarajan Meghanathan. 2016. Assortativity analysis of real-world network graphs based on centrality metrics. Comput. Inf. Sci. 9 (2016), 7--25. Issue 3.","journal-title":"Comput. Inf. Sci."},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2504730.2504747"},{"key":"e_1_2_1_37_1","unstructured":"Nick Mwenda. 2018. Last winner game jams Ethereum network\u2014Is Ethereum (ETH) dominance at stake? Retrieved from https:\/\/cryptoglobalist.com\/2018\/08\/17\/last-winner-game-jams-ethereum-network-is-ethereum-eth-dominance-at-stake\/.  Nick Mwenda. 2018. Last winner game jams Ethereum network\u2014Is Ethereum (ETH) dominance at stake? Retrieved from https:\/\/cryptoglobalist.com\/2018\/08\/17\/last-winner-game-jams-ethereum-network-is-ethereum-eth-dominance-at-stake\/."},{"key":"e_1_2_1_38_1","unstructured":"PeckShield. 2018. Pwning Fomo3D Revealed: Iterative Pre-Calculated Contract Creation For Airdrop Prizes! Retrieved from https:\/\/medium.com\/@peckshield\/pwning-fomo3d-revealed-iterative-pre-calculated-contract-creation-for-airdrop-prizes-31944a01387e.  PeckShield. 2018. Pwning Fomo3D Revealed: Iterative Pre-Calculated Contract Creation For Airdrop Prizes! Retrieved from https:\/\/medium.com\/@peckshield\/pwning-fomo3d-revealed-iterative-pre-calculated-contract-creation-for-airdrop-prizes-31944a01387e."},{"key":"e_1_2_1_39_1","doi-asserted-by":"crossref","unstructured":"Fergal Reid and Martin Harrigan. 2011. An analysis of anonymity in the Bitcoin system. In Security and Privacy in Social Networks. 197--223.  Fergal Reid and Martin Harrigan. 2011. An analysis of anonymity in the Bitcoin system. In Security and Privacy in Social Networks. 197--223.","DOI":"10.1007\/978-1-4614-4139-7_10"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.71.057101"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-96661-8_45"},{"key":"e_1_2_1_42_1","unstructured":"Flora Sun. 2018. UTXO vs Account\/Balance Model. Retrieved from https:\/\/medium.com\/@sunflora98\/utxo-vs-account-balance-model-5e6470f4e0cf.  Flora Sun. 2018. UTXO vs Account\/Balance Model. Retrieved from https:\/\/medium.com\/@sunflora98\/utxo-vs-account-balance-model-5e6470f4e0cf."},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243780"},{"key":"e_1_2_1_44_1","unstructured":"Fabian Vogelsteller and Vitalik Buterin. 2015. ERC-20 Token Standard. Retrieved from https:\/\/github.com\/ethereum\/EIPs\/blob\/master\/EIPS\/eip-20.md.  Fabian Vogelsteller and Vitalik Buterin. 2015. ERC-20 Token Standard. Retrieved from https:\/\/github.com\/ethereum\/EIPs\/blob\/master\/EIPS\/eip-20.md."},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.5121\/ijcnc.2012.4311"},{"key":"e_1_2_1_46_1","volume-title":"Ethereum: A secure decentralised generalised transaction ledger.","author":"Wood Gavin","year":"2018","unstructured":"Gavin Wood . 2018 . Ethereum: A secure decentralised generalised transaction ledger. Retrieved from https:\/\/ethereum.github.io\/yellowpaper\/paper.pdf. Gavin Wood. 2018. Ethereum: A secure decentralised generalised transaction ledger. Retrieved from https:\/\/ethereum.github.io\/yellowpaper\/paper.pdf."},{"key":"e_1_2_1_47_1","volume-title":"Yang and Jinhyoung Kim","author":"Steve","year":"2015","unstructured":"Steve Y. Yang and Jinhyoung Kim . 2015 . Bitcoin market return and volatility forecasting using transaction network flow properties. In Proceedings of the IEEE Symposium Series on Computational Intelligence . Steve Y. Yang and Jinhyoung Kim. 2015. Bitcoin market return and volatility forecasting using transaction network flow properties. In Proceedings of the IEEE Symposium Series on Computational Intelligence."},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24123-4_5"},{"key":"e_1_2_1_49_1","volume-title":"Proceedings of the USENIX Security Symposium.","author":"Zhou Yi","year":"2018","unstructured":"Yi Zhou , Deepak Kumar , Surya Bakshi , Joshua Mason , Andrew Miller , and Michael Bailey . 2018 . Erays: Reverse engineering Ethereum\u2019s opaque smart contracts . In Proceedings of the USENIX Security Symposium. Yi Zhou, Deepak Kumar, Surya Bakshi, Joshua Mason, Andrew Miller, and Michael Bailey. 2018. Erays: Reverse engineering Ethereum\u2019s opaque smart contracts. In Proceedings of the USENIX Security Symposium."}],"container-title":["ACM Transactions on Internet Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3381036","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3381036","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:44:58Z","timestamp":1750203898000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3381036"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,4,17]]},"references-count":49,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2020,5,31]]}},"alternative-id":["10.1145\/3381036"],"URL":"https:\/\/doi.org\/10.1145\/3381036","relation":{},"ISSN":["1533-5399","1557-6051"],"issn-type":[{"value":"1533-5399","type":"print"},{"value":"1557-6051","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,4,17]]},"assertion":[{"value":"2019-06-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2020-01-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2020-04-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}