{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:06:50Z","timestamp":1750309610017,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,3,31]],"date-time":"2025-03-31T00:00:00Z","timestamp":1743379200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,3,31]]},"DOI":"10.1145\/3672608.3707896","type":"proceedings-article","created":{"date-parts":[[2025,5,14]],"date-time":"2025-05-14T18:26:54Z","timestamp":1747247214000},"page":"376-385","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Attacking Anonymity Set in Tornado Cash via Wallet Fingerprints"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0002-0775-2371","authenticated-orcid":false,"given":"Martina","family":"Soleti","sequence":"first","affiliation":[{"name":"University of Padua, Padova, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8065-3700","authenticated-orcid":false,"given":"Ankit","family":"Gangwal","sequence":"additional","affiliation":[{"name":"IIIT, Hyderabad, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3612-1934","authenticated-orcid":false,"given":"Mauro","family":"Conti","sequence":"additional","affiliation":[{"name":"University of Padua, Padova, Italy"}]}],"member":"320","published-online":{"date-parts":[[2025,5,14]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"[n. d.]. Tornado Cash Classic Anonymity Mining. https:\/\/github.com\/tornadocash\/docs\/blob\/en\/tornado-cash-classic\/anonymity-mining.md"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","unstructured":"M S Bhargavi Sushmitha Katti M Shilpa Vaishnavi Kulkarni and Supraja Prasad. 2020. Transactional Data Analytics for Inferring Behavioural Traits in Ethereum Blockchain Network. 485\u2013490. 10.1109\/ICCP51029.2020.9266176","DOI":"10.1109\/ICCP51029.2020.9266176"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"Stefano Bistarelli Bruno Montalvo Ivan Mercanti and Francesco Santini. 2023. An E-Voting System Based on Tornado Cash. 120\u2013135.","DOI":"10.1007\/978-3-031-25467-3_8"},{"key":"e_1_3_2_1_4_1","unstructured":"Blocknative. [n. d.]. Blocknative Documentation. https:\/\/docs.blocknative.com\/"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/DAPPS52256.2021.00013"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.23919\/ICITST.2017.8356459"},{"key":"e_1_3_2_1_7_1","volume-title":"Haze: A Compliant Privacy Mixer. Cryptology ePrint Archive, Paper 2023\/1152.","author":"Dotan Maya","year":"2023","unstructured":"Maya Dotan, Ayelet Lotem, and Margarita Vald. 2023. Haze: A Compliant Privacy Mixer. Cryptology ePrint Archive, Paper 2023\/1152."},{"key":"e_1_3_2_1_8_1","volume-title":"Breaking the Anonymity of Ethereum Mixing Services Using Graph Feature Learning","author":"Du Hanbiao","year":"2023","unstructured":"Hanbiao Du, Zheng Che, Meng Shen, Liehuang Zhu, and Jiankun Hu. 2023. Breaking the Anonymity of Ethereum Mixing Services Using Graph Feature Learning. IEEE Transactions on Information Forensics and Security (2023), 1\u201310."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2020.102462"},{"key":"e_1_3_2_1_10_1","volume-title":"Bitcoin: A peer-to-peer electronic cash system. Satoshi Nakamoto","author":"Nakamoto Satoshi","year":"2008","unstructured":"Satoshi Nakamoto. 2008. Bitcoin: A peer-to-peer electronic cash system. Satoshi Nakamoto (2008)."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-36938-5_7"},{"key":"e_1_3_2_1_12_1","volume-title":"Cryptocurrency Wallet: A Review. In 4th International Conference on Computer, Communication and Signal Processing (ICCCSP). 1\u20137.","author":"Suratkar Saurabh","year":"2020","unstructured":"Saurabh Suratkar, Mahesh Shirole, and Sunil Bhirud. 2020. Cryptocurrency Wallet: A Review. In 4th International Conference on Computer, Communication and Signal Processing (ICCCSP). 1\u20137."},{"volume-title":"Cyber Security","author":"Tang Yujia","key":"e_1_3_2_1_13_1","unstructured":"Yujia Tang, Chang Xu, Can Zhang, Yan Wu, and Liehuang Zhu. 2022. Analysis of Address Linkability in Tornado Cash on Ethereum. In Cyber Security. Springer Nature Singapore, Singapore, 39\u201350."},{"key":"e_1_3_2_1_14_1","volume-title":"On how zero-knowledge proof blockchain mixers improve, and worsen user privacy","author":"Wang Zhipeng","year":"2022","unstructured":"Zhipeng Wang, Stefanos Chaliasos, Kaihua Qin, Liyi Zhou, Lifeng Gao, Pascal Berrang, Benjamin Livshits, and Arthur Gervais. 2023. On how zero-knowledge proof blockchain mixers improve, and worsen user privacy., 2022\u20132032 pages."},{"key":"e_1_3_2_1_15_1","volume-title":"Knottenbelt","author":"Wang Zhipeng","year":"2023","unstructured":"Zhipeng Wang, Xihan Xiong, and William J. Knottenbelt. 2023. Blockchain Transaction Censorship: (In)secure and (In)efficient? Cryptology ePrint Archive, Paper 2023\/786."},{"key":"e_1_3_2_1_16_1","volume-title":"Herman O Demaestri, et al.","author":"Wu Mike","year":"2022","unstructured":"Mike Wu, Will McTighe, Kaili Wang, Istvan A Seres, Nick Bax, Manuel Puebla, Mariano Mendez, Federico Carrone, Tom\u00e1s De Mattey, Herman O Demaestri, et al. 2022. Tutela: An open-source tool for assessing user-privacy on ethereum and tornado cash."},{"key":"e_1_3_2_1_17_1","volume-title":"Zcash and Ethereum. In IEEE International Conference on Big Data, Artificial Intelligence and Internet of Things Engineering (ICBAIE). 45\u201348","author":"Zhou Yitao","year":"2021","unstructured":"Yitao Zhou, Judong Wu, and Shengxin Zhang. 2021. Anonymity Analysis of Bitcoin, Zcash and Ethereum. In IEEE International Conference on Big Data, Artificial Intelligence and Internet of Things Engineering (ICBAIE). 45\u201348."}],"event":{"name":"SAC '25: 40th ACM\/SIGAPP Symposium on Applied Computing","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing"],"location":"Catania International Airport Catania Italy","acronym":"SAC '25"},"container-title":["Proceedings of the 40th ACM\/SIGAPP Symposium on Applied Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3672608.3707896","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3672608.3707896","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:57:33Z","timestamp":1750298253000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3672608.3707896"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3,31]]},"references-count":17,"alternative-id":["10.1145\/3672608.3707896","10.1145\/3672608"],"URL":"https:\/\/doi.org\/10.1145\/3672608.3707896","relation":{},"subject":[],"published":{"date-parts":[[2025,3,31]]},"assertion":[{"value":"2025-05-14","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}