{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T16:09:02Z","timestamp":1774541342840,"version":"3.50.1"},"reference-count":62,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2024,10,4]],"date-time":"2024-10-04T00:00:00Z","timestamp":1728000000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100000038","name":"Natural Sciences and Engineering Research Council of Canada","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100000038","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Internet Technol."],"published-print":{"date-parts":[[2024,11,30]]},"abstract":"<jats:p>Decentralized Finance (DeFi), a pivotal component of the emerging Web3 landscape, is gaining popularity but remains vulnerable to market manipulations, such as wash trading. Wash trading is an illegal practice, where traders buy and sell assets to themselves within cryptocurrency exchanges to artificially inflate trading volumes and distort market perceptions. However, current research primarily focuses on traditional exchanges based on the Order-book mechanism (similar to stock markets), while ignoring the Automated Market Maker (AMM) exchanges, which dominate over 75% of the market and represent a significant innovation within the DeFi.<\/jats:p>\n          <jats:p>This study utilizes entity recognition technology to detect wash trading on AMM exchanges within Ethereum-like systems, based on the understanding that colluding addresses (perceived as the same entity) must use ETH for transaction fees and exhibit direct or indirect ETH transfer links. We identify wash trading when addresses with transfer connections almost simultaneously buy and sell assets while their total asset holdings remain nearly constant. This comprehensive blockchain network analysis, compared to focusing solely on transactions within exchanges, unveils covert wash trading activities. Our detection method achieves a 95.9% recall and a 96.7% true negative rate in identifying pools affected by wash trading, demonstrating its superiority over existing methods. Furthermore, we apply our method to 98,945 pools from Uniswap V2 &amp; V3 (the most popular AMM exchanges on Ethereum) and identify 1,070,626 abnormal transactions, totaling $27.51 billion in trading volume. Analysis of these transactions uncovers insights into wash traders\u2019 behaviors, including the utilization of multiple addresses and the dual roles of certain addresses as wash traders and liquidity providers. These insights are crucial for developing more effective strategies to combat fraudulent activities in the DeFi ecosystem and enhance financial scrutiny.<\/jats:p>","DOI":"10.1145\/3689631","type":"journal-article","created":{"date-parts":[[2024,8,23]],"date-time":"2024-08-23T12:24:30Z","timestamp":1724415870000},"page":"1-30","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Exposing Stealthy Wash Trading on Automated Market Maker Exchanges"],"prefix":"10.1145","volume":"24","author":[{"ORCID":"https:\/\/orcid.org\/0009-0006-4363-0952","authenticated-orcid":false,"given":"Rundong","family":"Gan","sequence":"first","affiliation":[{"name":"School of Computer Science, University of Guelph, Guelph, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4939-1642","authenticated-orcid":false,"given":"Le","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Computer Science, University of Guelph, Guelph, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8069-3182","authenticated-orcid":false,"given":"Liang","family":"Xue","sequence":"additional","affiliation":[{"name":"School of Information Technology, York University, Toronto, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8916-6645","authenticated-orcid":false,"given":"Xiaodong","family":"Lin","sequence":"additional","affiliation":[{"name":"University of Guelph, Guelph, Canada"}]}],"member":"320","published-online":{"date-parts":[[2024,10,4]]},"reference":[{"key":"e_1_3_3_2_2","first-page":"3","volume-title":"Proceedings of the International Conference on Future Data and Security Engineering","author":"Buldas Ahto","year":"2022","unstructured":"Ahto Buldas, Dirk Draheim, Mike Gault, and M\u00e4rt Saarepera. 2022. Towards a foundation of Web3. In Proceedings of the International Conference on Future Data and Security Engineering. Springer, Berlin, 3\u201318."},{"key":"e_1_3_3_3_2","article-title":"Web3 is Our Chance to Make a Better Internet","author":"Stackpole Thomas","unstructured":"Thomas Stackpole. Web3 is Our Chance to Make a Better Internet. [EB\/OL]. ([n.d.]). Retrieved June 24, 2024 from https:\/\/hbr.org\/2022\/05\/web3-is-our-chance-to-make-a-better-internet.","journal-title":"[EB\/OL]"},{"key":"e_1_3_3_4_2","doi-asserted-by":"crossref","first-page":"77284","DOI":"10.1109\/ACCESS.2022.3192837","article-title":"An ultra-scalable blockchain platform for universal asset tokenization: Design and implementation","volume":"10","author":"Buldas Ahto","year":"2022","unstructured":"Ahto Buldas, Dirk Draheim, Mike Gault, Risto Laanoja, Takehiko Nagumo, M\u00e4rt Saarepera, Syed Attique Shah, Joosep Simm, Jamie Steiner, Tanel Tammet et\u00a0al. 2022. An ultra-scalable blockchain platform for universal asset tokenization: Design and implementation. IEEE Access 10 (2022), 77284\u201377322.","journal-title":"IEEE Access"},{"key":"e_1_3_3_5_2","article-title":"CeFi vs. DeFi\u2013comparing centralized to decentralized finance","author":"Qin Kaihua","year":"2021","unstructured":"Kaihua Qin, Liyi Zhou, Yaroslav Afonin, Ludovico Lazzaretti, and Arthur Gervais. 2021. CeFi vs. DeFi\u2013comparing centralized to decentralized finance. Retrieved from https:\/\/arXiv:2106.08157.","journal-title":"Retrieved from https:\/\/arXiv:2106.08157"},{"key":"e_1_3_3_6_2","unstructured":"DeFiLlama. 2023. Decentralized Finance Analytics and Rankings. Retrieved January 2023 from https:\/\/defillama.com\/"},{"key":"e_1_3_3_7_2","volume-title":"Proceedings of the International Conference on Information Systems","author":"Eigelshoven Felix","year":"2021","unstructured":"Felix Eigelshoven, Andre Ullrich, and Douglas A. Parry. 2021. Cryptocurrency market manipulation: A systematic literature review. In Proceedings of the International Conference on Information Systems."},{"issue":"11","key":"e_1_3_3_8_2","doi-asserted-by":"crossref","first-page":"2351","DOI":"10.1109\/TNNLS.2015.2480959","article-title":"Detecting wash trade in financial market using digraphs and dynamic programming","volume":"27","author":"Cao Yi","year":"2015","unstructured":"Yi Cao, Yuhua Li, Sonya Coleman, Ammar Belatreche, and Thomas Martin McGinnity. 2015. Detecting wash trade in financial market using digraphs and dynamic programming. IEEE Trans. Neural Netw. Learn. Syst. 27, 11 (2015), 2351\u20132363.","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"key":"e_1_3_3_9_2","doi-asserted-by":"crossref","first-page":"92","DOI":"10.1016\/j.jbef.2018.08.004","article-title":"Wash trades as a stock market manipulation tool","volume":"20","author":"Imisiker Serkan","year":"2018","unstructured":"Serkan Imisiker and Bedri Kamil Onur Tas. 2018. Wash trades as a stock market manipulation tool. J. Behav. Exper. Finance 20 (2018), 92\u201398.","journal-title":"J. Behav. Exper. Finance"},{"key":"e_1_3_3_10_2","article-title":"CFTC Glossary Wash Trading","author":"(CFTC) Commodity Futures Trading Commission","unstructured":"Commodity Futures Trading Commission (CFTC). CFTC Glossary Wash Trading. [EB\/OL]. ([n.d.]). Retrieved Oct. 4, 2022 from https:\/\/www.cftc.gov\/LearnAndProtect\/EducationCenter\/CFTCGlossary\/glossary_wxyz.html#washtrading","journal-title":"[EB\/OL]"},{"key":"e_1_3_3_11_2","unstructured":"CoinMarketCap. 2024. Rankings of Cryptocurrencies. Retrieved January 2024 from https:\/\/coinmarketcap.com\/"},{"key":"e_1_3_3_12_2","unstructured":"CoinGecko. 2024. Rankings of Cryptocurrencies. Retrieved January 2024 from https:\/\/www.coingecko.com\/"},{"key":"e_1_3_3_13_2","article-title":"The Administration\u2019s Roadmap to Mitigate Cryptocurrencies\u2019 Risks","author":"House The White","unstructured":"The White House. The Administration\u2019s Roadmap to Mitigate Cryptocurrencies\u2019 Risks. [EB\/OL]. ([n.d.]). Retrieved May 4, 2023 from https:\/\/www.whitehouse.gov\/nec\/briefing-room\/2023\/01\/27\/the-administrations-roadmap-to-mitigate-cryptocurrencies-risks\/","journal-title":"[EB\/OL]"},{"key":"e_1_3_3_14_2","article-title":"UK Sets Out Plans to Regulate Crypto and Protect Consumers","author":"Treasury H. M.","unstructured":"H. M. Treasury. UK Sets Out Plans to Regulate Crypto and Protect Consumers. [EB\/OL]. ([n.d.]). Retrieved May 4, 2023 from https:\/\/www.gov.uk\/government\/news\/uk-sets-out-plans-to-regulate-crypto-and-protect-consumers","journal-title":"[EB\/OL]"},{"key":"e_1_3_3_15_2","article-title":"Digital Finance: Markets in Crypto-assets (MiCA)","author":"Parliamen European","unstructured":"European Parliamen. Digital Finance: Markets in Crypto-assets (MiCA). [EB\/OL]. ([n.d.]). Retrieved May 4, 2023 from https:\/\/oeil.secure.europarl.europa.eu\/oeil\/popups\/ficheprocedure.do?reference=2020\/0265(COD)&l=en","journal-title":"[EB\/OL]"},{"key":"e_1_3_3_16_2","unstructured":"SEC Files 13 Charges Against Binance Entities and Founder Changpeng Zhao. ([n.d.]). Retrieved from https:\/\/www.sec.gov\/news\/press-release\/2023-101"},{"key":"e_1_3_3_17_2","article-title":"Crypto-assets and Decentralised Finance","author":"(ESRB) The European Systemic Risk Board","unstructured":"The European Systemic Risk Board (ESRB). Crypto-assets and Decentralised Finance. [EB\/OL]. ([n.d.]). Retrieved May 27, 2023 from https:\/\/www.esrb.europa.eu\/pub\/pdf\/reports\/esrb.cryptoassetsanddecentralisedfinance202305\u223c9792140 acd.en.pdf?853d899dcdf41541010cd3543aa42d37","journal-title":"[EB\/OL]"},{"key":"e_1_3_3_18_2","first-page":"85","volume-title":"Proceedings of the IEEE Conference on Computational Intelligence for Financial Engineering and Economics (CIFEr\u201914)","author":"Cao Yi","year":"2014","unstructured":"Yi Cao, Yuhua Li, Sonya Coleman, Ammar Belatreche, and Thomas Martin McGinnity. 2014. Detecting wash trade in the financial market. In Proceedings of the IEEE Conference on Computational Intelligence for Financial Engineering and Economics (CIFEr\u201914). IEEE, 85\u201391."},{"key":"e_1_3_3_19_2","first-page":"85","volume-title":"Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining","author":"Cao Longbing","year":"2010","unstructured":"Longbing Cao, Yuming Ou, Philip S. Yu, and Gang Wei. 2010. Detecting abnormal coupled sequences and sequence changes in group-based manipulative trading behaviors. In Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. 85\u201394."},{"key":"e_1_3_3_20_2","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1145\/3442381.3449824","volume-title":"Proceedings of the Web Conference 2021","author":"Victor Friedhelm","year":"2021","unstructured":"Friedhelm Victor and Andrea Marie Weintraud. 2021. Detecting and quantifying wash trading on decentralized cryptocurrency exchanges. In Proceedings of the Web Conference 2021. 23\u201332."},{"key":"e_1_3_3_21_2","volume-title":"Proceedings of the International Workshops on Financial Cryptography and Data Security (FC\u201922)","author":"Wachter Victor von","year":"2021","unstructured":"Victor von Wachter, Johannes Rude Jensen, Ferdinand Regner, and Omri Ross. 2021. NFT wash trading: Quantifying suspicious behaviour in NFT markets. In Proceedings of the International Workshops on Financial Cryptography and Data Security (FC\u201922)."},{"key":"e_1_3_3_22_2","volume-title":"Proceedings of the ACM Conference on Computer and Communications Security (CCS\u201922)","author":"Das Dipanjan","year":"2022","unstructured":"Dipanjan Das, Priyanka Bose, Nicola Ruaro, Christopher Kruegel, and Giovanni Vigna. 2022. Understanding security issues in the NFT ecosystem. In Proceedings of the ACM Conference on Computer and Communications Security (CCS\u201922)."},{"key":"e_1_3_3_23_2","doi-asserted-by":"crossref","first-page":"103374","DOI":"10.1016\/j.frl.2022.103374","article-title":"Detecting wash trading for nonfungible tokens","volume":"52","author":"Serneels Sven","year":"2023","unstructured":"Sven Serneels. 2023. Detecting wash trading for nonfungible tokens. Finance Res. Lett. 52 (2023), 103374.","journal-title":"Finance Res. Lett."},{"issue":"4","key":"e_1_3_3_24_2","doi-asserted-by":"crossref","first-page":"1171","DOI":"10.1093\/rfs\/hhi029","article-title":"Limit order book as a market for liquidity","volume":"18","author":"Foucault Thierry","year":"2005","unstructured":"Thierry Foucault, Ohad Kadan, and Eugene Kandel. 2005. Limit order book as a market for liquidity. Rev. Financial Studies 18, 4 (2005), 1171\u20131217.","journal-title":"Rev. Financial Studies"},{"issue":"11","key":"e_1_3_3_25_2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3570639","article-title":"Sok: Decentralized exchanges (DEX) with automated market maker (AMM) protocols","volume":"55","author":"Xu Jiahua","year":"2023","unstructured":"Jiahua Xu, Krzysztof Paruch, Simon Cousaert, and Yebo Feng. 2023. Sok: Decentralized exchanges (DEX) with automated market maker (AMM) protocols. Comput. Surveys 55, 11 (2023), 1\u201350.","journal-title":"Comput. Surveys"},{"issue":"1","key":"e_1_3_3_26_2","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1186\/s40854-021-00314-5","article-title":"Automated market makers and decentralized exchanges: A DeFi primer","volume":"8","author":"Mohan Vijay","year":"2022","unstructured":"Vijay Mohan. 2022. Automated market makers and decentralized exchanges: A DeFi primer. Financial Innov. 8, 1 (2022), 20.","journal-title":"Financial Innov."},{"key":"e_1_3_3_27_2","article-title":"Direct evidence of bitcoin wash trading","author":"Aloosh Arash","year":"2019","unstructured":"Arash Aloosh and Jiasun Li. 2019. Direct evidence of bitcoin wash trading. Available at SSRN 3362153.","journal-title":"Available at SSRN 3362153"},{"key":"e_1_3_3_28_2","first-page":"910","volume-title":"Proceedings of the IEEE Symposium on Security and Privacy (SP\u201920)","author":"Daian Philip","year":"2020","unstructured":"Philip Daian, Steven Goldfeder, Tyler Kell, Yunqi Li, Xueyuan Zhao, Iddo Bentov, Lorenz Breidenbach, and Ari Juels. 2020. Flash boys 2.0: Frontrunning in decentralized exchanges, miner extractable value, and consensus instability. In Proceedings of the IEEE Symposium on Security and Privacy (SP\u201920). IEEE, 910\u2013927."},{"key":"e_1_3_3_29_2","article-title":"SoK: MEV countermeasures: Theory and practice","author":"Yang Sen","year":"2022","unstructured":"Sen Yang, Fan Zhang, Ken Huang, Xi Chen, Youwei Yang, and Feng Zhu. 2022. SoK: MEV countermeasures: Theory and practice. Retrieved from https:\/\/arXiv:2212.05111","journal-title":"https:\/\/arXiv:2212.05111"},{"key":"e_1_3_3_30_2","doi-asserted-by":"crossref","first-page":"458","DOI":"10.1145\/3517745.3561448","volume-title":"Proceedings of the 22nd ACM Internet Measurement Conference","author":"Weintraub Ben","year":"2022","unstructured":"Ben Weintraub, Christof Ferreira Torres, Cristina Nita-Rotaru, and Radu State. 2022. A flash (bot) in the pan: Measuring maximal extractable value in private pools. In Proceedings of the 22nd ACM Internet Measurement Conference. 458\u2013471."},{"key":"e_1_3_3_31_2","unstructured":"Uniswap V2 & V3. ([n.d.]). Retrieved from https:\/\/uniswap.org\/"},{"key":"e_1_3_3_32_2","unstructured":"Balancer. ([n.d.]). Retrieved from https:\/\/balancer.fi\/"},{"key":"e_1_3_3_33_2","unstructured":"Curve. ([n.d.]). Retrieved from https:\/\/classic.curve.fi\/"},{"key":"e_1_3_3_34_2","first-page":"6","volume-title":"Proceedings of the International Conference on Financial Cryptography and Data Security","author":"Ron Dorit","year":"2013","unstructured":"Dorit Ron and Adi Shamir. 2013. Quantitative analysis of the full bitcoin transaction graph. In Proceedings of the International Conference on Financial Cryptography and Data Security. Springer, 6\u201324."},{"key":"e_1_3_3_35_2","doi-asserted-by":"crossref","first-page":"103139","DOI":"10.1016\/j.jnca.2021.103139","article-title":"Analysis of cryptocurrency transactions from a network perspective: An overview","volume":"190","author":"Wu Jiajing","year":"2021","unstructured":"Jiajing Wu, Jieli Liu, Yijing Zhao, and Zibin Zheng. 2021. Analysis of cryptocurrency transactions from a network perspective: An overview. J. Netw. Comput. Appl. 190 (2021), 103139.","journal-title":"J. Netw. Comput. Appl."},{"key":"e_1_3_3_36_2","doi-asserted-by":"crossref","first-page":"617","DOI":"10.1007\/978-3-030-51280-4_33","volume-title":"Proceedings of the 24th International Conference on Financial Cryptography and Data Security (FC\u201920)","author":"Victor Friedhelm","year":"2020","unstructured":"Friedhelm Victor. 2020. Address clustering heuristics for Ethereum. In Proceedings of the 24th International Conference on Financial Cryptography and Data Security (FC\u201920). Springer, Berlin, 617\u2013633."},{"key":"e_1_3_3_37_2","first-page":"155","volume-title":"Proceedings of the Financial Cryptography and Data Security (FC\u201917) International Workshops, WAHC, BITCOIN, VOTING, WTSC, and TA","author":"Neudecker Till","year":"2017","unstructured":"Till Neudecker and Hannes Hartenstein. 2017. Could network information facilitate address clustering in bitcoin? In Proceedings of the Financial Cryptography and Data Security (FC\u201917) International Workshops, WAHC, BITCOIN, VOTING, WTSC, and TA. Springer, Berlin, 155\u2013169."},{"key":"e_1_3_3_38_2","doi-asserted-by":"crossref","first-page":"204","DOI":"10.3389\/fphy.2020.00204","article-title":"T-edge: Temporal weighted multidigraph embedding for ethereum transaction network analysis","volume":"8","author":"Lin Dan","year":"2020","unstructured":"Dan Lin, Jiajing Wu, Qi Yuan, and Zibin Zheng. 2020. T-edge: Temporal weighted multidigraph embedding for ethereum transaction network analysis. Front. Phys. 8 (2020), 204.","journal-title":"Front. Phys."},{"key":"e_1_3_3_39_2","first-page":"3","volume-title":"Proceedings of the 25th International Conference on Financial Cryptography and Data Security (FC\u201921)","author":"Qin Kaihua","year":"2021","unstructured":"Kaihua Qin, Liyi Zhou, Benjamin Livshits, and Arthur Gervais. 2021. Attacking the defi ecosystem with flash loans for fun and profit. In Proceedings of the 25th International Conference on Financial Cryptography and Data Security (FC\u201921). Springer, Berlin, 3\u201332."},{"key":"e_1_3_3_40_2","first-page":"198","volume-title":"Proceedings of the IEEE Symposium on Security and Privacy (SP\u201922)","author":"Qin Kaihua","year":"2022","unstructured":"Kaihua Qin, Liyi Zhou, and Arthur Gervais. 2022. Quantifying blockchain extractable value: How dark is the forest?. In Proceedings of the IEEE Symposium on Security and Privacy (SP\u201922). IEEE, 198\u2013214."},{"key":"e_1_3_3_41_2","first-page":"336","volume-title":"Proceedings of the 21st ACM Internet Measurement Conference","author":"Qin Kaihua","year":"2021","unstructured":"Kaihua Qin, Liyi Zhou, Pablo Gamito, Philipp Jovanovic, and Arthur Gervais. 2021. An empirical study of DeFi liquidations: Incentives, risks, and instabilities. In Proceedings of the 21st ACM Internet Measurement Conference. 336\u2013350."},{"key":"e_1_3_3_42_2","first-page":"74","volume-title":"Proceedings of the 4th ACM Conference on Advances in Financial Technologies","author":"Gan Rundong","year":"2022","unstructured":"Rundong Gan, Le Wang, Xiangyu Ruan, and Xiaodong Lin. 2022. Understanding flash-loan-based wash trading. In Proceedings of the 4th ACM Conference on Advances in Financial Technologies. 74\u201388."},{"key":"e_1_3_3_43_2","doi-asserted-by":"crossref","DOI":"10.3386\/w30783","volume-title":"Crypto Wash Trading","author":"Cong Lin William","year":"2022","unstructured":"Lin William Cong, Xi Li, Ke Tang, and Yang Yang. 2022. Crypto Wash Trading. Technical Report. National Bureau of Economic Research."},{"key":"e_1_3_3_44_2","doi-asserted-by":"crossref","first-page":"101982","DOI":"10.1016\/j.frl.2021.101982","article-title":"Wash trading at cryptocurrency exchanges","volume":"43","author":"Pennec Gu\u00e9nol\u00e9 Le","year":"2021","unstructured":"Gu\u00e9nol\u00e9 Le Pennec, Ingo Fiedler, and Lennart Ante. 2021. Wash trading at cryptocurrency exchanges. Finance Res. Lett. 43 (2021), 101982.","journal-title":"Finance Res. Lett."},{"key":"e_1_3_3_45_2","article-title":"Competition and product quality: Fake trading on crypto exchanges","author":"Amiram Dan","year":"2020","unstructured":"Dan Amiram, Evgeny Lyandres, and Daniel Rabetti. 2020. Competition and product quality: Fake trading on crypto exchanges. Available at SSRN 3745617.","journal-title":"Available at SSRN 3745617"},{"key":"e_1_3_3_46_2","doi-asserted-by":"crossref","first-page":"126405","DOI":"10.1016\/j.physa.2021.126405","article-title":"Do cryptocurrency exchanges fake trading volumes? An empirical analysis of wash trading based on data mining","volume":"586","author":"Chen Jialan","year":"2022","unstructured":"Jialan Chen, Dan Lin, and Jiajing Wu. 2022. Do cryptocurrency exchanges fake trading volumes? An empirical analysis of wash trading based on data mining. Physica A: Stat. Mech. Appl. 586 (2022), 126405.","journal-title":"Physica A: Stat. Mech. Appl."},{"key":"e_1_3_3_47_2","article-title":"Suspicious trading in nonfungible tokens (NFTs): Evidence from wash trading","author":"Tariq Syed Ahzam","year":"2022","unstructured":"Syed Ahzam Tariq and Imtiaz Sifat. 2022. Suspicious trading in nonfungible tokens (NFTs): Evidence from wash trading. Available at SSRN 4097642.","journal-title":"Available at SSRN 4097642"},{"key":"e_1_3_3_48_2","article-title":"The dark side of NFTs: A large-scale empirical study of wash trading","author":"Chen Shijian","year":"2023","unstructured":"Shijian Chen, Jiachi Chen, Jiangshan Yu, Xiapu Luo, Yanlin Wang, and Zibin Zheng. 2023. The dark side of NFTs: A large-scale empirical study of wash trading. Retrieved from https:\/\/arXiv:2312.12544","journal-title":"R"},{"key":"e_1_3_3_49_2","first-page":"13","volume-title":"Proceedings of the IEEE 43rd International Conference on Distributed Computing Systems (ICDCS\u201923)","author":"Morgia Massimo La","year":"2023","unstructured":"Massimo La Morgia, Alessandro Mei, Alberto Maria Mongardini, and Eugenio Nerio Nemmi. 2023. A game of NFTs: Characterizing NFT wash trading in the Ethereum blockchain. In Proceedings of the IEEE 43rd International Conference on Distributed Computing Systems (ICDCS\u201923). IEEE, 13\u201324."},{"key":"e_1_3_3_50_2","first-page":"1","volume-title":"Proceedings of the CHI Conference on Human Factors in Computing Systems","author":"Wen Xiaolin","year":"2023","unstructured":"Xiaolin Wen, Yong Wang, Xuanwu Yue, Feida Zhu, and Min Zhu. 2023. Nftdisk: Visual detection of wash trading in nft markets. In Proceedings of the CHI Conference on Human Factors in Computing Systems. 1\u201315."},{"issue":"1","key":"e_1_3_3_51_2","first-page":"100108","article-title":"WTEYE: On-chain wash trade detection and quantification for ERC20 cryptocurrencies","volume":"4","author":"Cui Wei","year":"2023","unstructured":"Wei Cui and Cunnian Gao. 2023. WTEYE: On-chain wash trade detection and quantification for ERC20 cryptocurrencies. Blockchain: Res. Appl. 4, 1 (2023), 100108.","journal-title":"Blockchain: Res. Appl."},{"issue":"1","key":"e_1_3_3_52_2","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1198\/tast.2009.0005","article-title":"A simple explanation of Benford\u2019s Law","volume":"63","author":"Fewster Rachel M.","year":"2009","unstructured":"Rachel M. Fewster. 2009. A simple explanation of Benford\u2019s Law. Amer. Stat. 63, 1 (2009), 26\u201332.","journal-title":"Amer. Stat."},{"key":"e_1_3_3_53_2","unstructured":"Uniswap V2: Factory. ([n.d.]). Retrieved from https:\/\/etherscan.io\/address\/0x5C69bEe701ef814a2B6a3EDD4B1652CB9 cc5aA6f"},{"key":"e_1_3_3_54_2","unstructured":"Uniswap V3: Factory. ([n.d.]). Retrieved from https:\/\/etherscan.io\/address\/0x1F98431c8aD98523631AE4a59f267346ea 31F984"},{"key":"e_1_3_3_55_2","first-page":"23","volume-title":"Proceedings of the 9th International Workshop on Security in Blockchain and Cloud Computing","author":"Wang Dabao","year":"2021","unstructured":"Dabao Wang, Siwei Wu, Ziling Lin, Lei Wu, Xingliang Yuan, Yajin Zhou, Haoyu Wang, and Kui Ren. 2021. Towards a first step to understand flash loan and its applications in DeFi ecosystem. In Proceedings of the 9th International Workshop on Security in Blockchain and Cloud Computing. 23\u201328."},{"key":"e_1_3_3_56_2","volume-title":"An Analysis of Anonymity in the Bitcoin System","author":"Reid Fergal","year":"2013","unstructured":"Fergal Reid and Martin Harrigan. 2013. An Analysis of Anonymity in the Bitcoin System. Springer, Berlin."},{"key":"e_1_3_3_57_2","first-page":"368","volume-title":"Proceedings of the IEEE International Conferences on Ubiquitous Intelligence and Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People, and Smart World Congress (UIC\/ATC\/SCALCOM\/CBDCOM\/IOP\/SmartWorld\u201916)","author":"Harrigan Martin","year":"2016","unstructured":"Martin Harrigan and Christoph Fretter. 2016. The unreasonable effectiveness of address clustering. In Proceedings of the IEEE International Conferences on Ubiquitous Intelligence and Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People, and Smart World Congress (UIC\/ATC\/SCALCOM\/CBDCOM\/IOP\/SmartWorld\u201916). IEEE, 368\u2013373."},{"key":"e_1_3_3_58_2","first-page":"127","volume-title":"Proceedings of the Conference on Internet Measurement Conference","author":"Meiklejohn Sarah","year":"2013","unstructured":"Sarah Meiklejohn, Marjori Pomarole, Grant Jordan, Kirill Levchenko, Damon McCoy, Geoffrey M. Voelker, and Stefan Savage. 2013. A fistful of bitcoins: Characterizing payments among men with no names. In Proceedings of the Conference on Internet Measurement Conference. 127\u2013140."},{"key":"e_1_3_3_59_2","unstructured":"Robin Klusman and Tim Dijkhuizen. 2018. Deanonymisation in Ethereum using Existing Methods for Bitcoin. (2018)."},{"issue":"2","key":"e_1_3_3_60_2","doi-asserted-by":"crossref","first-page":"146","DOI":"10.1137\/0201010","article-title":"Depth-first search and linear graph algorithms","volume":"1","author":"Tarjan Robert","year":"1972","unstructured":"Robert Tarjan. 1972. Depth-first search and linear graph algorithms. SIAM J. Comput. 1, 2 (1972), 146\u2013160.","journal-title":"SIAM J. Comput."},{"key":"e_1_3_3_61_2","first-page":"165","volume-title":"Proceedings of the ACM SIGSAC Conference on Computer and Communications Security","author":"Li Zihao","year":"2023","unstructured":"Zihao Li, Jianfeng Li, Zheyuan He, Xiapu Luo, Ting Wang, Xiaoze Ni, Wenwu Yang, Xi Chen, and Ting Chen. 2023. Demystifying DeFi MEV activities in flashbots bundle. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security. 165\u2013179."},{"issue":"3","key":"e_1_3_3_62_2","first-page":"1","article-title":"Pied-piper: Revealing the backdoor threats in ethereum erc token contracts","volume":"32","author":"Ma Fuchen","year":"2023","unstructured":"Fuchen Ma, Meng Ren, Lerong Ouyang, Yuanliang Chen, Juan Zhu, Ting Chen, Yingli Zheng, Xiao Dai, Yu Jiang, and Jiaguang Sun. 2023. Pied-piper: Revealing the backdoor threats in ethereum erc token contracts. ACM Trans. Softw. Eng. Methodol. 32, 3 (2023), 1\u201324.","journal-title":"ACM Trans. Softw. Eng. Methodol."},{"key":"e_1_3_3_63_2","first-page":"17","volume-title":"Proceedings of the Workshop on Decentralized Finance and Security","author":"Gan Rundong","year":"2023","unstructured":"Rundong Gan, Le Wang, and Xiaodong Lin. 2023. Why trick me: The honeypot traps on decentralized exchanges. In Proceedings of the Workshop on Decentralized Finance and Security. 17\u201323."}],"container-title":["ACM Transactions on Internet Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3689631","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3689631","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:09:47Z","timestamp":1750295387000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3689631"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,4]]},"references-count":62,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2024,11,30]]}},"alternative-id":["10.1145\/3689631"],"URL":"https:\/\/doi.org\/10.1145\/3689631","relation":{},"ISSN":["1533-5399","1557-6051"],"issn-type":[{"value":"1533-5399","type":"print"},{"value":"1557-6051","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,10,4]]},"assertion":[{"value":"2024-02-20","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-08-08","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-10-04","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}