{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T06:59:27Z","timestamp":1775199567079,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":48,"publisher":"ACM","funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["2072103, 62232004, 92467205"],"award-info":[{"award-number":["2072103, 62232004, 92467205"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["No. 2023YFC3605800"],"award-info":[{"award-number":["No. 2023YFC3605800"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"name":"HK RGC General Research Fund","award":["PolyU15220922"],"award-info":[{"award-number":["PolyU15220922"]}]},{"name":"HK RGC Theme-Based Research Scheme","award":["T43-513\/23-N"],"award-info":[{"award-number":["T43-513\/23-N"]}]},{"name":"Jiangsu Provincial Key Laboratory of Network and Information Security"},{"name":"Research Institute for Artificial Intelligence of Things, The Hong Kong Polytechnic University"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,11,19]]},"DOI":"10.1145\/3719027.3765082","type":"proceedings-article","created":{"date-parts":[[2025,11,22]],"date-time":"2025-11-22T23:42:02Z","timestamp":1763854922000},"page":"3490-3504","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Time Tells All: Deanonymization of Blockchain RPC Users with Zero Transaction Fee"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7742-8679","authenticated-orcid":false,"given":"Shan","family":"Wang","sequence":"first","affiliation":[{"name":"The Hong Kong Polytechnic University, Hong Kong, China and Southeast University, Nanjing, Jiangsu, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8209-1000","authenticated-orcid":false,"given":"Ming","family":"Yang","sequence":"additional","affiliation":[{"name":"Southeast University, Nanjing, Jiangsu, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-3881-462X","authenticated-orcid":false,"given":"Yu","family":"Liu","sequence":"additional","affiliation":[{"name":"Southeast University, Nanjing, Jiangsu, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7786-0231","authenticated-orcid":false,"given":"Yue","family":"Zhang","sequence":"additional","affiliation":[{"name":"Shandong University, Qingdao, Shandong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9857-507X","authenticated-orcid":false,"given":"Shuaiqing","family":"Zhang","sequence":"additional","affiliation":[{"name":"Southeast University, Nanjing, Jiangsu, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9691-8702","authenticated-orcid":false,"given":"Zhen","family":"Ling","sequence":"additional","affiliation":[{"name":"Southeast University, Nanjing, Jiangsu, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2725-2529","authenticated-orcid":false,"given":"Jiannong","family":"Cao","sequence":"additional","affiliation":[{"name":"The Hong Kong Polytechnical University, Hong Kong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2391-7789","authenticated-orcid":false,"given":"Xinwen","family":"Fu","sequence":"additional","affiliation":[{"name":"University of Massachusetts Lowell, Lowell, MA, USA"}]}],"member":"320","published-online":{"date-parts":[[2025,11,22]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"AWS. 2025. What is RTT in Networking? https:\/\/aws.amazon.com\/what-is\/rtt-in-networking\/#: :text=A%20good%20round%2Dtrip%20time able%20to%20access%20the%20service."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.52"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/DAPPS52256.2021.00013"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660379"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.15"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2019.00022"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2019.8845213"},{"key":"e_1_3_2_1_8_1","unstructured":"Bitcoin. 2015. Ignore getaddr messages on Outbound connections. https:\/\/github.com\/bitcoin\/bitcoin\/commit\/200f29363b06cbe8e35dfc5e1b818a0dd96c8474"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3377402"},{"key":"e_1_3_2_1_10_1","first-page":"47","article-title":"Towards a First Step to Understand the Cryptocurrency Stealing Attack on Ethereum","volume":"2019","author":"Cheng Zhen","year":"2019","unstructured":"Zhen Cheng, Xinrui Hou, Runhuai Li, Yajin Zhou, Xiapu Luo, Jinku Li, and Kui Ren. 2019. Towards a First Step to Understand the Cryptocurrency Stealing Attack on Ethereum.. In RAID, Vol. 2019. 47-60.","journal-title":"RAID"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560552"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3457611"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2699026.2699128"},{"key":"e_1_3_2_1_14_1","volume-title":"International Conference on Financial Cryptography and Data Security. Springer, 170-189","author":"Eskandari Shayan","year":"2019","unstructured":"Shayan Eskandari, Seyedehmahsa Moosavi, and Jeremy Clark. 2019. Sok: Transparent dishonesty: front-running attacks on blockchain. In International Conference on Financial Cryptography and Data Security. Springer, 170-189."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2012.060912.00057"},{"key":"e_1_3_2_1_16_1","volume-title":"Deanonymization in the bitcoin P2P network. Advances in Neural Information Processing Systems","author":"Fanti Giulia","year":"2017","unstructured":"Giulia Fanti and Pramod Viswanath. 2017. Deanonymization in the bitcoin P2P network. Advances in Neural Information Processing Systems (2017)."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3558535.3559793"},{"key":"e_1_3_2_1_18_1","first-page":"1402","article-title":"Practical Deanonymization Attack in Ethereum Based on P2P Network Analysis. In 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA\/BDCloud\/SocialCom\/SustainCom)","author":"Gao Yue","year":"2021","unstructured":"Yue Gao, Jinqiao Shi, Xuebin Wang, Ruisheng Shi, Zelin Yin, and Yanyan Yang. 2021. Practical Deanonymization Attack in Ethereum Based on P2P Network Analysis. In 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA\/BDCloud\/SocialCom\/SustainCom). IEEE, 1402-1409.","journal-title":"IEEE"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/Blockchain50366.2020.00009"},{"key":"e_1_3_2_1_20_1","first-page":"129","volume-title":"24th USENIX Security Symposium (USENIX Security 15)","author":"Heilman Ethan","year":"2015","unstructured":"Ethan Heilman, Alison Kendler, Aviv Zohar, and Sharon Goldberg. 2015. Eclipse attacks on Bitcoin's peer-to-peer network. In 24th USENIX Security Symposium (USENIX Security 15). 129-144."},{"key":"e_1_3_2_1_21_1","unstructured":"Infura. 2022. How Infura Helps MetaMask Scale at the Speed of Web3 Growth. https:\/\/www.infura.io\/use-cases\/developer-stories\/metamask"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3611643.3616251"},{"key":"e_1_3_2_1_23_1","unstructured":"Robin Klusman and Tim Dijkhuizen. 2018. Deanonymisation in ethereum using existing methods for bitcoin."},{"key":"e_1_3_2_1_24_1","first-page":"2","volume-title":"An analysis of anonymity in bitcoin using","author":"Koshy Philip","unstructured":"Philip Koshy, Diana Koshy, and Patrick McDaniel. 2014. An analysis of anonymity in bitcoin using p2p network traffic. In Financial Cryptography and Data Security. Springer, 469-485."},{"key":"e_1_3_2_1_25_1","first-page":"1579","volume-title":"31st USENIX Security Symposium (USENIX Security 22)","author":"Li Jianfeng","year":"2022","unstructured":"Jianfeng Li, Hao Zhou, Shuohan Wu, Xiapu Luo, Ting Wang, Xian Zhan, and Xiaobo Ma. 2022. {FOAP}:{Fine-Grained}{Open-World} android app fingerprinting. In 31st USENIX Security Symposium (USENIX Security 22). 1579-1596."},{"key":"e_1_3_2_1_26_1","volume-title":"XiaoFeng Wang, and Xiapu Luo.","author":"Li Kai","year":"2021","unstructured":"Kai Li, Jiaqi Chen, Xianghong Liu, Yuzhe Richard Tang, XiaoFeng Wang, and Xiapu Luo. 2021a. As Strong As Its Weakest Link: How to Break Blockchain DApps at RPC Service.. In NDSS."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3485369"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737586"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.23919\/CNSM46954.2019.9012681"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"crossref","unstructured":"Daniela Lopes Jin-Dong Dong Pedro Medeiros Daniel Castro Diogo Barradas Bernardo Portela Joao Vinagre Bernardo Ferreira Nicolas Christin and Nuno Santos. 2024. Flow Correlation Attacks on Tor Onion Service Sessions with Sliding Subset Sum.. In NDSS.","DOI":"10.14722\/ndss.2024.24337"},{"key":"e_1_3_2_1_31_1","volume-title":"Cryptology and Network Security: 16th International Conference. Springer, 277-298","author":"Mastan Indra Deep","year":"2018","unstructured":"Indra Deep Mastan and Souradyuti Paul. 2018. A new approach to deanonymization of unreachable bitcoin nodes. In Cryptology and Network Security: 16th International Conference. Springer, 277-298."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2504730.2504747"},{"key":"e_1_3_2_1_33_1","first-page":"4139","volume-title":"33rd USENIX Security Symposium (USENIX Security 24)","author":"Mitseva Asya","year":"2024","unstructured":"Asya Mitseva and Andriy Panchenko. 2024. Stop, don't click here anymore: boosting website fingerprinting by considering sets of subpages. In 33rd USENIX Security Symposium (USENIX Security 24). 4139-4156."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3543507.3583473"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/SANER53432.2022.00144"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-72150-7_14"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-9129-7_45"},{"key":"e_1_3_2_1_38_1","volume-title":"Subverting Website Fingerprinting Defenses with Robust Traffic Representation. In 32nd USENIX Security Symposium (USENIX Security).","author":"Shen Meng","year":"2023","unstructured":"Meng Shen, Kexin Ji, Zhenbo Gao, Qi Li, Liehuang Zhu, and Ke Xu. 2023. Subverting Website Fingerprinting Defenses with Robust Traffic Representation. In 32nd USENIX Security Symposium (USENIX Security)."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3576915.3623178"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00027"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC40277.2020.9148936"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM52122.2024.10621236"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOMW.2018.8644498"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC42927.2021.9500556"},{"key":"e_1_3_2_1_45_1","volume-title":"Solana: A new architecture for a high performance blockchain v0. 8.13. Whitepaper","author":"Yakovenko Anatoly","year":"2018","unstructured":"Anatoly Yakovenko. 2018. Solana: A new architecture for a high performance blockchain v0. 8.13. Whitepaper (2018)."},{"key":"e_1_3_2_1_46_1","first-page":"79","volume-title":"USA","author":"Zhao Chen","year":"2015","unstructured":"Chen Zhao and Yong Guan. 2015. A graph-based investigation of bitcoin transactions. In Advances in Digital Forensics XI: 11th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 26-28, 2015, Revised Selected Papers 11. Springer, 79-95."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-019-9900-9"},{"key":"e_1_3_2_1_48_1","volume-title":"International Symposium on Advanced Parallel Processing Technologies. Springer, 390-416","author":"Zheng Che","year":"2023","unstructured":"Che Zheng, Shen Meng, Duan Junxian, and Zhu Liehuang. 2023. From Ledger to P2P Network: De-anonymization on Bitcoin Using Cross-Layer Analysis. In International Symposium on Advanced Parallel Processing Technologies. Springer, 390-416."}],"event":{"name":"CCS '25: ACM SIGSAC Conference on Computer and Communications Security","location":"Taipei Taiwan","acronym":"CCS '25","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3719027.3765082","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,22]],"date-time":"2025-12-22T22:30:36Z","timestamp":1766442636000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3719027.3765082"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,19]]},"references-count":48,"alternative-id":["10.1145\/3719027.3765082","10.1145\/3719027"],"URL":"https:\/\/doi.org\/10.1145\/3719027.3765082","relation":{},"subject":[],"published":{"date-parts":[[2025,11,19]]},"assertion":[{"value":"2025-11-22","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}