Using Graph Cycle Detection to Reveal Suspicious Ethereum Token Transfer Behaviour

  • Andrew Le Gear
  • , Farshad Ghassemi Toosi
  • , Ashish Rajendra Sai
  • , Tawny Whatmore
  • , Jim Buckley

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

In the unregulated world of Initial Coin Offerings (ICOs), hiding malicious trading is all too easy in a large-scale set of transactions. This paper uses a graph-based representation of the blockchain to identify a topology that reveals suspicious intent to manipulate the perceived value of those offerings. As the computational complexity of identifying this topology could be prohibitive for unfiltered data-sets, this work derives metrics indicative of the topology. Using these explicitly-defined metrics and a past degradation of service on the Ethereum network originating with the iFishYunYu token, we show how this approach can reveal it to have been a deliberate attack, rather than simply an unprecedentedly highly-traded token. The formalization of this approach in the paper will allow detection of other such 'pump-and-dump' attacks in the future.

Original languageEnglish
Title of host publication2025 7th International Conference on Blockchain Computing and Applications, BCCA 2025
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages31-38
Number of pages8
ISBN (Electronic)9798331502966
DOIs
Publication statusPublished - 2025
Event7th International Conference on Blockchain Computing and Applications, BCCA 2025 - Dubrovnik, Croatia
Duration: 14 Oct 202517 Oct 2025

Publication series

Name2025 7th International Conference on Blockchain Computing and Applications, BCCA 2025

Conference

Conference7th International Conference on Blockchain Computing and Applications, BCCA 2025
Country/TerritoryCroatia
CityDubrovnik
Period14/10/2517/10/25

Keywords

  • Blockchain
  • Ethereum
  • Graph Analysis
  • Reverse Engineering
  • Smart Contract

Fingerprint

Dive into the research topics of 'Using Graph Cycle Detection to Reveal Suspicious Ethereum Token Transfer Behaviour'. Together they form a unique fingerprint.

Cite this