27 research outputs found

    Pump and Dumps in the Bitcoin Era: Real Time Detection of Cryptocurrency Market Manipulations

    Full text link
    In the last years, cryptocurrencies are increasingly popular. Even people who are not experts have started to invest in these securities and nowadays cryptocurrency exchanges process transactions for over 100 billion US dollars per month. However, many cryptocurrencies have low liquidity and therefore they are highly prone to market manipulation schemes. In this paper, we perform an in-depth analysis of pump and dump schemes organized by communities over the Internet. We observe how these communities are organized and how they carry out the fraud. Then, we report on two case studies related to pump and dump groups. Lastly, we introduce an approach to detect the fraud in real time that outperforms the current state of the art, so to help investors stay out of the market when a pump and dump scheme is in action.Comment: Accepted for publication at The 29th International Conference on Computer Communications and Networks (ICCCN 2020

    GDPR: When the Right to Access Personal Data Becomes a Threat

    Full text link
    After one year since the entry into force of the GDPR, all web sites and data controllers have updated their procedures to store users' data. The GDPR does not only cover how and what data should be saved by the service providers, but it also guarantees an easy way to know what data are collected and the freedom to export them. In this paper, we carry out a comprehensive study on the right to access data provided by Article 15 of the GDPR. We examined more than 300 data controllers, performing for each of them a request to access personal data. We found that almost each data controller has a slightly different procedure to fulfill the request and several ways to provide data back to the user, from a structured file like CSV to a screenshot of the monitor. We measure the time needed to complete the access data request and the completeness of the information provided. After this phase of data gathering, we analyze the authentication process followed by the data controllers to establish the identity of the requester. We find that 50.4\% of the data controllers that handled the request, even if they store the data in compliance with the GDPR, have flaws in the procedure of identifying the users or in the phase of sending the data, exposing the users to new threats. With the undesired and surprising result that the GDPR, in its present deployment, has actually decreased the privacy of the users of web services.Comment: Accepted for publication at IEEE INTERNATIONAL CONFERENCE ON WEB SERVICES (ICWS) 202

    A Game of NFTs: Characterizing NFT Wash Trading in the Ethereum Blockchain

    Full text link
    The Non-Fungible Token (NFT) market in the Ethereum blockchain experienced explosive growth in 2021, with a monthly trade volume reaching \$6 billion in January 2022. However, concerns have emerged about possible wash trading, a form of market manipulation in which one party repeatedly trades an NFT to inflate its volume artificially. Our research examines the effects of wash trading on the NFT market in Ethereum from the beginning until January 2022, using multiple approaches. We find that wash trading affects 5.66% of all NFT collections, with a total artificial volume of \$3,406,110,774. We look at two ways to profit from wash trading: Artificially increasing the price of the NFT and taking advantage of the token reward systems provided by some marketplaces. Our findings show that exploiting the token reward systems of NFTMs is much more profitable (mean gain of successful operations is \$1.055M on LooksRare), more likely to succeed (more than 80% of operations), and less risky than reselling an NFT at a higher price using wash trading (50% of activities result in a loss). Our research highlights that wash trading is frequent in Ethereum and that NFTMs should implement protective mechanisms to stop such illicit behavior.Comment: 12 pages, 7 figures, 3 table

    The Conspiracy Money Machine: Uncovering Telegram's Conspiracy Channels and their Profit Model

    Full text link
    In recent years, major social media platforms have implemented increasingly strict moderation policies, resulting in bans and restrictions on conspiracy theory-related content. To circumvent these restrictions, conspiracy theorists are turning to alternatives, such as Telegram, where they can express and spread their views with fewer limitations. Telegram offers channels -- virtual rooms where only administrators can broadcast messages -- and a more permissive content policy. These features have created the perfect breeding ground for a complex ecosystem of conspiracy channels. In this paper, we illuminate this ecosystem. First, we propose an approach to detect conspiracy channels. Then, we discover that conspiracy channels can be clustered into four distinct communities comprising over 17,000 channels. Finally, we uncover the "Conspiracy Money Machine," revealing how most conspiracy channels actively seek to profit from their subscribers. We find conspiracy theorists leverage e-commerce platforms to sell questionable products or lucratively promote them through affiliate links. Moreover, we observe that conspiracy channels use donation and crowdfunding platforms to raise funds for their campaigns. We determine that this business involves hundreds of donors and generates a turnover of over $90 million

    Efficient mitochondrial biogenesis drives incomplete penetrance in Leber's hereditary optic neuropathy

    Get PDF
    Leber's hereditary optic neuropathy is a maternally inherited blinding disease caused as a result of homoplasmic point mutations in complex I subunit genes of mitochondrial DNA. It is characterized by incomplete penetrance, as only some mutation carriers become affected. Thus, the mitochondrial DNA mutation is necessary but not sufficient to cause optic neuropathy. Environmental triggers and genetic modifying factors have been considered to explain its variable penetrance. We measured the mitochondrial DNA copy number and mitochondrial mass indicators in blood cells from affected and carrier individuals, screening three large pedigrees and 39 independently collected smaller families with Leber's hereditary optic neuropathy, as well as muscle biopsies and cells isolated by laser capturing from post-mortem specimens of retina and optic nerves, the latter being the disease targets. We show that unaffected mutation carriers have a significantly higher mitochondrial DNA copy number and mitochondrial mass compared with their affected relatives and control individuals. Comparative studies of fibroblasts from affected, carriers and controls, under different paradigms of metabolic demand, show that carriers display the highest capacity for activating mitochondrial biogenesis. Therefore we postulate that the increased mitochondrial biogenesis in carriers may overcome some of the pathogenic effect of mitochondrial DNA mutations. Screening of a few selected genetic variants in candidate genes involved in mitochondrial biogenesis failed to reveal any significant association. Our study provides a valuable mechanism to explain variability of penetrance in Leber's hereditary optic neuropathy and clues for high throughput genetic screening to identify the nuclear modifying gene(s), opening an avenue to develop predictive genetic tests on disease risk and therapeutic strategies.TelethonAssociazione Serena Talarico per i giovani nel mondo and Fondazione Giuseppe Tomasello O.N.L.U.S.Mitocon OnlusResearch to Prevent BlindnessInternational Foundation for Optic Nerve Diseases (IFOND)Struggling Within Leber'sPoincenot FamilyEierman FoundationNational Eye InstituteUniv Rome, Dept Radiol Oncol & Pathol, Rome, ItalyUniv Bologna, Dept Biomed & NeuroMotor Sci DIBINEM, Bologna, ItalyUniv Bari, Dept Biosci Biotechnol & Biopharmaceut, Bari, ItalyBellaria Hosp, IRCCS Ist Sci Neurol Bologna, I-40139 Bologna, ItalyUSC, Keck Sch Med, Dept Ophthalmol, Los Angeles, CA USAUSC, Keck Sch Med, Dept Neurosurg, Los Angeles, CA USAUniv Trieste, Dept Reprod Sci Dev & Publ Hlth, Trieste, ItalyUniv Trieste, IRCCS Burlo Garofolo Children Hosp, Trieste, ItalyNewcastle Univ, Inst Med Genet, Newcastle Upon Tyne NE1 7RU, Tyne & Wear, EnglandFdn Ist Neurol Carlo Besta IRCCS, Unit Mol Neurogenet, Milan, ItalyMRC Mitochondrial Biol Unit, Cambridge, EnglandFed Univ São Paulo UNIFESP, Dept Ophthalmol, São Paulo, BrazilUniv São Paulo, Inst Psychol, Dept Expt Psychol, São Paulo, BrazilStudio Oculist dAzeglio, Bologna, ItalyOsped San Giovanni Evangelista, Tivoli, ItalyAzienda Osped San Camillo Forlanini, Rome, ItalyUniv Rome, Dipartimento Metodi & Modelli Econ Finanza & Terr, Rome, ItalyUniv Rome, Dept Mol Med, Rome, ItalyFed Univ São Paulo UNIFESP, Dept Ophthalmol, São Paulo, BrazilTelethon: GGP06233Telethon: GGP11182Telethon: GPP10005National Eye Institute: EY03040Web of Scienc

    Time-Zone Geolocation of Crowds in the Dark Web

    No full text
    Dark Web platforms like the infamous Silk Road market, or other cyber-criminal or terrorism related forums, are only accessible by using anonymity mechanisms like Tor. In this paper we are concerned with geolocating the crowds accessing Dark Web forums. We do not focus on single users. We aim at uncovering the geographical distribution of groups of visitors into time-zones as a whole. Our approach, to the best of our knowledge, is the first of its kind applied to the Dark Web. The idea is to exploit the time of all posts in the Dark Web forums to build profiles of the visiting crowds. Then, to uncover the geographical origin of the Dark Web crowd by matching the crowd profile to that of users from known regions on regular web platforms. We assess the effectiveness of our methodology on standard web and Dark Web platforms with users of known origin, and apply it to three controversial anonymous Dark Web forums. We believe that this work helps the community better understand the Dark Web from a sociological point of view and support the investigation of authorities when the security of citizens is at stake

    Nationality and geolocation-based profiling in the Dark(Web)

    No full text
    In this paper we are concerned with geolocating the anonymous crowds of Dark Web forums. We do not focus on single users, but on the crowd as a whole. We work in two directions: The first idea is to exploit the time of all posts in the Dark Web forums to build profiles of the visiting crowds and to match the crowd profiles to that of users from known regions. Then, we develop a new dataset to detect the native language of the crowds to support and integrate this match. We assess the effectiveness of our methodology on the standard web and two Dark Web forums with users of known origin, and apply it to three controversial anonymous Dark Web forums. We believe that this work helps the community better understand the Dark Web from a sociological point of view and supports the investigation of authorities when the security of citizens is at stake

    Nationality and Geolocation-Based Profiling in the Dark(Web)

    No full text

    Mobile ticketing with NFC management for transport companies. Problems and solutions

    No full text
    In this paper we analyze the problems that are encountered in mobile ticketing systems where proximity technologies are used for validation and check of the e-tickets, leaving out the stage of ticket purchase, which can be done either remotely or in proximity. We have identified several security issues that are common in mobile ticketing and we propose some methods to solve them. In addition, we propose a protocol to provide secure validation and check of e-tickets. The innovation of this protocol is that it provides a good level of security and it is sufficiently abstract to be independent of NFC operating mode; that is it works in classical Card Emulation mode making use of Secure Element and it is implementable in Peer-to-Peer mode too
    corecore