cybersec-code / watchyourbackLinks
Source code for Watch Your Back: Identifying Cybercrime Financial Relationships in Bitcoin through Back-and-Forth Exploration
☆12Updated last year
Alternatives and similar repositories for watchyourback
Users that are interested in watchyourback are comparing it to the libraries listed below
Sorting:
- ☆22Updated last year
- ☆34Updated 5 years ago
- This repository contains code for BABD, as detailed in our paper published in IEEE TIFS☆30Updated last year
- ☆10Updated 7 years ago
- ☆15Updated 3 years ago
- Profiling and Deanonymizing Ethereum Users☆75Updated 4 years ago
- Dynamic graph of Ethereum transactions using Web3.js subscribe☆38Updated 6 years ago
- A collection of tools to measure and analyze frontrunning on Ethereum (USENIX 2021).☆33Updated 3 years ago
- ☆16Updated 4 years ago
- ☆11Updated last year
- Empirical Analysis of EIP-1559: Transaction Fees, Waiting Time, and Consensus Security☆22Updated 2 years ago
- Datasets used in the paper "Labeled Transactions-based Dataset of Ethereum Network"☆20Updated 8 months ago
- Python Data Science and Machine Learning Library for the Ethereum and ERC-20 Blockchain☆140Updated 3 years ago
- A toolkit for blockchain data collection☆177Updated last month
- A programming language and compiler which enable automatic compilation of intuitive data privacy specifications to NIZK-enabled private s…☆88Updated 2 years ago
- Tools for measuring MEV extraction through Flashbots (IMC 2022).☆14Updated 3 years ago
- A tool that detects honeypots in Ethereum smart contracts (USENIX 2019).☆102Updated 2 years ago
- ☆15Updated 3 years ago
- ☆23Updated 6 years ago
- ☆58Updated 7 years ago
- This repository contains the RAW results of the vulnerability analysis of 9 tools on 47,587 smart contracts. These results are presented …☆78Updated 5 years ago
- Solidity grammar for ANTLR4☆58Updated 9 months ago
- MSc Project☆35Updated 6 years ago
- A Tool for clone detection and bug detection in smart contracts☆106Updated 2 years ago
- Anomaly detection in the Ethereum network☆14Updated 3 years ago
- ☆63Updated 3 years ago
- Python code that we used in our USENIX 2021 paper to evaluate query recovery attacks☆17Updated 5 years ago
- Minimalistic implementation of a Verifiable (t, n) threshold signature scheme based on elliptic curve with python.☆31Updated 6 years ago
- ☆12Updated 3 years ago
- Chartalist.org. Sponsored by the Canadian NSERC Discovery Grant RGPIN-2020-05665: Data Science on Blockchain and the National Science Fou…☆34Updated 2 years ago