Skip to main content

Showing 1–9 of 9 results for author: Harrigan, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2411.01693  [pdf, other

    cs.CR

    Token Composition: A Graph Based on EVM Logs

    Authors: Martin Harrigan, Thomas Lloyd, Daire Ó Broin

    Abstract: Tokens have proliferated across blockchains in terms of number, market capitalisation and utility. Some tokens are tokenised versions of existing tokens -- known variously as wrapped tokens, fractional tokens, or shares. The repeated application of this process creates matryoshkian tokens of arbitrary depth. We perform an empirical analysis of token composition on the Ethereum blockchain. We intro… ▽ More

    Submitted 3 November, 2024; originally announced November 2024.

    Comments: 17 pages, 7 figures, 3 tables

  2. arXiv:2409.04643  [pdf, other

    quant-ph cs.PL

    Expressing and Analyzing Quantum Algorithms with Qualtran

    Authors: Matthew P. Harrigan, Tanuj Khattar, Charles Yuan, Anurudh Peduri, Noureldin Yosri, Fionn D. Malone, Ryan Babbush, Nicholas C. Rubin

    Abstract: Quantum computing's transition from theory to reality has spurred the need for novel software tools to manage the increasing complexity, sophistication, toil, and fallibility of quantum algorithm development. We present Qualtran, an open-source library for representing and analyzing quantum algorithms. Using appropriate abstractions and data structures, we can simulate and test algorithms, automat… ▽ More

    Submitted 6 September, 2024; originally announced September 2024.

    Comments: Code available at https://github.com/quantumlib/Qualtran

  3. arXiv:2311.17589  [pdf, other

    cs.GT cs.CR

    Emergent Outcomes of the veToken Model

    Authors: Thomas Lloyd, Daire O'Broin, Martin Harrigan

    Abstract: Decentralised organisations use blockchains as a basis for governance: they use on-chain transactions to allocate voting weight, publish proposals, cast votes, and enact the results. However, blockchain-based governance structures have challenges, mostly notably, the need to align the short-term outlook of pseudononymous voters with the long-term growth and success of the decentralised organisat… ▽ More

    Submitted 29 November, 2023; originally announced November 2023.

    Comments: 15 pages, 5 figures

  4. arXiv:2007.07048  [pdf, other

    cs.CR

    The Bisq DAO: On the Privacy Cost of Participation

    Authors: Liam Hickey, Martin Harrigan

    Abstract: The Bisq DAO is a core component of Bisq, a decentralized cryptocurrency exchange. The purpose of the Bisq DAO is to decentralize the governance and finance functions of the exchange. However, by interacting with the Bisq DAO, participants necessarily publish data to the Bitcoin blockchain and broadcast additional data to the Bisq peer-to-peer network. We examine the privacy cost to participants i… ▽ More

    Submitted 14 July, 2020; originally announced July 2020.

    Comments: 13 pages, 1 figure

  5. arXiv:1809.05360  [pdf, other

    cs.CR

    Airdrops and Privacy: A Case Study in Cross-Blockchain Analysis

    Authors: Martin Harrigan, Lei Shi, Jacob Illum

    Abstract: Airdrops are a popular method of distributing cryptocurrencies and tokens. While often considered risk-free from the point of view of recipients, their impact on privacy is easily overlooked. We examine the Clam airdrop of 2014, a forerunner to many of today's airdrops, that distributed a new cryptocurrency to every address with a non-dust balance on the Bitcoin, Litecoin and Dogecoin blockchains.… ▽ More

    Submitted 14 September, 2018; originally announced September 2018.

    Comments: 17 pages, 7 figures

  6. The Unreasonable Effectiveness of Address Clustering

    Authors: Martin Harrigan, Christoph Fretter

    Abstract: Address clustering tries to construct the one-to-many mapping from entities to addresses in the Bitcoin system. Simple heuristics based on the micro-structure of transactions have proved very effective in practice. In this paper we describe the primary reasons behind this effectiveness: address reuse, avoidable merging, super-clusters with high centrality, and the incremental growth of address clu… ▽ More

    Submitted 14 September, 2018; v1 submitted 20 May, 2016; originally announced May 2016.

    Comments: 14 pages, 6 figures, The Unreasonable Effectiveness of Address Clustering, Harrigan, M. and Fretter, C., The 13th IEEE International Conference on Advanced and Trusted Computing (ATC'16), 2016

  7. arXiv:1202.5216  [pdf, other

    cs.SI

    Identifying Discriminating Network Motifs in YouTube Spam

    Authors: Derek O'Callaghan, Martin Harrigan, Joe Carthy, Pádraig Cunningham

    Abstract: Like other social media websites, YouTube is not immune from the attention of spammers. In particular, evidence can be found of attempts to attract users to malicious third-party websites. As this type of spam is often associated with orchestrated campaigns, it has a discernible network signature, based on networks derived from comments posted by users to videos. In this paper, we examine examples… ▽ More

    Submitted 23 February, 2012; originally announced February 2012.

    Comments: 8 pages, 5 figures. arXiv admin note: significant text overlap with arXiv:1201.3783

    ACM Class: C.2.0; H.3.5

  8. arXiv:1201.3783  [pdf, other

    cs.SI physics.soc-ph

    Network Analysis of Recurring YouTube Spam Campaigns

    Authors: Derek O'Callaghan, Martin Harrigan, Joe Carthy, Pádraig Cunningham

    Abstract: As the popularity of content sharing websites such as YouTube and Flickr has increased, they have become targets for spam, phishing and the distribution of malware. On YouTube, the facility for users to post comments can be used by spam campaigns to direct unsuspecting users to bogus e-commerce websites. In this paper, we demonstrate how such campaigns can be tracked over time using network motif… ▽ More

    Submitted 18 January, 2012; originally announced January 2012.

  9. arXiv:1107.4524  [pdf, other

    physics.soc-ph cs.SI

    An Analysis of Anonymity in the Bitcoin System

    Authors: Fergal Reid, Martin Harrigan

    Abstract: Anonymity in Bitcoin, a peer-to-peer electronic currency system, is a complicated issue. Within the system, users are identified by public-keys only. An attacker wishing to de-anonymize its users will attempt to construct the one-to-many mapping between users and public-keys and associate information external to the system with the users. Bitcoin tries to prevent this attack by storing the mapping… ▽ More

    Submitted 7 May, 2012; v1 submitted 22 July, 2011; originally announced July 2011.

    Comments: 28 pages, 14 Figures. Updated with further related work, additional technical details. Format changed to author prepared book chapter preprint. Supporting code, additional discussion: http://anonymity-in-bitcoin.blogspot.com/