Extending Blockchain Untraceability with Plausible Deniability
Eunchan Park, Kyonghwa Song, Won Hoi Kim, Wonho Song, Min Suk Kang
TLDR
This paper introduces Deniable Covert Asset Transfer (DCAT) to make blockchain transactions untraceable by blending them into common DeFi MEV activities.
Key contributions
- Introduces Deniable Covert Asset Transfer (DCAT) for unobservable blockchain transfers.
- DCAT stages common DeFi loss events (sandwich/arbitrage) to hide sender-receiver links.
- Validates DCAT on Ethereum and Arbitrum, showing empirical unobservability against forensic tools.
- Develops a multivariate statistical method to identify suspicious DCAT-like activity amidst real MEV.
Why it matters
This paper presents a novel method to achieve strong blockchain untraceability by disguising transfers as ordinary DeFi losses, challenging current forensic capabilities. It also provides a statistical framework to detect such covert activities, crucial for maintaining transparency and security in decentralized finance.
Original Abstract
Traditional blockchain untraceability schemes, such as mixers and privacy coins, obscure the sender-receiver relationship by placing transfers within an anonymity set. This paper studies a stronger goal: whether the transfer event itself can be made unobservable by blending into common decentralized-finance (DeFi) activity. We introduce Deniable Covert Asset Transfer (DCAT), a class of transfers that stage common loss-producing events, such as sandwich and arbitrage operations, so that a sender appears to suffer an ordinary loss while the receiver appears to profit from it. We design and validate two DCAT instantiations: a sandwich-based transfer on Ethereum and an arbitrage-based transfer on Arbitrum. Our experiments show that, under the evaluated settings, DCAT transfers are empirically unobservable on both chains. They are syntactically identical to corresponding maximal extractable value (MEV) activities, classified as ordinary extractions by standard MEV detection tools, and leave the sender and receiver unlinked under representative forensic tools. Since syntactic inspection cannot distinguish DCAT from ordinary MEV activity, we examine whether economic semantics provide useful forensic signals. Through a large-scale study of MEV losses on Ethereum and Arbitrum, we show that key semantic features follow power laws. Extreme losses and repeatedly exploited addresses occur in the wild, and thus are not by themselves definitive evidence of collusion. This gives staged transfers plausible deniability and makes fixed-threshold detection prone to false positives. We therefore develop a multivariate statistical method for forensic triage that ranks incidents by the joint rarity of their economic footprint. Applied to real-world DeFi activity, our method narrows a large search space to suspicious cases for manual investigation; we present three such cases to illustrate this prioritization.
📬 Weekly AI Paper Digest
Get the top 10 AI/ML arXiv papers from the week — summarized, scored, and delivered to your inbox every Monday.