The Ring of Gyges: Investigating the Future of Criminal Smart Contracts Ari Juels (Jacobs Institute, Cornell Tech, IC3), Ahmed Kosba (UMD), and Elaine.

Slides:



Advertisements
Similar presentations
"Being highly visible in the new world of social media" A presentation by Jared Evans Copyright © 2009.
Advertisements

Attention (your target market) !. Are you (their problem) ?
Factors to Consider in Choosing Instruments to Promote Environmental Services Sara J. Scherr and Andy White Conference on Payments for Environmental Services.
Surfing the net: Ways to protect yourself. Internet Safety Look into safeguarding programs or options your online service provider might offer. Look into.
Distance Education and Active Learning -One Approach to Support Succession Planning Aram Attarian, Ph.D North Carolina State University Department of Parks,
The Mississippi Truth Project is a statewide effort to create a truth and reconciliation commission that will bring to light racially motivated crimes.
Continuing to Leverage Technology to Solve Retail Asset Protection Challenges Byron Smith – Corporate Asset Protection Manager October 2013.
An insight into the project: Shellharbour Connect The simple way to connect with your local organisations, spaces and resources in Shellharbour.
INTERNET SAFETY FOR EVERYONE A QUICK AND EASY CRASH COURSE.
Creating a Winning E-Business Second Edition
Creating a Winning E-Business Second Edition Operating Your E-Business Chapter 5.
Things to think about: What kind of crime has been committed? Who is the victim? Who is the perpetrator? What is the motive? What happens to them all?
04 – THEATRE WEBSITE AND ONLINE TICKETING SYSTEMS B063 – OCER Theatre.
1 IP Multicast Applications: Challenges & Solutions Bob Quinn Stardust Forums, Inc. IP Multicast Initiative.
Chapter 9 e-Commerce Systems.
INTERNET SAFETY FOR EVERYONE
“Electronic Payment System”
Final Exam Module Closed Captioning Please click on the green arrow to proceed to the final exam.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
Electronic Banking BY Bahaa Abas Noor abo han. Definition * e-banking is defined as: …the automated delivery of new and traditional banking products and.
Top Objectives: 1.Increase web traffic and exposure 2.Become definitive authority on Coffee 3.Increase sales to coffee centric Food Service Operators 4.Engage.
What makes crime newsworthy? 1) the nature of the offense (violent) 2) demographic factors of the victim and offender (white and vulnerable victims) 3)
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Design Project 3: PattersonPark.com INFM 700, PROJECT # 3 – FALL 2013 (M.RAMAGEM, S.DELUCIA, S.KOLURO) UMD - COLLEGE OF INFORMATION STUDIES.
Criminal Law Chapter 3 Part I. What is a Crime?  Crime – is considered an act against the public good.  Laws in the U.S. detail crimes and provide punishment.
Understanding Our Investment Opportunity The Direct Corporate Private Offering Company Name Presenter Name Our Investor Relations Page: Benefits for Our.
Using asset forfeiture to fight crime Willie Hofmeyr Head: Asset Forfeiture Unit, RSA
Creating a Winning E-Business Second Edition Operating Your E-Business Chapter 5.
Honeypot and Intrusion Detection System
UP YOUR GAME!. SOCIAL MEDIA Social Networking – LeadingRE and Luxury Portfolio Hootsuite – Social Media Management Tool Social Media Content Calendar.
1 Book Cover Here PART D THE INFLUENCE AND IMPACT OF TECHNOLOGY Criminal Investigation: A Method for Reconstructing the Past, 7 th Edition Copyright ©
Sports Unlimited Reaching the World of customers Green Team Spring 2010.
Chapter 3 Section 1 What is a Crime?. What Is a Crime? An act against the public good The state or federal government represents the public good as the.
Resource Materials developed by UNODC in partnership with Govt. of India and civil society partners in addressing Human Trafficking For details see:
A paper presented for the TEM Conference, Sydney, Australia 27 th -30 th August 2006 Presentation by Anne Walker, Risk Manager Massey University New Zealand.
Econ 522 Economics of Law Dan Quint Fall 2009 Lecture 14.
1 Managing Risk in Mexico How to Maintain Profitable Operations through Risk Management.
Mario Čagalj Sveučilište u Splitu 2014/15. Sigurnost računala i podataka.
Digital Currency The Cyber World Economy. Cryptocurrency More accurately called “virtual currency”, cryptocurrency is based on the cryptography of exchange.
Public affairs and the media Part 2: Crime, law enforcement, courts, obituaries.
Money Page 86 Why do cows wear bells? Their horns don’t work!
Promoting increased nutrient use efficiency through carbon markets: Lessons learned and next steps C-AGG, November 2015.
THE PENAL SYSTEM AN OVERVIEW. Why do we have a penal system? Incapacitation: remove dangerous people from society so they don’t harm the rest of us. Deterrence:
Tom Reichart VP Business Development The Mercury Difference We’re dedicated to creating competitive advantages for our partners. Partner focused model.
Aim: How much crime is there in the United States?
7 th Grade Civics Miss Smith *pgs  Crime- any act that breaks the law and for which there is a punishment  Criminal- a person who commits.
SEO (Search Engine Optimization/Marketing) Linked In & The Small Business Presented by Leslie Collymore of Advanced.
ADMINISTRATIVE AGENCIES Crystal Wahlstrom-Kauffman April 1 st, 2008 MGT 335.
Few Tips To Buy Homeowners Insurance Leads. The lead generation market is constantly developing with the increasingly developing new lead generation models.
Counterfeiting Protection & Reduction MECH 3620 Advanced Manufacturing Process By: Rafael Mendez.
Ari Juels Co-Director, IC3 Professor, Jacobs Technion-Cornell Institute, Cornell Tech IC3 Intro and Retreat Preview.
Dr. Maria Chr. Alvanou Criminologist-Terrorism Expert Rome 20/10/2016
Town Crier: An Authenticated Data Feed for Smart Contracts
What makes crime newsworthy?
Sara J. Scherr and Andy White
cybercrime Presented to you by : NAMES MATRIC NO
Yoyo: QUESTION: A man went into a party and drank some of the punch. He then left early. Everyone at the party who drunk the punch subsequently died of.
Call Blockchain support number
Cryptocurrency Panel Jeffrey Alberts, Partner FinTech and Financial Institutions, Pryor Cashman Gabriel I. Hidalgo, Esq., Chief Compliance Officer Noble.
U.S. Department of Justice
Civil vs. Criminal Cases
Social Media And What Not To Share!
IGraphic Social impacts of IT
The Dark Web A Force for Good?.
Contracts in Real Estate Transactions
A guide for Real Estates
Bribery Act 2010 Your Name.
A PROJECT BY MANDAR PARNERKAR AND VINAYAK MANE
Block Chain Technology in Agriculture
Presentation transcript:

The Ring of Gyges: Investigating the Future of Criminal Smart Contracts Ari Juels (Jacobs Institute, Cornell Tech, IC3), Ahmed Kosba (UMD), and Elaine Shi (Cornell, IC3) IC3 Retreat 17 May 2016

Challenge #5: Safety and Compliance Bitcoin has catalyzed criminal activity. Smart contracts are more flexible, and could lead to worse. To defend and reap benefits of (decentralized) smart contracts, we must understand risks…

Criminal Smart Contracts (CSCs) CSC take advantage of (decentralized) smart contracts to solicit and sell crime. Smart contracts aim to overcome inefficiencies in business transactions. CSCs aim to overcome inefficiencies in criminal business transactions. Smart Contract

Bitcoin doesn't permit easy fair exchange Contractor C $$$ Perpetrator P X Smart contracts do.

CSCs solve two major business problems in crime 1.Trust requirements: Dangerous reliance on reputation E.g., Ross Ulbricht (DPR, Silk Road) solicited six murders for hire …including one from the FBI (Vinny D'Agostino, the FBI prosecutor, here today)

2.Interference by law enforcement, e.g., FBI shuts down your site CSCs solve two major business problems in crime

Example Criminal Smart Contract: "Calling Card" Crimes (Assassination, Website defacement, Arson, Terrorism, etc.)

Contract: Assassination C offers $reward (e.g., $1,000,000) for the assassination of Senator X How to verify: 1.That assassination happened? 2.That P was responsible? Solutions: 1.Authenticated data feed Assassination

Current events Commodity and equity prices Weather Webpage contents Sports Govt. documents For assassination

Contract: Assassination C offers $reward (e.g., $1,000,000) for the assassination of Senator X How to verify: 1.That assassination happened? 2.That P was responsible? Solutions: 1.Authenticated data feed 2.Calling card Assassination

Calling card Traditionally exotic object left by criminal E.g., Beltway Sniper's tarot cards In our setting, a calling card cc is set of details that are: 1.Hard to guess in advance; and 2.Reported by media in data feed Example details: Day, time, place Unusual keywords captured in news E.g., Litvinenko poisoned with "Polonium- 210" (2006) Beltway Sniper "The Phantom"

P Calling-card CSC Assassination $reward for Senator X P Commits: Authenticated news feed: P Decommits: P paid reward: cc vcc cc vc c X $reward P

Note that Same general protocol can be applied to: Violent crime: murder, arson, assault Cybercrimes: DoS, website defacement For many CSCs, e.g., Assassination, C can just walk away! Once CSC posted, no further interaction

Conclusion Smart contracts are interesting, powerful, and potentially quite beneficial. Criminal Smart Contracts are a real threat. Bitcoin stimulated new criminal ecosystems. Smart contracts will produce worse. Assassination is a little far fetched but exemplifies problem We're studying problem to design defenses preemptively