An Analysis of Non-standard Transactions

In Bitcoin, the most common kind of transactions is in the form “Bob pays Alice”, and it is based on the Pay to-Public Key Hash(P2PKH) script, which are resolved by sending the public key and a digital signature created by the corresponding private key. P2PKH transactions are just one among many standard classes: a transaction is standard if it passes Bitcoin Core’s IsStandard() and IsStandardTx() tests. However, the creation of ad-hoc scripts to lock (and unlock) transactions allows for also generating non-standard transactions, which can be nevertheless broadcast and mined as well. In this work, we explore the Bitcoin block-chain with the purpose to analyze and classify standard and non-standard transactions, understanding how much the standard behaviour is respected.

[1]  Stefano Bistarelli,et al.  A Suite of Tools for the Forensic Analysis of Bitcoin Transactions: Preliminary Report , 2018, Euro-Par Workshops.

[2]  Stefano Bistarelli,et al.  Visualizing Bitcoin Flows of Ransomware: WannaCry One Week Later , 2018, ITASEC.

[3]  Massimo Bartoletti,et al.  A Journey into Bitcoin Metadata , 2019, Journal of Grid Computing.

[4]  Forrest Stonedahl,et al.  Data Insertion in Bitcoin's Blockchain , 2018, Ledger.

[5]  Marcin Andrychowicz,et al.  Secure Multiparty Computations on Bitcoin , 2014, 2014 IEEE Symposium on Security and Privacy.

[6]  Klaus Wehrle,et al.  A Quantitative Analysis of the Impact of Arbitrary Blockchain Content on Bitcoin , 2018, Financial Cryptography.

[7]  Klaus Wehrle,et al.  Thwarting Unwanted Blockchain Content Insertion , 2018, 2018 IEEE International Conference on Cloud Engineering (IC2E).

[8]  Stefano Bistarelli,et al.  An end-to-end voting-system based on bitcoin , 2017, SAC.

[9]  Stefano Bistarelli,et al.  Go with the -Bitcoin- Flow, with Visual Analytics , 2017, ARES.

[10]  Tyler Moore,et al.  Financial Cryptography and Data Security , 2014, Lecture Notes in Computer Science.

[11]  Charles H. Moore,et al.  The evolution of Forth , 1996 .

[12]  Stefano Bistarelli,et al.  End-to-End Voting with Non-Permissioned and Permissioned Ledgers , 2019, Journal of Grid Computing.

[13]  Stefano Bistarelli,et al.  An Analysis of Non-standard Bitcoin Transactions , 2018, 2018 Crypto Valley Conference on Blockchain Technology (CVCBT).

[14]  Damon McCoy,et al.  Stressing Out: Bitcoin "Stress Testing" , 2016, Financial Cryptography Workshops.

[15]  Stefano Bistarelli,et al.  Analysis of Ethereum Smart Contracts and Opcodes , 2019, AINA.