{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,11,11]],"date-time":"2024-11-11T00:10:17Z","timestamp":1731283817434,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":67,"publisher":"ACM","funder":[{"DOI":"10.13039\/https:\/\/doi.org\/10.13039\/100000001","name":"NSF (National Science Foundation)","doi-asserted-by":"publisher","award":["CNS-2152644"],"id":[{"id":"10.13039\/https:\/\/doi.org\/10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,11,4]]},"DOI":"10.1145\/3646547.3689005","type":"proceedings-article","created":{"date-parts":[[2024,11,1]],"date-time":"2024-11-01T13:40:26Z","timestamp":1730468426000},"page":"704-712","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Give and Take: An End-To-End Investigation of Giveaway Scam Conversion Rates"],"prefix":"10.1145","author":[{"ORCID":"http:\/\/orcid.org\/0000-0003-4288-8485","authenticated-orcid":false,"given":"Enze","family":"Liu","sequence":"first","affiliation":[{"name":"UC San Diego, La Jolla, CA, USA"}]},{"ORCID":"http:\/\/orcid.org\/0009-0003-0170-9601","authenticated-orcid":false,"given":"George","family":"Kappos","sequence":"additional","affiliation":[{"name":"Chainalysis, New York, NY, USA"}]},{"ORCID":"http:\/\/orcid.org\/0009-0006-4967-6820","authenticated-orcid":false,"given":"Eric","family":"Mugnier","sequence":"additional","affiliation":[{"name":"UC San Diego, La Jolla, CA, USA"}]},{"ORCID":"http:\/\/orcid.org\/0000-0001-8420-0760","authenticated-orcid":false,"given":"Luca","family":"Invernizzi","sequence":"additional","affiliation":[{"name":"Google, Mountain View, CA, USA"}]},{"ORCID":"http:\/\/orcid.org\/0000-0001-6617-8029","authenticated-orcid":false,"given":"Stefan","family":"Savage","sequence":"additional","affiliation":[{"name":"UC San Diego, La Jolla, CA, USA"}]},{"ORCID":"http:\/\/orcid.org\/0009-0005-2440-4389","authenticated-orcid":false,"given":"David","family":"Tao","sequence":"additional","affiliation":[{"name":"Google, Mountain View, CA, USA"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-3762-5851","authenticated-orcid":false,"given":"Kurt","family":"Thomas","sequence":"additional","affiliation":[{"name":"Google, Mountain View, CA, USA"}]},{"ORCID":"http:\/\/orcid.org\/0000-0003-0865-7499","authenticated-orcid":false,"given":"Geoffrey M.","family":"Voelker","sequence":"additional","affiliation":[{"name":"UC San Diego, La Jolla, CA, USA"}]},{"ORCID":"http:\/\/orcid.org\/0000-0001-5671-1395","authenticated-orcid":false,"given":"Sarah","family":"Meiklejohn","sequence":"additional","affiliation":[{"name":"Google, Mountain View, CA, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2024,11,4]]},"reference":[{"volume-title":"Apr.","year":"2023","author":"Abraham E.","key":"e_1_3_2_1_1_1","unstructured":"E. Abraham. Elon Musk will give away 1 million Dogecoin if you can prove his family own emerald mine. https:\/\/www.indy100.com\/science-tech\/elon-muskemerald-mine-dogecoin-2659890703, Apr. 2023."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445679"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP54263.2024.00156"},{"volume-title":"Mar.","year":"2023","author":"Ahmed S.","key":"e_1_3_2_1_4_1","unstructured":"S. Ahmed. Linus Tech Tips YouTube channel hacked to promote Elon Musk crypto scam videos, Mar. 2023. https:\/\/www.dexerto.com\/entertainment\/linustech- tips-youtube-channel-hacked-crypto-elon-musk-scam-2094461\/."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2019.02.004"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/EnT.2019.00008"},{"volume-title":"Jan.","year":"2020","author":"Bartoletti M.","key":"e_1_3_2_1_7_1","unstructured":"M. Bartoletti, S. Carta, T. Cimoli, and R. Saia. Dissecting Ponzi schemes on Ethereum: identification, analysis, and impact. Future Generation Computer Systems, 102(C):259--277, Jan. 2020."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVCBT.2018.00014"},{"volume-title":"Mar.","year":"2018","author":"Bian S.","key":"e_1_3_2_1_9_1","unstructured":"S. Bian, Z. Deng, F. Li, W. Monroe, P. Shi, Z. Sun, W. Wu, S. Wang, W. Y. Wang, A. Yuan, T. Zhang, and J. Li. IcoRating: A Deep-Learning System for Scam ICO Identification. arXiv preprint arXiv:1803.03670, Mar. 2018."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3320269.3384719"},{"volume-title":"Apr.","year":"2024","key":"e_1_3_2_1_11_1","unstructured":"Chainalysis. Bitcoin Fog Case Confirms Chainalysis Analytics is Reliable and Admissible in Court, Apr. 2024. https:\/\/www.chainalysis.com\/blog\/bitcoin-fogdaubert- hearing-chainalysis\/."},{"volume-title":"Chainalysis Crypto Investigations. https:\/\/www.chainalysis.com\/ solution\/crypto-investigations","year":"2024","key":"e_1_3_2_1_12_1","unstructured":"Chainalysis. Chainalysis Crypto Investigations. https:\/\/www.chainalysis.com\/ solution\/crypto-investigations, 2024."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3178876.3186046"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2905769"},{"volume-title":"May","year":"2024","key":"e_1_3_2_1_15_1","unstructured":"christsim. multicoin-address-validator, May 2024. https:\/\/www.npmjs.com\/ package\/multicoin-address-validator."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3559342"},{"issue":"3","key":"e_1_3_2_1_17_1","first-page":"935","article-title":"?. A New Wolf in Town?","volume":"27","author":"Dhawan A.","year":"2023","unstructured":"A. Dhawan and T. J. Putnin, ?. A New Wolf in Town? Pump-and-Dump Manipulation in Cryptocurrency Markets. Review of Finance, 27(3):935--975, May 2023.","journal-title":"Pump-and-Dump Manipulation in Cryptocurrency Markets. Review of Finance"},{"key":"e_1_3_2_1_18_1","first-page":"138","volume-title":"Proceedings of the ACM Designing Interactive Systems Conference (DIS)","author":"Fr\u00f6hlich M.","year":"2021","unstructured":"M. Fr\u00f6hlich, M. R. Wagenhaus, A. Schmidt, and F. Alt. Don?t Stop Me Now! Exploring Challenges of First-Time Cryptocurrency Users. In Proceedings of the ACM Designing Interactive Systems Conference (DIS), pages 138--148, June 2021."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3428335"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3576915.3623094"},{"volume-title":"Mar.","year":"2024","author":"Grguric M.","key":"e_1_3_2_1_21_1","unstructured":"M. Grguric. What Are Mobile Game Whales and How to Catch Them? https:\/\/www.blog.udonis.co\/mobile-marketing\/mobile-games\/mobilegames- whales, Mar. 2024."},{"key":"e_1_3_2_1_22_1","first-page":"1","volume-title":"Posters at the Symposium on Usable Privacy and Security (SOUPS)","author":"Guan Y.","year":"2023","unstructured":"Y. Guan, Y. Yu, T. Sharma, K. Qin, Y. Wang, and Y. Wang. Examining User Perceptions of Stablecoins: Understandings and Risks. In Posters at the Symposium on Usable Privacy and Security (SOUPS), pages 1--7, Aug. 2023."},{"key":"e_1_3_2_1_23_1","first-page":"1","volume-title":"Proceedings of the Workshop on the Economics of Information Security (WEIS)","author":"Hamrick J.","year":"2019","unstructured":"J. Hamrick, F. Rouhi, A. Mukherjee, A. Feder, N. Gandal, T. Moore, and M. Vasek. The Economics of Cryptocurrency Pump and Dump Schemes. In Proceedings of the Workshop on the Economics of Information Security (WEIS), pages 1--24, June 2019."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3576915.3623210"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ECRIME.2018.8376207"},{"volume-title":"Apr.","year":"2022","author":"Horetski D.","key":"e_1_3_2_1_26_1","unstructured":"D. Horetski. Twitch battles fake Elon Musk streams again with scam Bitcoin giveaways. https:\/\/www.dexerto.com\/entertainment\/twitch-battles-fake-elonmusk-streams-again-with-scam- bitcoin-giveaways-1803537\/, Apr. 2022."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00047"},{"volume-title":"May","year":"2023","author":"Huang J.","key":"e_1_3_2_1_28_1","unstructured":"J. Huang, N. He, K. Ma, J. Xiao, and H. Wang. A Deep Dive into NFT Rug Pulls. arXiv preprint arXiv:2305.06108, May 2023."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/Blockchain.2019.00042"},{"volume-title":"Nov.","year":"2018","author":"Kamps J.","key":"e_1_3_2_1_30_1","unstructured":"J. Kamps and B. Kleinberg. To the moon: defining and detecting cryptocurrency pump-and-dumps. Crime Science, 7(18), Nov. 2018."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455774"},{"key":"e_1_3_2_1_32_1","first-page":"2207","volume-title":"Proceedings of the 31st USENIX Security Symposium (Usenix Security)","author":"Kappos G.","year":"2022","unstructured":"G. Kappos, H. Yousaf, R. St\u00fctz, S. Rollet, B. Haslhofer, and S. Meiklejohn. How to Peel a Million: Validating and Expanding Bitcoin Clusters. In Proceedings of the 31st USENIX Security Symposium (Usenix Security), pages 2207--2223, Aug. 2022."},{"key":"e_1_3_2_1_33_1","first-page":"241","volume-title":"Proceedings of the 27th Conference on Financial Cryptography and Data Security (FC)","author":"Kell T.","year":"2023","unstructured":"T. Kell, H. Yousaf, S. Allen, S. Meiklejohn, and A. Juels. Forsage: Anatomy of a Smart-Contract Pyramid Scheme. In Proceedings of the 27th Conference on Financial Cryptography and Data Security (FC), pages 241--258, Dec. 2023."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-54970-4_33"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2022.3144763"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3626783"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/Blockchain60715.2023.00012"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2023.24584"},{"key":"e_1_3_2_1_39_1","first-page":"1","volume-title":"An Empirical Study. Social Science Research Network","author":"Liebau D.","year":"2019","unstructured":"D. Liebau and P. Schueffel. Crypto-Currencies and ICOs: Are They Scams? An Empirical Study. Social Science Research Network, pages 1--23, Jan. 2019."},{"volume-title":"Aug.","year":"2013","author":"Maxwell G.","key":"e_1_3_2_1_40_1","unstructured":"G. Maxwell. CoinJoin: Bitcoin privacy for the real world, Aug. 2013. https: \/\/bitcointalk.org\/index.php?topic=279249.0."},{"key":"e_1_3_2_1_41_1","first-page":"1","volume-title":"Proceedings of the 21st USENIX Security Symposium (Usenix Security)","author":"McCoy D.","year":"2012","unstructured":"D. McCoy, A. Pitsillidis, G. Jordan, N.Weaver, C. Kreibich, B. Krebs, G. M. Voelker, S. Savage, and K. Levchenko. PharmaLeaks: Understanding the Business of Online Pharmaceutical Affiliate Programs. In Proceedings of the 21st USENIX Security Symposium (Usenix Security), pages 1--16, Bellevue, WA, Aug. 2012."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2504730.2504747"},{"key":"e_1_3_2_1_43_1","unstructured":"MetaMask. How to turn on security alerts. https:\/\/support.metamask.io\/privacyand- security\/how-to-turn-on-security-alerts\/."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39884-1_3"},{"volume-title":"May","year":"2024","key":"e_1_3_2_1_45_1","unstructured":"nobitex. coinaddrvalidator, May 2024. https:\/\/github.com\/nobitex\/ coinaddrvalidator."},{"issue":"44","key":"e_1_3_2_1_46_1","first-page":"1","article-title":"An ego network analysis of sextortionists","volume":"10","author":"Oggier F.","year":"2020","unstructured":"F. Oggier, A. Datta, and S. Phetsouvanh. An ego network analysis of sextortionists. Social Network Analysis and Mining, 10(44):1--14, June 2020.","journal-title":"Social Network Analysis and Mining"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11135-020-01055-w"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/3318041.3355466"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICBC48266.2020.9169433"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3097983.3098082"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-4139-7_10"},{"volume-title":"Proceedings of the 2023 International Conference on Web and Social Media (ICWSM)","year":"2023","author":"Roy S. S.","key":"e_1_3_2_1_52_1","unstructured":"S. S. Roy, D. Das, P. Bose, C. Kruegel, G. Vigna, and S. Nilizadeh. Unveiling the Risks of NFT Promotion Scams. In Proceedings of the 2023 International Conference on Web and Social Media (ICWSM), Jan. 2023."},{"key":"e_1_3_2_1_53_1","first-page":"1","volume-title":"On the Tail Risk of Scam in the Market for Initial Coin Offerings. Social Science Research Network","author":"Sapkota N.","year":"2020","unstructured":"N. Sapkota, K. Grobys, and J. Dufitinema. How Much Are We Willing to Lose in Cyberspace? On the Tail Risk of Scam in the Market for Initial Coin Offerings. Social Science Research Network, pages 1--22, Nov. 2020."},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW59978.2023.00023"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/eCrime57793.2022.10142100"},{"key":"e_1_3_2_1_56_1","unstructured":"Streamlink. Streamlink 6.7.4 guide May 2024. https:\/\/streamlink.github.io\/."},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10611-019-09873-2"},{"key":"e_1_3_2_1_58_1","unstructured":"B. Toulas. Fake cryptocurrency giveaway sites have tripled this year Sept. 2022. https:\/\/www.bleepingcomputer.com\/news\/security\/fake-cryptocurrencygiveaway-sites-have-tripled-this-year\/."},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2921087"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/UEMCON54665.2022.9965686"},{"key":"e_1_3_2_1_61_1","first-page":"1","volume-title":"Even Using Bitcoin: Tracking the Popularity and Profits of Virtual Currency Scams. In Proceedings of the Conference on Financial Cryptography and Data Security (FC)","author":"Vasek M.","year":"2015","unstructured":"M. Vasek and T. Moore. There's No Free Lunch, Even Using Bitcoin: Tracking the Popularity and Profits of Virtual Currency Scams. In Proceedings of the Conference on Financial Cryptography and Data Security (FC), pages 1--17, Jan. 2015."},{"key":"e_1_3_2_1_62_1","first-page":"1","volume-title":"Proceedings of the 5th Workshop on Bitcoin and Blockchain Research","author":"Vasek M.","year":"2018","unstructured":"M. Vasek and T. Moore. Analyzing the Bitcoin Ponzi Scheme Ecosystem. In Proceedings of the 5th Workshop on Bitcoin and Blockchain Research, pages 1--12, Mar. 2018."},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491051"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1109\/eCrime51433.2020.9493255"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101993"},{"key":"e_1_3_2_1_66_1","first-page":"1609","volume-title":"Proceedings of the 28th USENIX Security Symposium (Usenix Security)","author":"Xu J.","year":"2019","unstructured":"J. Xu and B. Livshits. The Anatomy of a Cryptocurrency Pump-and-Dump Scheme. In Proceedings of the 28th USENIX Security Symposium (Usenix Security), pages 1609--1625, Aug. 2019."},{"issue":"2","key":"e_1_3_2_1_67_1","article-title":"The ICO Gold Rush: It's a Scam, It's a Bubble, It's a Super Challenge for Regulators","volume":"60","author":"Zetzsche D. A.","year":"2019","unstructured":"D. A. Zetzsche, R. P. Buckley, D. W. Arner, and L. F\u00f6hr. The ICO Gold Rush: It's a Scam, It's a Bubble, It's a Super Challenge for Regulators. Harvard International Law Journal, 60(2), Summer 2019.","journal-title":"Harvard International Law Journal"}],"event":{"name":"IMC '24: ACM Internet Measurement Conference","sponsor":["SIGMETRICS ACM Special Interest Group on Measurement and Evaluation","SIGCOMM ACM Special Interest Group on Data Communication"],"location":"Madrid Spain","acronym":"IMC '24"},"container-title":["Proceedings of the 2024 ACM on Internet Measurement Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3646547.3689005","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,10]],"date-time":"2024-11-10T23:32:13Z","timestamp":1731281533000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3646547.3689005"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,4]]},"references-count":67,"alternative-id":["10.1145\/3646547.3689005","10.1145\/3646547"],"URL":"https:\/\/doi.org\/10.1145\/3646547.3689005","relation":{},"subject":[],"published":{"date-parts":[[2024,11,4]]},"assertion":[{"value":"2024-11-04","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}