{"record_type":"pith_number_record","schema_url":"https://pith.science/schemas/pith-number/v1.json","pith_number":"pith:2026:YNTG6ZRWIPKOYHHY7GIP6VXB6U","short_pith_number":"pith:YNTG6ZRW","schema_version":"1.0","canonical_sha256":"c3666f663643d4ec1cf8f990ff56e1f53f6180c6614248cb24b367383d813ef4","source":{"kind":"arxiv","id":"2605.13132","version":1},"attestation_state":"computed","paper":{"title":"Extending Blockchain Untraceability with Plausible Deniability","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"Blockchain transfers can be hidden by staging them to look like ordinary DeFi losses from sandwich attacks or arbitrage.","cross_cats":[],"primary_cat":"cs.CR","authors_text":"Eunchan Park, Kyonghwa Song, Min Suk Kang, Won Hoi Kim, Wonho Song","submitted_at":"2026-05-13T08:02:15Z","abstract_excerpt":"Traditional blockchain untraceability schemes, such as mixers and privacy coins, obscure the sender-receiver relationship by placing transfers within an anonymity set. This paper studies a stronger goal: whether the transfer event itself can be made unobservable by blending into common decentralized-finance (DeFi) activity. We introduce Deniable Covert Asset Transfer (DCAT), a class of transfers that stage common loss-producing events, such as sandwich and arbitrage operations, so that a sender appears to suffer an ordinary loss while the receiver appears to profit from it. We design and valid"},"verification_status":{"content_addressed":true,"pith_receipt":true,"author_attested":false,"weak_author_claims":0,"strong_author_claims":0,"externally_anchored":false,"storage_verified":false,"citation_signatures":0,"replication_records":0,"graph_snapshot":true,"references_resolved":true,"formal_links_present":true},"canonical_record":{"source":{"id":"2605.13132","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.CR","submitted_at":"2026-05-13T08:02:15Z","cross_cats_sorted":[],"title_canon_sha256":"bafce17662e2d9a8d14e931bf43b62c78d92b2e413d929b106e7992d7e75f073","abstract_canon_sha256":"530f867ab6a1e780dacf8391a1613752150754792c9609c54ff27a6a9c662f34"},"schema_version":"1.0"},"receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T03:08:57.733061Z","signature_b64":"miVNdikJN7cw7YcukDlo6+9c+aCMGNlVBaHY9S1NIid32ZY80Gqji42joY1Ig3DUlVylsFoxGC8Bvz2h4e+JDg==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"c3666f663643d4ec1cf8f990ff56e1f53f6180c6614248cb24b367383d813ef4","last_reissued_at":"2026-05-18T03:08:57.732260Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T03:08:57.732260Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"graph_snapshot":{"paper":{"title":"Extending Blockchain Untraceability with Plausible Deniability","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"Blockchain transfers can be hidden by staging them to look like ordinary DeFi losses from sandwich attacks or arbitrage.","cross_cats":[],"primary_cat":"cs.CR","authors_text":"Eunchan Park, Kyonghwa Song, Min Suk Kang, Won Hoi Kim, Wonho Song","submitted_at":"2026-05-13T08:02:15Z","abstract_excerpt":"Traditional blockchain untraceability schemes, such as mixers and privacy coins, obscure the sender-receiver relationship by placing transfers within an anonymity set. This paper studies a stronger goal: whether the transfer event itself can be made unobservable by blending into common decentralized-finance (DeFi) activity. We introduce Deniable Covert Asset Transfer (DCAT), a class of transfers that stage common loss-producing events, such as sandwich and arbitrage operations, so that a sender appears to suffer an ordinary loss while the receiver appears to profit from it. We design and valid"},"claims":{"count":4,"items":[{"kind":"strongest_claim","text":"DCAT transfers are syntactically identical to corresponding MEV activities, classified as ordinary extractions by standard MEV detection tools, and leave the sender and receiver unlinked under representative forensic tools.","source":"verdict.strongest_claim","status":"machine_extracted","claim_id":"C1","attestation":"unclaimed"},{"kind":"weakest_assumption","text":"That the staged DCAT events remain indistinguishable from genuine MEV activity under real-world economic semantics and that power-law distributions in MEV losses are stable enough to prevent reliable fixed-threshold detection.","source":"verdict.weakest_assumption","status":"machine_extracted","claim_id":"C2","attestation":"unclaimed"},{"kind":"one_line_summary","text":"DCAT hides asset transfers by making them appear as typical MEV losses like sandwiches and arbitrages, rendering them syntactically identical to normal DeFi activity and providing plausible deniability.","source":"verdict.one_line_summary","status":"machine_extracted","claim_id":"C3","attestation":"unclaimed"},{"kind":"headline","text":"Blockchain transfers can be hidden by staging them to look like ordinary DeFi losses from sandwich attacks or arbitrage.","source":"verdict.pith_extraction.headline","status":"machine_extracted","claim_id":"C4","attestation":"unclaimed"}],"snapshot_sha256":"c27bb2065c1ab644928741ae2f6f002bdd8c7ab2584d129a22261a9c52e121d1"},"source":{"id":"2605.13132","kind":"arxiv","version":1},"verdict":{"id":"a4d8d2bb-59d7-4623-b900-01ffcd4905c0","model_set":{"reader":"grok-4.3"},"created_at":"2026-05-14T18:49:27.930355Z","strongest_claim":"DCAT transfers are syntactically identical to corresponding MEV activities, classified as ordinary extractions by standard MEV detection tools, and leave the sender and receiver unlinked under representative forensic tools.","one_line_summary":"DCAT hides asset transfers by making them appear as typical MEV losses like sandwiches and arbitrages, rendering them syntactically identical to normal DeFi activity and providing plausible deniability.","pipeline_version":"pith-pipeline@v0.9.0","weakest_assumption":"That the staged DCAT events remain indistinguishable from genuine MEV activity under real-world economic semantics and that power-law distributions in MEV losses are stable enough to prevent reliable fixed-threshold detection.","pith_extraction_headline":"Blockchain transfers can be hidden by staging them to look like ordinary DeFi losses from sandwich attacks or arbitrage."},"references":{"count":62,"sample":[{"doi":"","year":2021,"title":"Coinjoin in the wild: An empirical analysis in dash,","work_id":"bb904e43-e13b-495f-99ec-4f20bc417ae1","ref_index":1,"cited_arxiv_id":"","is_internal_anchor":false},{"doi":"","year":2019,"title":"Tornado cash privacy solution version 1.4,","work_id":"6eb135d7-f813-4954-8099-594d18d1d530","ref_index":2,"cited_arxiv_id":"","is_internal_anchor":false},{"doi":"","year":2014,"title":"Mixcoin: Anonymity for bitcoin with accountable mixes,","work_id":"bde2d450-c9b0-46c2-affa-6cdc2c6bb124","ref_index":3,"cited_arxiv_id":"","is_internal_anchor":false},{"doi":"","year":2015,"title":"Blindcoin: Blinded, accountable mixes for bitcoin,","work_id":"31d2cba0-cec8-4dd3-b372-f31241961593","ref_index":4,"cited_arxiv_id":"","is_internal_anchor":false},{"doi":"","year":2014,"title":"Coinshuffle: Practical decentralized coin mixing for bitcoin,","work_id":"546b17cc-5ae9-403b-8960-c1386ba3b51a","ref_index":5,"cited_arxiv_id":"","is_internal_anchor":false}],"resolved_work":62,"snapshot_sha256":"71def4f5b6db1dde20361d3614410852886933ed7ca2aa90c0fd2e815831e657","internal_anchors":0},"formal_canon":{"evidence_count":2,"snapshot_sha256":"fb77ac1fbb3fc1e8cacf1d191a2f85690220ee505bb96b9442e4809f9f9c1d45"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"aliases":[{"alias_kind":"arxiv","alias_value":"2605.13132","created_at":"2026-05-18T03:08:57.732386+00:00"},{"alias_kind":"arxiv_version","alias_value":"2605.13132v1","created_at":"2026-05-18T03:08:57.732386+00:00"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.2605.13132","created_at":"2026-05-18T03:08:57.732386+00:00"},{"alias_kind":"pith_short_12","alias_value":"YNTG6ZRWIPKO","created_at":"2026-05-18T12:33:37.589309+00:00"},{"alias_kind":"pith_short_16","alias_value":"YNTG6ZRWIPKOYHHY","created_at":"2026-05-18T12:33:37.589309+00:00"},{"alias_kind":"pith_short_8","alias_value":"YNTG6ZRW","created_at":"2026-05-18T12:33:37.589309+00:00"}],"events":[],"event_summary":{},"paper_claims":[],"inbound_citations":{"count":0,"internal_anchor_count":0,"sample":[]},"formal_canon":{"evidence_count":2,"sample":[],"anchors":[]},"links":{"html":"https://pith.science/pith/YNTG6ZRWIPKOYHHY7GIP6VXB6U","json":"https://pith.science/pith/YNTG6ZRWIPKOYHHY7GIP6VXB6U.json","graph_json":"https://pith.science/api/pith-number/YNTG6ZRWIPKOYHHY7GIP6VXB6U/graph.json","events_json":"https://pith.science/api/pith-number/YNTG6ZRWIPKOYHHY7GIP6VXB6U/events.json","paper":"https://pith.science/paper/YNTG6ZRW"},"agent_actions":{"view_html":"https://pith.science/pith/YNTG6ZRWIPKOYHHY7GIP6VXB6U","download_json":"https://pith.science/pith/YNTG6ZRWIPKOYHHY7GIP6VXB6U.json","view_paper":"https://pith.science/paper/YNTG6ZRW","resolve_alias":"https://pith.science/api/pith-number/resolve?arxiv=2605.13132&json=true","fetch_graph":"https://pith.science/api/pith-number/YNTG6ZRWIPKOYHHY7GIP6VXB6U/graph.json","fetch_events":"https://pith.science/api/pith-number/YNTG6ZRWIPKOYHHY7GIP6VXB6U/events.json","actions":{"anchor_timestamp":"https://pith.science/pith/YNTG6ZRWIPKOYHHY7GIP6VXB6U/action/timestamp_anchor","attest_storage":"https://pith.science/pith/YNTG6ZRWIPKOYHHY7GIP6VXB6U/action/storage_attestation","attest_author":"https://pith.science/pith/YNTG6ZRWIPKOYHHY7GIP6VXB6U/action/author_attestation","sign_citation":"https://pith.science/pith/YNTG6ZRWIPKOYHHY7GIP6VXB6U/action/citation_signature","submit_replication":"https://pith.science/pith/YNTG6ZRWIPKOYHHY7GIP6VXB6U/action/replication_record"}},"created_at":"2026-05-18T03:08:57.732386+00:00","updated_at":"2026-05-18T03:08:57.732386+00:00"}