TY - GEN
T1 - Android-based Cryptocurrency Wallets
T2 - 3rd IEEE International Conference on Blockchain, Blockchain 2020
AU - Li, Cong
AU - He, Daojing
AU - Li, Shihao
AU - Zhu, Sencun
AU - Chan, Sammy
AU - Cheng, Yao
N1 - Funding Information:
ACKNOWLEDGMENT This research is supported by the National Key R&D Program of China (2017YFB0802805 and 2017YFB0801701), the National Natural Science Foundation of China (Grants: U1936120, U1636216), Joint Fund of Ministry of Education of China for Equipment Preresearch (No. 6141A020333), the Fundamental Research Funds for the Central Universities, and the Basic Research Program of State Grid Shanghai Municipal Electric Power Company (52094019007F). Daojing He is the corresponding author of this article.
Publisher Copyright:
© 2020 IEEE.
PY - 2020/11
Y1 - 2020/11
N2 - The security of cryptocurrency wallets is directly related to the security of personal assets. However, due to the design defects of mobile operating system and cryptocurrency wallets, security incidents of cryptocurrency wallets occur frequently, causing irreversible losses to users' assets or privacy. In this paper, we study the security risks of Android-based cryptocurrency wallets. We establish the adversary model, analyze the attack surface originated from the Android OS, and demonstrate several attack vectors by conducting experiments on multiple popular cryptocurrency wallets in Google Play Store. Finally, we present several security defense strategies in response to the security risks.
AB - The security of cryptocurrency wallets is directly related to the security of personal assets. However, due to the design defects of mobile operating system and cryptocurrency wallets, security incidents of cryptocurrency wallets occur frequently, causing irreversible losses to users' assets or privacy. In this paper, we study the security risks of Android-based cryptocurrency wallets. We establish the adversary model, analyze the attack surface originated from the Android OS, and demonstrate several attack vectors by conducting experiments on multiple popular cryptocurrency wallets in Google Play Store. Finally, we present several security defense strategies in response to the security risks.
UR - https://www.scopus.com/pages/publications/85099217819
UR - https://www.scopus.com/pages/publications/85099217819#tab=citedBy
U2 - 10.1109/Blockchain50366.2020.00010
DO - 10.1109/Blockchain50366.2020.00010
M3 - Conference contribution
AN - SCOPUS:85099217819
T3 - Proceedings - 2020 IEEE International Conference on Blockchain, Blockchain 2020
SP - 9
EP - 16
BT - Proceedings - 2020 IEEE International Conference on Blockchain, Blockchain 2020
PB - Institute of Electrical and Electronics Engineers Inc.
Y2 - 2 November 2020 through 6 November 2020
ER -