2019
DOI: 10.1007/978-3-030-34353-8_7
|View full text |Cite
|
Sign up to set email alerts
|

Attainable Hacks on Keystore Files in Ethereum Wallets—A Systematic Analysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 13 publications
(8 citation statements)
references
References 41 publications
0
8
0
Order By: Relevance
“…On the other hand, Node 2 does not execute any of these methods, indicating that the attacker behaves differently depending on the node being attacked. [42], who conducted a demonstration experiment of cracking Ethereum wallets, found that the dictionary attack is more efficient than the brute force attack.…”
Section: ) Differences In Attacks On Each Node By the Same Attackermentioning
confidence: 99%
“…On the other hand, Node 2 does not execute any of these methods, indicating that the attacker behaves differently depending on the node being attacked. [42], who conducted a demonstration experiment of cracking Ethereum wallets, found that the dictionary attack is more efficient than the brute force attack.…”
Section: ) Differences In Attacks On Each Node By the Same Attackermentioning
confidence: 99%
“…On the other hand, since there is no limit to the number of wallets, one can split their assets across multiple wallets, diversifying them not only by the amount but on the type as well. Furthermore, a user’s password policy should follow best practices, such as minimum password length, complexity and history enforcement, minimum and maximum password age [ 65 ]. Another primary concern is the design and scheduling of backup and recovery maintenance plans to respond effectively in the event of data loss [ 66 ].…”
Section: Cryptocurrency Walletsmentioning
confidence: 99%
“…As a result, the attacker gains access to more than $11.4 million worth of IOTA coins [59]. In [60] discussed a dictionary attack to break cryptographic hash and salt by This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/ This article has been accepted for publication in a future issue of this journal, but has not been fully edited.…”
Section: ) User Wallet Attacksmentioning
confidence: 99%