2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and I 2018
DOI: 10.1109/cybermatics_2018.2018.00227
|View full text |Cite
|
Sign up to set email alerts
|

BeatCoin: Leaking Private Keys from Air-Gapped Cryptocurrency Wallets

Abstract: demo video (1): https://youtu.be/2WtiHZNeveY demo video (2): https://youtu.be/ddmHOvT866oAbstract-Cryptocurrency wallets store the wallets private key(s), and hence, are a lucrative target for attackers. With possession of the private key, an attacker virtually owns all of the currency in the compromised wallet. Managing cryptocurrency wallets offline, in isolated ('air-gapped') computers, has been suggested in order to secure the private keys from theft. Such air-gapped wallets are often referred to as 'cold … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
12
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 27 publications
(15 citation statements)
references
References 40 publications
0
12
0
Order By: Relevance
“…This is true of systems which are not connected to the Internet or those that have no external gateway access. The real threat comes from air-gap bridging which involves creating a communication medium over a protected network [12].…”
Section: When Emanation Side Channel Meets Critical Datamentioning
confidence: 99%
“…This is true of systems which are not connected to the Internet or those that have no external gateway access. The real threat comes from air-gap bridging which involves creating a communication medium over a protected network [12].…”
Section: When Emanation Side Channel Meets Critical Datamentioning
confidence: 99%
“…Such bank and regulatory requirements can change over time, and there has been little research on the ways in which offenders circumvent (or fail to circumvent) these shifting anti-money laundering processes. In addition to directly stealing money, offenders employ data theft, often through the use of phishing attacks or the deployment of trojans (Etaher, Weir, and Alazab 2015; Guri 2018;Aston et al 2009), to gain personal identifying information (PII), payment information, login credentials, or other sensitive data. This data then facilitates future theft.…”
Section: Coerced Transactionsmentioning
confidence: 99%
“…al. [15] proposed a threshold signature scheme compatible with bitcoins signature by using Elliptic Curve Digital Signature Algorithm providing security policy of shared control of a wallet in which each player gets only a single share. Dikshit et al scheme [16] proposed an extend the weighted threshold ECDSA scheme.…”
Section: Scheme Comparisonmentioning
confidence: 99%
“…There is mainly a private key generation scheme combining random seed with a password in the user's private key generation arena, using random seed and password stored in the local device to generate private keys [13]. In the private key storage arena, the main solutions are local storage, offline storage [14], encrypted wallet, account custody [15], and hierarchical deterministic wallet [16,17]. In the private key use arena, multi-signature [18][19][20] and threshold signature schemes [21,22] are mainly proposed.…”
Section: Introductionmentioning
confidence: 99%