2023
DOI: 10.1109/access.2023.3273150
|View full text |Cite
|
Sign up to set email alerts
|

Stealing Keys From Hardware Wallets: A Single Trace Side-Channel Attack on Elliptic Curve Scalar Multiplication Without Profiling

Abstract: Over the past decade, decentralized cryptocurrencies have received attention in industry and academia. Hardware wallets are dedicated devices that manage cryptocurrencies safely without entrusting cryptographic keys to a third party. Side-channel attacks have been widely studied in cryptanalysis and have already been proven threatening, but analysis on hardware wallets still needs to be researched. Although the previous work demonstrated several side-channel vulnerabilities, their attacks require a finely cont… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 32 publications
0
1
0
Order By: Relevance
“…Hence, proper key management and algorithms are important [41,47,49]. Park et al [43] and Swambo and Poinsot [83] point out the risk of reconstructing the private key. AlFaw et al [67] state that digital signatures, hash function, mining malware, software flows, and user address vulnerabilities might be an issue, whereas Dabrowski et al [40] and Swambo and Poinsot [83] outline firmware, client software, and human-in-the-middle (MITM) of hardware wallets.…”
Section: Wallet Threatsmentioning
confidence: 99%
“…Hence, proper key management and algorithms are important [41,47,49]. Park et al [43] and Swambo and Poinsot [83] point out the risk of reconstructing the private key. AlFaw et al [67] state that digital signatures, hash function, mining malware, software flows, and user address vulnerabilities might be an issue, whereas Dabrowski et al [40] and Swambo and Poinsot [83] outline firmware, client software, and human-in-the-middle (MITM) of hardware wallets.…”
Section: Wallet Threatsmentioning
confidence: 99%