Javascript must be enabled to continue!
A Security Analysis of Cryptocurrency Wallets against Password Brute-Force Attacks
View through CrossRef
Currently, the monetary value of cryptocurrencies is extremely high, leading to frequent theft attempts. Cyberattacks targeting cryptocurrency wallets and the scale of these attacks are also increasing annually. However, many studies focus on large-scale exchanges, leading to a lack of research on cryptocurrency wallet security. Nevertheless, the threat to individual wallets is real and can lead to severe consequences for individuals. In this paper, we analyze the security of the open-source cryptocurrency wallets Sparrow, Etherwall, and Bither against brute-force attacks, a fundamental threat in password-based systems. As cryptocurrency wallets use passwords to manage users’ private keys, we analyzed the private key management mechanism and implemented a password verification oracle. We used this oracle for brute-force attacks. We identified the private key management mechanism by conducting a code-level investigation and evaluated the three wallets’ security through practical experimentation. The experiment results revealed that the wallets’ security, which depends on passwords, could be diminished due to the password input space and the configuration of password length settings. We propose a general methodology for analyzing the security of desktop cryptocurrency wallets against brute-force attacks and provide practical guidelines for designing secure wallets. By using the analysis methods suggested in this paper, one can evaluate the security of wallets.
Title: A Security Analysis of Cryptocurrency Wallets against Password Brute-Force Attacks
Description:
Currently, the monetary value of cryptocurrencies is extremely high, leading to frequent theft attempts.
Cyberattacks targeting cryptocurrency wallets and the scale of these attacks are also increasing annually.
However, many studies focus on large-scale exchanges, leading to a lack of research on cryptocurrency wallet security.
Nevertheless, the threat to individual wallets is real and can lead to severe consequences for individuals.
In this paper, we analyze the security of the open-source cryptocurrency wallets Sparrow, Etherwall, and Bither against brute-force attacks, a fundamental threat in password-based systems.
As cryptocurrency wallets use passwords to manage users’ private keys, we analyzed the private key management mechanism and implemented a password verification oracle.
We used this oracle for brute-force attacks.
We identified the private key management mechanism by conducting a code-level investigation and evaluated the three wallets’ security through practical experimentation.
The experiment results revealed that the wallets’ security, which depends on passwords, could be diminished due to the password input space and the configuration of password length settings.
We propose a general methodology for analyzing the security of desktop cryptocurrency wallets against brute-force attacks and provide practical guidelines for designing secure wallets.
By using the analysis methods suggested in this paper, one can evaluate the security of wallets.
Related Results
Cross-Domain Feature Enhancement-Based Password Guessing Method for Small Samples
Cross-Domain Feature Enhancement-Based Password Guessing Method for Small Samples
As a crucial component of account protection system evaluation and intrusion detection, the advancement of password guessing technology encounters challenges due to its reliance on...
Enhancing Entrepreneurial Security in Cryptocurrency Wallets Using Cloud Technology
Enhancing Entrepreneurial Security in Cryptocurrency Wallets Using Cloud Technology
The increasing adoption of cryptocurrency has underscored the critical need for robust security measures to protect digital assets stored in cryptocurrency wallets. Traditional sec...
Deception-Based Security Framework for IoT: An Empirical Study
Deception-Based Security Framework for IoT: An Empirical Study
<p><b>A large number of Internet of Things (IoT) devices in use has provided a vast attack surface. The security in IoT devices is a significant challenge considering c...
The Impact of Market Sentiment on Cryptocurrency Investment
The Impact of Market Sentiment on Cryptocurrency Investment
Market sentiment refers to the overall feeling of investors and traders have about the state of the market or the price action of a particular asset. The descriptive study focused ...
Cryptocurrency Exchange Selection Decision Support System Using Preference Selection Index
Cryptocurrency Exchange Selection Decision Support System Using Preference Selection Index
Cryptocurrency trading is a very popular business of buying and selling digital money today. Many investors trade cryptocurrency assets through cryptocurrency exchange platforms in...
An Enhanced Graphical Password Technique Using Fake Pointers
An Enhanced Graphical Password Technique Using Fake Pointers
Security is the degree of resistance to, or protection from harm. It applies to any vulnerable and valuable asset, such as person, community, nation, or organization. Thus, the det...
Efektifitas Penerapan Algoritma Brute Force dan Penyalahgunaannya Dalam Sistem Berbasis Web
Efektifitas Penerapan Algoritma Brute Force dan Penyalahgunaannya Dalam Sistem Berbasis Web
Brute Force adalah teknik dalam industri keamanan komputer yang bergantung pada kecepatan dan ketelitian komputer untuk melakukan percobaan dan mencoba setiap kombinasi atau kata k...
ANALISIS PERBANDINGAN SERANGAN HYDRA, MEDUSA DAN NCRACK PADA PASSWORD ATTACK
ANALISIS PERBANDINGAN SERANGAN HYDRA, MEDUSA DAN NCRACK PADA PASSWORD ATTACK
Aspek penting dari suatu perangkat komputer adalah sebuah keamanan sistem tersebut, keamanan ini dibuat untuk melindungi data yang ada di dalam untuk tidak mudah dicuri orang lain....

