Javascript must be enabled to continue!
A Security Analysis of Cryptocurrency Wallets against Password Brute-Force Attacks
View through CrossRef
Currently, the monetary value of cryptocurrencies is extremely high, leading to frequent theft attempts. Cyberattacks targeting cryptocurrency wallets and the scale of these attacks are also increasing annually. However, many studies focus on large-scale exchanges, leading to a lack of research on cryptocurrency wallet security. Nevertheless, the threat to individual wallets is real and can lead to severe consequences for individuals. In this paper, we analyze the security of the open-source cryptocurrency wallets Sparrow, Etherwall, and Bither against brute-force attacks, a fundamental threat in password-based systems. As cryptocurrency wallets use passwords to manage users’ private keys, we analyzed the private key management mechanism and implemented a password verification oracle. We used this oracle for brute-force attacks. We identified the private key management mechanism by conducting a code-level investigation and evaluated the three wallets’ security through practical experimentation. The experiment results revealed that the wallets’ security, which depends on passwords, could be diminished due to the password input space and the configuration of password length settings. We propose a general methodology for analyzing the security of desktop cryptocurrency wallets against brute-force attacks and provide practical guidelines for designing secure wallets. By using the analysis methods suggested in this paper, one can evaluate the security of wallets.
Title: A Security Analysis of Cryptocurrency Wallets against Password Brute-Force Attacks
Description:
Currently, the monetary value of cryptocurrencies is extremely high, leading to frequent theft attempts.
Cyberattacks targeting cryptocurrency wallets and the scale of these attacks are also increasing annually.
However, many studies focus on large-scale exchanges, leading to a lack of research on cryptocurrency wallet security.
Nevertheless, the threat to individual wallets is real and can lead to severe consequences for individuals.
In this paper, we analyze the security of the open-source cryptocurrency wallets Sparrow, Etherwall, and Bither against brute-force attacks, a fundamental threat in password-based systems.
As cryptocurrency wallets use passwords to manage users’ private keys, we analyzed the private key management mechanism and implemented a password verification oracle.
We used this oracle for brute-force attacks.
We identified the private key management mechanism by conducting a code-level investigation and evaluated the three wallets’ security through practical experimentation.
The experiment results revealed that the wallets’ security, which depends on passwords, could be diminished due to the password input space and the configuration of password length settings.
We propose a general methodology for analyzing the security of desktop cryptocurrency wallets against brute-force attacks and provide practical guidelines for designing secure wallets.
By using the analysis methods suggested in this paper, one can evaluate the security of wallets.
Related Results
Cross-Domain Feature Enhancement-Based Password Guessing Method for Small Samples
Cross-Domain Feature Enhancement-Based Password Guessing Method for Small Samples
As a crucial component of account protection system evaluation and intrusion detection, the advancement of password guessing technology encounters challenges due to its reliance on...
Enhancing Entrepreneurial Security in Cryptocurrency Wallets Using Cloud Technology
Enhancing Entrepreneurial Security in Cryptocurrency Wallets Using Cloud Technology
The increasing adoption of cryptocurrency has underscored the critical need for robust security measures to protect digital assets stored in cryptocurrency wallets. Traditional sec...
Deception-Based Security Framework for IoT: An Empirical Study
Deception-Based Security Framework for IoT: An Empirical Study
<p><b>A large number of Internet of Things (IoT) devices in use has provided a vast attack surface. The security in IoT devices is a significant challenge considering c...
An Enhanced Graphical Password Technique Using Fake Pointers
An Enhanced Graphical Password Technique Using Fake Pointers
Security is the degree of resistance to, or protection from harm. It applies to any vulnerable and valuable asset, such as person, community, nation, or organization. Thus, the det...
Efektifitas Penerapan Algoritma Brute Force dan Penyalahgunaannya Dalam Sistem Berbasis Web
Efektifitas Penerapan Algoritma Brute Force dan Penyalahgunaannya Dalam Sistem Berbasis Web
Brute Force adalah teknik dalam industri keamanan komputer yang bergantung pada kecepatan dan ketelitian komputer untuk melakukan percobaan dan mencoba setiap kombinasi atau kata k...
ANALISIS PERBANDINGAN SERANGAN HYDRA, MEDUSA DAN NCRACK PADA PASSWORD ATTACK
ANALISIS PERBANDINGAN SERANGAN HYDRA, MEDUSA DAN NCRACK PADA PASSWORD ATTACK
Aspek penting dari suatu perangkat komputer adalah sebuah keamanan sistem tersebut, keamanan ini dibuat untuk melindungi data yang ada di dalam untuk tidak mudah dicuri orang lain....
STREAMLIT - POWERED DATA SCIENCE VISUALIZING CRYPTOCURRENCY MARKETS
STREAMLIT - POWERED DATA SCIENCE VISUALIZING CRYPTOCURRENCY MARKETS
Streamlit-powered data science visualizing cryptocurrency markets is a pioneering and user-centric platform meticulously crafted to immerse users in the captivating realm of crypto...
Decentralization of Cryptocurrency and Its Theoretical Significance for Economic Efficiency
Decentralization of Cryptocurrency and Its Theoretical Significance for Economic Efficiency
This paper aims to explore the theoretical significance of the decentralization of cryptocurrency for economic efficiency. The core of the research is to analyze how the decentrali...

