If I Had a Million Cryptos: Cryptowallet Application Analysis and a Trojan Proof-of-Concept

12Citations
Citations of this article
22Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Cryptocurrencies have gained wide adoption by enthusiasts and investors. In this work, we examine seven different Android cryptowallet applications for forensic artifacts, but we also assess their security against tampering and reverse engineering. Some of the biggest benefits of cryptocurrency is its security and relative anonymity. For this reason it is vital that wallet applications share the same properties. Our work, however, indicates that this is not the case. Five of the seven applications we tested do not implement basic security measures against reverse engineering. Three of the applications stored sensitive information, like wallet private keys, insecurely and one was able to be decrypted with some effort. One of the applications did not require root access to retrieve the data. We were also able to implement a proof-of-concept trojan which exemplifies how a malicious actor may exploit the lack of security in these applications and exfiltrate user data and cryptocurrency.

Cite

CITATION STYLE

APA

Haigh, T., Breitinger, F., & Baggili, I. (2019). If I Had a Million Cryptos: Cryptowallet Application Analysis and a Trojan Proof-of-Concept. In Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST (Vol. 259, pp. 45–65). Springer Verlag. https://doi.org/10.1007/978-3-030-05487-8_3

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free