Android-based Cryptocurrency Wallets: Attacks and Countermeasures

Cong Li, Daojing He, Shihao Li, Sencun Zhu, Sammy Chan, Yao Cheng

Research output: Chapters, Conference Papers, Creative and Literary WorksRGC 32 - Refereed conference paper (with host publication)peer-review

14 Citations (Scopus)

Abstract

The security of cryptocurrency wallets is directly related to the security of personal assets. However, due to the design defects of mobile operating system and cryptocurrency wallets, security incidents of cryptocurrency wallets occur frequently, causing irreversible losses to users' assets or privacy. In this paper, we study the security risks of Android-based cryptocurrency wallets. We establish the adversary model, analyze the attack surface originated from the Android OS, and demonstrate several attack vectors by conducting experiments on multiple popular cryptocurrency wallets in Google Play Store. Finally, we present several security defense strategies in response to the security risks.
Original languageEnglish
Title of host publicationProceedings 2020 IEEE International Conference on Blockchain
Subtitle of host publicationBlockchain 2020
PublisherIEEE
Pages9-16
ISBN (Electronic)9780738104959
ISBN (Print)9780738104966
DOIs
Publication statusPublished - Nov 2020
Event3rd IEEE International Conference on Blockchain (Blockchain 2020) - Virtual, Rhodes Island, Greece
Duration: 2 Nov 20206 Nov 2020
http://www.blockchain-ieee.org/#:~:text=IEEE%20Blockchain%2D2020%20will%20be,technologies%20and%20theories%20for%20blockchain.

Publication series

NameProceedings - IEEE International Conference on Blockchain, Blockchain

Conference

Conference3rd IEEE International Conference on Blockchain (Blockchain 2020)
Abbreviated titleBlockchain 2020
Country/TerritoryGreece
CityRhodes Island
Period2/11/206/11/20
Internet address

Research Keywords

  • Android application security
  • Blockchain
  • Cryptocurrency wallets
  • Permission

Fingerprint

Dive into the research topics of 'Android-based Cryptocurrency Wallets: Attacks and Countermeasures'. Together they form a unique fingerprint.

Cite this