Document Type

Conference Proceeding

Publication Date

2018

Subject: LCSH

Bitcoin, Hardware Trojans (Computers), Digital forensic science

Disciplines

Computer Engineering | Computer Sciences | Electrical and Computer Engineering | Forensic Science and Technology | Information Security | Physical Sciences and Mathematics

Abstract

Cryptocurrencies have gained wide adoption by enthusiasts and investors. In this work, we examine seven different Android cryptowallet applications for forensic artifacts, but we also assess their security against tampering and reverse engineering. Some of the biggest benefits of cryptocurrency is its security and relative anonymity. For this reason it is vital that wallet applications share the same properties. Our work, however, indicates that this is not the case. Five of the seven applications we tested do not implement basic security measures against reverse engineering. Three of the applications stored sensitive information, like wallet private keys, insecurely and one was able to be decrypted with some effort. One of the applications did not require root access to retrieve the data. We were also able to implement a proof-of-concept trojan which exemplifies how a malicious actor may exploit the lack of security in these applications and exfiltrate user data and cryptocurrency.

Comments

This is the authors' accepted version of the paper published in Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (LNICST). The volume encompasses the proceedings of the 10th EAI International Conference on Digital Forensics & Cyber Crime, September 10-12 in New Orleans. The version of record for the proceedings volume may be purchased from the Springer web site.

The final authenticated version is available online at https://link.springer.com/conference/icdf2c

Dr. Baggili was appointed to the University of New Haven’s Elder Family Endowed Chair in 2015.

Publisher Citation

Haigh, T., Breitinger, F., Baggili, I. (2018) If I Had a Million Cryptos: Cryptowallet Application Analysis and A Trojan Proof-of-Concept. In Digital Forensics & Cyber Crime: 10th International Conference, ICDF2C, September 10-12, 2018, New Orleans, Revised Selected Papers. Springer.

Share

COinS
 
 

To view the content in your browser, please download Adobe Reader or, alternately,
you may Download the file to your hard drive.

NOTE: The latest versions of Adobe Reader do not support viewing PDF files within Firefox on Mac OS and if you are using a modern (Intel) Mac, there is no official plugin for viewing PDF files within the browser window.